2 * Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 1998-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
25 #include <isc/base64.h>
29 #include <isc/parseint.h>
30 #include <isc/print.h>
31 #include <isc/string.h>
32 #include <isc/stdlib.h>
35 #include <dns/callbacks.h>
37 #include <dns/compress.h>
38 #include <dns/enumtype.h>
39 #include <dns/keyflags.h>
40 #include <dns/keyvalues.h>
41 #include <dns/message.h>
42 #include <dns/rcode.h>
43 #include <dns/rdata.h>
44 #include <dns/rdataclass.h>
45 #include <dns/rdatastruct.h>
46 #include <dns/rdatatype.h>
47 #include <dns/result.h>
48 #include <dns/secalg.h>
49 #include <dns/secproto.h>
55 isc_result_t _r = (x); \
56 if (_r != ISC_R_SUCCESS) \
62 isc_result_t _r = (x); \
63 if (_r != ISC_R_SUCCESS) { \
64 isc_lex_ungettoken(lexer, &token); \
69 #define DNS_AS_STR(t) ((t).value.as_textregion.base)
71 #define ARGS_FROMTEXT int rdclass, dns_rdatatype_t type, \
72 isc_lex_t *lexer, dns_name_t *origin, \
73 unsigned int options, isc_buffer_t *target, \
74 dns_rdatacallbacks_t *callbacks
76 #define ARGS_TOTEXT dns_rdata_t *rdata, dns_rdata_textctx_t *tctx, \
79 #define ARGS_FROMWIRE int rdclass, dns_rdatatype_t type, \
80 isc_buffer_t *source, dns_decompress_t *dctx, \
81 unsigned int options, isc_buffer_t *target
83 #define ARGS_TOWIRE dns_rdata_t *rdata, dns_compress_t *cctx, \
86 #define ARGS_COMPARE const dns_rdata_t *rdata1, const dns_rdata_t *rdata2
88 #define ARGS_FROMSTRUCT int rdclass, dns_rdatatype_t type, \
89 void *source, isc_buffer_t *target
91 #define ARGS_TOSTRUCT dns_rdata_t *rdata, void *target, isc_mem_t *mctx
93 #define ARGS_FREESTRUCT void *source
95 #define ARGS_ADDLDATA dns_rdata_t *rdata, dns_additionaldatafunc_t add, \
98 #define ARGS_DIGEST dns_rdata_t *rdata, dns_digestfunc_t digest, void *arg
100 #define ARGS_CHECKOWNER dns_name_t *name, dns_rdataclass_t rdclass, \
101 dns_rdatatype_t type, isc_boolean_t wildcard
103 #define ARGS_CHECKNAMES dns_rdata_t *rdata, dns_name_t *owner, dns_name_t *bad
107 * Context structure for the totext_ functions.
108 * Contains formatting options for rdata-to-text
111 typedef struct dns_rdata_textctx {
112 dns_name_t *origin; /*%< Current origin, or NULL. */
113 unsigned int flags; /*%< DNS_STYLEFLAG_* */
114 unsigned int width; /*%< Width of rdata column. */
115 const char *linebreak; /*%< Line break string. */
116 } dns_rdata_textctx_t;
119 txt_totext(isc_region_t *source, isc_boolean_t quote, isc_buffer_t *target);
122 txt_fromtext(isc_textregion_t *source, isc_buffer_t *target);
125 txt_fromwire(isc_buffer_t *source, isc_buffer_t *target);
128 multitxt_totext(isc_region_t *source, isc_buffer_t *target);
131 multitxt_fromtext(isc_textregion_t *source, isc_buffer_t *target);
134 name_prefix(dns_name_t *name, dns_name_t *origin, dns_name_t *target);
137 name_length(dns_name_t *name);
140 str_totext(const char *source, isc_buffer_t *target);
143 inet_totext(int af, isc_region_t *src, isc_buffer_t *target);
146 buffer_empty(isc_buffer_t *source);
149 buffer_fromregion(isc_buffer_t *buffer, isc_region_t *region);
152 uint32_tobuffer(isc_uint32_t, isc_buffer_t *target);
155 uint16_tobuffer(isc_uint32_t, isc_buffer_t *target);
158 uint8_tobuffer(isc_uint32_t, isc_buffer_t *target);
161 name_tobuffer(dns_name_t *name, isc_buffer_t *target);
164 uint32_fromregion(isc_region_t *region);
167 uint16_fromregion(isc_region_t *region);
170 uint8_fromregion(isc_region_t *region);
173 uint8_consume_fromregion(isc_region_t *region);
176 mem_tobuffer(isc_buffer_t *target, void *base, unsigned int length);
179 hexvalue(char value);
182 decvalue(char value);
185 btoa_totext(unsigned char *inbuf, int inbuflen, isc_buffer_t *target);
188 atob_tobuffer(isc_lex_t *lexer, isc_buffer_t *target);
191 default_fromtext_callback(dns_rdatacallbacks_t *callbacks, const char *, ...)
192 ISC_FORMAT_PRINTF(2, 3);
195 fromtext_error(void (*callback)(dns_rdatacallbacks_t *, const char *, ...),
196 dns_rdatacallbacks_t *callbacks, const char *name,
197 unsigned long line, isc_token_t *token, isc_result_t result);
200 fromtext_warneof(isc_lex_t *lexer, dns_rdatacallbacks_t *callbacks);
203 rdata_totext(dns_rdata_t *rdata, dns_rdata_textctx_t *tctx,
204 isc_buffer_t *target);
207 warn_badname(dns_name_t *name, isc_lex_t *lexer,
208 dns_rdatacallbacks_t *callbacks);
211 warn_badmx(isc_token_t *token, isc_lex_t *lexer,
212 dns_rdatacallbacks_t *callbacks);
215 uint16_consume_fromregion(isc_region_t *region);
218 unknown_totext(dns_rdata_t *rdata, dns_rdata_textctx_t *tctx,
219 isc_buffer_t *target);
221 static inline isc_result_t
222 generic_fromtext_key(ARGS_FROMTEXT);
224 static inline isc_result_t
225 generic_totext_key(ARGS_TOTEXT);
227 static inline isc_result_t
228 generic_fromwire_key(ARGS_FROMWIRE);
230 static inline isc_result_t
231 generic_fromstruct_key(ARGS_FROMSTRUCT);
233 static inline isc_result_t
234 generic_tostruct_key(ARGS_TOSTRUCT);
237 generic_freestruct_key(ARGS_FREESTRUCT);
240 generic_fromtext_txt(ARGS_FROMTEXT);
243 generic_totext_txt(ARGS_TOTEXT);
246 generic_fromwire_txt(ARGS_FROMWIRE);
249 generic_fromstruct_txt(ARGS_FROMSTRUCT);
252 generic_tostruct_txt(ARGS_TOSTRUCT);
255 generic_freestruct_txt(ARGS_FREESTRUCT);
258 generic_txt_first(dns_rdata_txt_t *txt);
261 generic_txt_next(dns_rdata_txt_t *txt);
264 generic_txt_current(dns_rdata_txt_t *txt, dns_rdata_txt_string_t *string);
267 generic_totext_ds(ARGS_TOTEXT);
270 generic_tostruct_ds(ARGS_TOSTRUCT);
273 generic_fromtext_ds(ARGS_FROMTEXT);
276 generic_fromwire_ds(ARGS_FROMWIRE);
279 generic_fromstruct_ds(ARGS_FROMSTRUCT);
282 generic_fromtext_tlsa(ARGS_FROMTEXT);
285 generic_totext_tlsa(ARGS_TOTEXT);
288 generic_fromwire_tlsa(ARGS_FROMWIRE);
291 generic_fromstruct_tlsa(ARGS_FROMSTRUCT);
294 generic_tostruct_tlsa(ARGS_TOSTRUCT);
297 generic_freestruct_tlsa(ARGS_FREESTRUCT);
301 /*% IPv6 Address Size */
302 #define NS_LOCATORSZ 8
305 * Active Diretory gc._msdcs.<forest> prefix.
307 static unsigned char gc_msdcs_data[] = "\002gc\006_msdcs";
308 static unsigned char gc_msdcs_offset [] = { 0, 3 };
310 static const dns_name_t gc_msdcs = {
312 gc_msdcs_data, 10, 2,
313 DNS_NAMEATTR_READONLY,
314 gc_msdcs_offset, NULL,
315 {(void *)-1, (void *)-1},
320 * convert presentation level address to network order binary form.
322 * 1 if `src' is a valid [RFC1884 2.2] address, else 0.
324 * (1) does not touch `dst' unless it's returning 1.
327 locator_pton(const char *src, unsigned char *dst) {
328 static const char xdigits_l[] = "0123456789abcdef",
329 xdigits_u[] = "0123456789ABCDEF";
330 unsigned char tmp[NS_LOCATORSZ];
331 unsigned char *tp = tmp, *endp;
333 int ch, seen_xdigits;
336 memset(tp, '\0', NS_LOCATORSZ);
337 endp = tp + NS_LOCATORSZ;
340 while ((ch = *src++) != '\0') {
343 pch = strchr((xdigits = xdigits_l), ch);
345 pch = strchr((xdigits = xdigits_u), ch);
348 val |= (pch - xdigits);
349 if (++seen_xdigits > 4)
356 if (tp + NS_INT16SZ > endp)
358 *tp++ = (unsigned char) (val >> 8) & 0xff;
359 *tp++ = (unsigned char) val & 0xff;
367 if (tp + NS_INT16SZ > endp)
369 *tp++ = (unsigned char) (val >> 8) & 0xff;
370 *tp++ = (unsigned char) val & 0xff;
374 memmove(dst, tmp, NS_LOCATORSZ);
379 getquad(const void *src, struct in_addr *dst,
380 isc_lex_t *lexer, dns_rdatacallbacks_t *callbacks)
385 result = inet_aton(src, dst);
386 if (result == 1 && callbacks != NULL &&
387 inet_pton(AF_INET, src, &tmp) != 1) {
388 const char *name = isc_lex_getsourcename(lexer);
391 (*callbacks->warn)(callbacks, "%s:%lu: \"%s\" "
392 "is not a decimal dotted quad", name,
393 isc_lex_getsourceline(lexer), src);
398 static inline isc_result_t
399 name_duporclone(dns_name_t *source, isc_mem_t *mctx, dns_name_t *target) {
402 return (dns_name_dup(source, mctx, target));
403 dns_name_clone(source, target);
404 return (ISC_R_SUCCESS);
408 mem_maybedup(isc_mem_t *mctx, void *source, size_t length) {
413 copy = isc_mem_allocate(mctx, length);
415 memmove(copy, source, length);
420 static inline isc_result_t
421 typemap_fromtext(isc_lex_t *lexer, isc_buffer_t *target,
422 isc_boolean_t allow_empty)
425 unsigned char bm[8*1024]; /* 64k bits */
426 dns_rdatatype_t covered, max_used;
428 unsigned int max_octet, newend, end;
430 isc_boolean_t first = ISC_TRUE;
437 RETERR(isc_lex_getmastertoken(lexer, &token,
438 isc_tokentype_string, ISC_TRUE));
439 if (token.type != isc_tokentype_string)
441 RETTOK(dns_rdatatype_fromtext(&covered,
442 &token.value.as_textregion));
443 if (covered > max_used) {
444 newend = covered / 8;
446 memset(&bm[end + 1], 0, newend - end);
451 bm[covered/8] |= (0x80>>(covered%8));
454 isc_lex_ungettoken(lexer, &token);
455 if (!allow_empty && first)
456 return (DNS_R_FORMERR);
458 for (window = 0; window < 256 ; window++) {
459 if (max_used < window * 256)
462 max_octet = max_used - (window * 256);
463 if (max_octet >= 256)
469 * Find if we have a type in this window.
471 for (octet = max_octet; octet >= 0; octet--) {
472 if (bm[window * 32 + octet] != 0)
477 RETERR(uint8_tobuffer(window, target));
478 RETERR(uint8_tobuffer(octet + 1, target));
479 RETERR(mem_tobuffer(target, &bm[window * 32], octet + 1));
481 return (ISC_R_SUCCESS);
484 static inline isc_result_t
485 typemap_totext(isc_region_t *sr, dns_rdata_textctx_t *tctx,
486 isc_buffer_t *target)
488 unsigned int i, j, k;
489 unsigned int window, len;
490 isc_boolean_t first = ISC_FALSE;
492 for (i = 0; i < sr->length; i += len) {
494 (tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0) {
495 RETERR(str_totext(tctx->linebreak, target));
498 INSIST(i + 2 <= sr->length);
499 window = sr->base[i];
500 len = sr->base[i + 1];
501 INSIST(len > 0 && len <= 32);
503 INSIST(i + len <= sr->length);
504 for (j = 0; j < len; j++) {
506 if (sr->base[i + j] == 0)
508 for (k = 0; k < 8; k++) {
509 if ((sr->base[i + j] & (0x80 >> k)) == 0)
511 t = window * 256 + j * 8 + k;
513 RETERR(str_totext(" ", target));
515 if (dns_rdatatype_isknown(t)) {
516 RETERR(dns_rdatatype_totext(t, target));
518 char buf[sizeof("TYPE65535")];
519 sprintf(buf, "TYPE%u", t);
520 RETERR(str_totext(buf, target));
525 return (ISC_R_SUCCESS);
529 typemap_test(isc_region_t *sr, isc_boolean_t allow_empty) {
530 unsigned int window, lastwindow = 0;
532 isc_boolean_t first = ISC_TRUE;
535 for (i = 0; i < sr->length; i += len) {
537 * Check for overflow.
539 if (i + 2 > sr->length)
540 RETERR(DNS_R_FORMERR);
541 window = sr->base[i];
542 len = sr->base[i + 1];
545 * Check that bitmap windows are in the correct order.
547 if (!first && window <= lastwindow)
548 RETERR(DNS_R_FORMERR);
550 * Check for legal lengths.
552 if (len < 1 || len > 32)
553 RETERR(DNS_R_FORMERR);
555 * Check for overflow.
557 if (i + len > sr->length)
558 RETERR(DNS_R_FORMERR);
560 * The last octet of the bitmap must be non zero.
562 if (sr->base[i + len - 1] == 0)
563 RETERR(DNS_R_FORMERR);
568 return (DNS_R_EXTRADATA);
569 if (!allow_empty && first)
570 RETERR(DNS_R_FORMERR);
571 return (ISC_R_SUCCESS);
574 static const char hexdigits[] = "0123456789abcdef";
575 static const char decdigits[] = "0123456789";
580 #define RESERVED 0x0002
587 dns_rdata_init(dns_rdata_t *rdata) {
589 REQUIRE(rdata != NULL);
596 ISC_LINK_INIT(rdata, link);
597 /* ISC_LIST_INIT(rdata->list); */
601 dns_rdata_reset(dns_rdata_t *rdata) {
603 REQUIRE(rdata != NULL);
605 REQUIRE(!ISC_LINK_LINKED(rdata, link));
606 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
620 dns_rdata_clone(const dns_rdata_t *src, dns_rdata_t *target) {
622 REQUIRE(src != NULL);
623 REQUIRE(target != NULL);
625 REQUIRE(DNS_RDATA_INITIALIZED(target));
627 REQUIRE(DNS_RDATA_VALIDFLAGS(src));
628 REQUIRE(DNS_RDATA_VALIDFLAGS(target));
630 target->data = src->data;
631 target->length = src->length;
632 target->rdclass = src->rdclass;
633 target->type = src->type;
634 target->flags = src->flags;
643 dns_rdata_compare(const dns_rdata_t *rdata1, const dns_rdata_t *rdata2) {
645 isc_boolean_t use_default = ISC_FALSE;
647 REQUIRE(rdata1 != NULL);
648 REQUIRE(rdata2 != NULL);
649 REQUIRE(rdata1->length == 0 || rdata1->data != NULL);
650 REQUIRE(rdata2->length == 0 || rdata2->data != NULL);
651 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata1));
652 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata2));
654 if (rdata1->rdclass != rdata2->rdclass)
655 return (rdata1->rdclass < rdata2->rdclass ? -1 : 1);
657 if (rdata1->type != rdata2->type)
658 return (rdata1->type < rdata2->type ? -1 : 1);
666 dns_rdata_toregion(rdata1, &r1);
667 dns_rdata_toregion(rdata2, &r2);
668 result = isc_region_compare(&r1, &r2);
674 dns_rdata_casecompare(const dns_rdata_t *rdata1, const dns_rdata_t *rdata2) {
676 isc_boolean_t use_default = ISC_FALSE;
678 REQUIRE(rdata1 != NULL);
679 REQUIRE(rdata2 != NULL);
680 REQUIRE(rdata1->length == 0 || rdata1->data != NULL);
681 REQUIRE(rdata2->length == 0 || rdata2->data != NULL);
682 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata1));
683 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata2));
685 if (rdata1->rdclass != rdata2->rdclass)
686 return (rdata1->rdclass < rdata2->rdclass ? -1 : 1);
688 if (rdata1->type != rdata2->type)
689 return (rdata1->type < rdata2->type ? -1 : 1);
697 dns_rdata_toregion(rdata1, &r1);
698 dns_rdata_toregion(rdata2, &r2);
699 result = isc_region_compare(&r1, &r2);
709 dns_rdata_fromregion(dns_rdata_t *rdata, dns_rdataclass_t rdclass,
710 dns_rdatatype_t type, isc_region_t *r)
713 REQUIRE(rdata != NULL);
714 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
717 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
719 rdata->data = r->base;
720 rdata->length = r->length;
721 rdata->rdclass = rdclass;
727 dns_rdata_toregion(const dns_rdata_t *rdata, isc_region_t *r) {
729 REQUIRE(rdata != NULL);
731 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
733 r->base = rdata->data;
734 r->length = rdata->length;
738 dns_rdata_fromwire(dns_rdata_t *rdata, dns_rdataclass_t rdclass,
739 dns_rdatatype_t type, isc_buffer_t *source,
740 dns_decompress_t *dctx, unsigned int options,
741 isc_buffer_t *target)
743 isc_result_t result = ISC_R_NOTIMPLEMENTED;
747 isc_boolean_t use_default = ISC_FALSE;
748 isc_uint32_t activelength;
751 REQUIRE(dctx != NULL);
753 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
754 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
756 REQUIRE(source != NULL);
757 REQUIRE(target != NULL);
760 return (DNS_R_FORMERR);
765 activelength = isc_buffer_activelength(source);
766 INSIST(activelength < 65536);
771 if (activelength > isc_buffer_availablelength(target))
772 result = ISC_R_NOSPACE;
774 isc_buffer_putmem(target, isc_buffer_current(source),
776 isc_buffer_forward(source, activelength);
777 result = ISC_R_SUCCESS;
782 * Reject any rdata that expands out to more than DNS_RDATA_MAXLENGTH
783 * as we cannot transmit it.
785 length = isc_buffer_usedlength(target) - isc_buffer_usedlength(&st);
786 if (result == ISC_R_SUCCESS && length > DNS_RDATA_MAXLENGTH)
787 result = DNS_R_FORMERR;
790 * We should have consumed all of our buffer.
792 if (result == ISC_R_SUCCESS && !buffer_empty(source))
793 result = DNS_R_EXTRADATA;
795 if (rdata != NULL && result == ISC_R_SUCCESS) {
796 region.base = isc_buffer_used(&st);
797 region.length = length;
798 dns_rdata_fromregion(rdata, rdclass, type, ®ion);
801 if (result != ISC_R_SUCCESS) {
809 dns_rdata_towire(dns_rdata_t *rdata, dns_compress_t *cctx,
810 isc_buffer_t *target)
812 isc_result_t result = ISC_R_NOTIMPLEMENTED;
813 isc_boolean_t use_default = ISC_FALSE;
817 REQUIRE(rdata != NULL);
818 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
821 * Some DynDNS meta-RRs have empty rdata.
823 if ((rdata->flags & DNS_RDATA_UPDATE) != 0) {
824 INSIST(rdata->length == 0);
825 return (ISC_R_SUCCESS);
833 isc_buffer_availableregion(target, &tr);
834 if (tr.length < rdata->length)
835 return (ISC_R_NOSPACE);
836 memmove(tr.base, rdata->data, rdata->length);
837 isc_buffer_add(target, rdata->length);
838 return (ISC_R_SUCCESS);
840 if (result != ISC_R_SUCCESS) {
842 INSIST(target->used < 65536);
843 dns_compress_rollback(cctx, (isc_uint16_t)target->used);
849 * If the binary data in 'src' is valid uncompressed wire format
850 * rdata of class 'rdclass' and type 'type', return ISC_R_SUCCESS
851 * and copy the validated rdata to 'dest'. Otherwise return an error.
854 rdata_validate(isc_buffer_t *src, isc_buffer_t *dest, dns_rdataclass_t rdclass,
855 dns_rdatatype_t type)
857 dns_decompress_t dctx;
860 dns_decompress_init(&dctx, -1, DNS_DECOMPRESS_NONE);
861 isc_buffer_setactive(src, isc_buffer_usedlength(src));
862 result = dns_rdata_fromwire(NULL, rdclass, type, src, &dctx, 0, dest);
863 dns_decompress_invalidate(&dctx);
869 unknown_fromtext(dns_rdataclass_t rdclass, dns_rdatatype_t type,
870 isc_lex_t *lexer, isc_mem_t *mctx, isc_buffer_t *target)
873 isc_buffer_t *buf = NULL;
876 if (type == 0 || dns_rdatatype_ismeta(type))
877 return (DNS_R_METATYPE);
879 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
881 if (token.value.as_ulong > 65535U)
882 return (ISC_R_RANGE);
883 result = isc_buffer_allocate(mctx, &buf, token.value.as_ulong);
884 if (result != ISC_R_SUCCESS)
887 result = isc_hex_tobuffer(lexer, buf,
888 (unsigned int)token.value.as_ulong);
889 if (result != ISC_R_SUCCESS)
891 if (isc_buffer_usedlength(buf) != token.value.as_ulong) {
892 result = ISC_R_UNEXPECTEDEND;
896 if (dns_rdatatype_isknown(type)) {
897 result = rdata_validate(buf, target, rdclass, type);
900 isc_buffer_usedregion(buf, &r);
901 result = isc_buffer_copyregion(target, &r);
903 if (result != ISC_R_SUCCESS)
906 isc_buffer_free(&buf);
907 return (ISC_R_SUCCESS);
910 isc_buffer_free(&buf);
915 dns_rdata_fromtext(dns_rdata_t *rdata, dns_rdataclass_t rdclass,
916 dns_rdatatype_t type, isc_lex_t *lexer,
917 dns_name_t *origin, unsigned int options, isc_mem_t *mctx,
918 isc_buffer_t *target, dns_rdatacallbacks_t *callbacks)
920 isc_result_t result = ISC_R_NOTIMPLEMENTED;
924 unsigned int lexoptions = ISC_LEXOPT_EOL | ISC_LEXOPT_EOF |
925 ISC_LEXOPT_DNSMULTILINE | ISC_LEXOPT_ESCAPE;
928 void (*callback)(dns_rdatacallbacks_t *, const char *, ...);
929 isc_result_t tresult;
931 isc_boolean_t unknown;
933 REQUIRE(origin == NULL || dns_name_isabsolute(origin) == ISC_TRUE);
935 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
936 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
938 if (callbacks != NULL) {
939 REQUIRE(callbacks->warn != NULL);
940 REQUIRE(callbacks->error != NULL);
945 if (callbacks != NULL)
946 callback = callbacks->error;
948 callback = default_fromtext_callback;
950 result = isc_lex_getmastertoken(lexer, &token, isc_tokentype_qstring,
952 if (result != ISC_R_SUCCESS) {
953 name = isc_lex_getsourcename(lexer);
954 line = isc_lex_getsourceline(lexer);
955 fromtext_error(callback, callbacks, name, line, NULL, result);
960 if (token.type == isc_tokentype_string &&
961 strcmp(DNS_AS_STR(token), "\\#") == 0) {
963 * If this is a TXT record '\#' could be a escaped '#'.
964 * Look to see if the next token is a number and if so
965 * treat it as a unknown record format.
967 if (type == dns_rdatatype_txt) {
968 result = isc_lex_getmastertoken(lexer, &token,
969 isc_tokentype_number,
971 if (result == ISC_R_SUCCESS)
972 isc_lex_ungettoken(lexer, &token);
975 if (result == ISC_R_SUCCESS) {
977 result = unknown_fromtext(rdclass, type, lexer,
980 options |= DNS_RDATA_UNKNOWNESCAPE;
982 isc_lex_ungettoken(lexer, &token);
988 * Consume to end of line / file.
989 * If not at end of line initially set error code.
990 * Call callback via fromtext_error once if there was an error.
993 name = isc_lex_getsourcename(lexer);
994 line = isc_lex_getsourceline(lexer);
995 tresult = isc_lex_gettoken(lexer, lexoptions, &token);
996 if (tresult != ISC_R_SUCCESS) {
997 if (result == ISC_R_SUCCESS)
999 if (callback != NULL)
1000 fromtext_error(callback, callbacks, name,
1001 line, NULL, result);
1003 } else if (token.type != isc_tokentype_eol &&
1004 token.type != isc_tokentype_eof) {
1005 if (result == ISC_R_SUCCESS)
1006 result = DNS_R_EXTRATOKEN;
1007 if (callback != NULL) {
1008 fromtext_error(callback, callbacks, name,
1009 line, &token, result);
1012 } else if (result != ISC_R_SUCCESS && callback != NULL) {
1013 fromtext_error(callback, callbacks, name, line,
1017 if (token.type == isc_tokentype_eof)
1018 fromtext_warneof(lexer, callbacks);
1023 length = isc_buffer_usedlength(target) - isc_buffer_usedlength(&st);
1024 if (result == ISC_R_SUCCESS && length > DNS_RDATA_MAXLENGTH)
1025 result = ISC_R_NOSPACE;
1027 if (rdata != NULL && result == ISC_R_SUCCESS) {
1028 region.base = isc_buffer_used(&st);
1029 region.length = length;
1030 dns_rdata_fromregion(rdata, rdclass, type, ®ion);
1032 if (result != ISC_R_SUCCESS) {
1039 unknown_totext(dns_rdata_t *rdata, dns_rdata_textctx_t *tctx,
1040 isc_buffer_t *target)
1042 isc_result_t result;
1043 char buf[sizeof("65535")];
1046 strlcpy(buf, "\\# ", sizeof(buf));
1047 result = str_totext(buf, target);
1048 if (result != ISC_R_SUCCESS)
1051 dns_rdata_toregion(rdata, &sr);
1052 INSIST(sr.length < 65536);
1053 snprintf(buf, sizeof(buf), "%u", sr.length);
1054 result = str_totext(buf, target);
1055 if (result != ISC_R_SUCCESS)
1058 if (sr.length != 0U) {
1059 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
1060 result = str_totext(" ( ", target);
1062 result = str_totext(" ", target);
1064 if (result != ISC_R_SUCCESS)
1067 if (tctx->width == 0) /* No splitting */
1068 result = isc_hex_totext(&sr, 0, "", target);
1070 result = isc_hex_totext(&sr, tctx->width - 2,
1073 if (result == ISC_R_SUCCESS &&
1074 (tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
1075 result = str_totext(" )", target);
1081 rdata_totext(dns_rdata_t *rdata, dns_rdata_textctx_t *tctx,
1082 isc_buffer_t *target)
1084 isc_result_t result = ISC_R_NOTIMPLEMENTED;
1085 isc_boolean_t use_default = ISC_FALSE;
1088 REQUIRE(rdata != NULL);
1089 REQUIRE(tctx->origin == NULL ||
1090 dns_name_isabsolute(tctx->origin) == ISC_TRUE);
1093 * Some DynDNS meta-RRs have empty rdata.
1095 if ((rdata->flags & DNS_RDATA_UPDATE) != 0) {
1096 INSIST(rdata->length == 0);
1097 return (ISC_R_SUCCESS);
1100 cur = isc_buffer_usedlength(target);
1104 if (use_default || (result == ISC_R_NOTIMPLEMENTED)) {
1105 unsigned int u = isc_buffer_usedlength(target);
1108 isc_buffer_subtract(target, u - cur);
1109 result = unknown_totext(rdata, tctx, target);
1116 dns_rdata_totext(dns_rdata_t *rdata, dns_name_t *origin, isc_buffer_t *target)
1118 dns_rdata_textctx_t tctx;
1120 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
1123 * Set up formatting options for single-line output.
1125 tctx.origin = origin;
1128 tctx.linebreak = " ";
1129 return (rdata_totext(rdata, &tctx, target));
1133 dns_rdata_tofmttext(dns_rdata_t *rdata, dns_name_t *origin,
1134 unsigned int flags, unsigned int width,
1135 unsigned int split_width, const char *linebreak,
1136 isc_buffer_t *target)
1138 dns_rdata_textctx_t tctx;
1140 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
1143 * Set up formatting options for formatted output.
1145 tctx.origin = origin;
1147 if (split_width == 0xffffffff)
1150 tctx.width = split_width;
1152 if ((flags & DNS_STYLEFLAG_MULTILINE) != 0)
1153 tctx.linebreak = linebreak;
1155 if (split_width == 0xffffffff)
1156 tctx.width = 60; /* Used for hex word length only. */
1157 tctx.linebreak = " ";
1159 return (rdata_totext(rdata, &tctx, target));
1163 dns_rdata_fromstruct(dns_rdata_t *rdata, dns_rdataclass_t rdclass,
1164 dns_rdatatype_t type, void *source,
1165 isc_buffer_t *target)
1167 isc_result_t result = ISC_R_NOTIMPLEMENTED;
1169 isc_region_t region;
1170 isc_boolean_t use_default = ISC_FALSE;
1171 unsigned int length;
1173 REQUIRE(source != NULL);
1174 if (rdata != NULL) {
1175 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
1176 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
1186 length = isc_buffer_usedlength(target) - isc_buffer_usedlength(&st);
1187 if (result == ISC_R_SUCCESS && length > DNS_RDATA_MAXLENGTH)
1188 result = ISC_R_NOSPACE;
1190 if (rdata != NULL && result == ISC_R_SUCCESS) {
1191 region.base = isc_buffer_used(&st);
1192 region.length = length;
1193 dns_rdata_fromregion(rdata, rdclass, type, ®ion);
1195 if (result != ISC_R_SUCCESS)
1201 dns_rdata_tostruct(dns_rdata_t *rdata, void *target, isc_mem_t *mctx) {
1202 isc_result_t result = ISC_R_NOTIMPLEMENTED;
1203 isc_boolean_t use_default = ISC_FALSE;
1205 REQUIRE(rdata != NULL);
1206 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
1217 dns_rdata_freestruct(void *source) {
1218 dns_rdatacommon_t *common = source;
1219 REQUIRE(source != NULL);
1225 dns_rdata_additionaldata(dns_rdata_t *rdata, dns_additionaldatafunc_t add,
1228 isc_result_t result = ISC_R_NOTIMPLEMENTED;
1229 isc_boolean_t use_default = ISC_FALSE;
1232 * Call 'add' for each name and type from 'rdata' which is subject to
1233 * additional section processing.
1236 REQUIRE(rdata != NULL);
1237 REQUIRE(add != NULL);
1238 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
1240 ADDITIONALDATASWITCH
1242 /* No additional processing for unknown types */
1244 result = ISC_R_SUCCESS;
1250 dns_rdata_digest(dns_rdata_t *rdata, dns_digestfunc_t digest, void *arg) {
1251 isc_result_t result = ISC_R_NOTIMPLEMENTED;
1252 isc_boolean_t use_default = ISC_FALSE;
1256 * Send 'rdata' in DNSSEC canonical form to 'digest'.
1259 REQUIRE(rdata != NULL);
1260 REQUIRE(digest != NULL);
1261 REQUIRE(DNS_RDATA_VALIDFLAGS(rdata));
1266 dns_rdata_toregion(rdata, &r);
1267 result = (digest)(arg, &r);
1274 dns_rdata_checkowner(dns_name_t *name, dns_rdataclass_t rdclass,
1275 dns_rdatatype_t type, isc_boolean_t wildcard)
1277 isc_boolean_t result;
1284 dns_rdata_checknames(dns_rdata_t *rdata, dns_name_t *owner, dns_name_t *bad)
1286 isc_boolean_t result;
1293 dns_rdatatype_attributes(dns_rdatatype_t type)
1295 RDATATYPE_ATTRIBUTE_SW
1296 if (type >= (dns_rdatatype_t)128 && type < (dns_rdatatype_t)255)
1297 return (DNS_RDATATYPEATTR_UNKNOWN | DNS_RDATATYPEATTR_META);
1298 return (DNS_RDATATYPEATTR_UNKNOWN);
1302 dns_rdatatype_fromtext(dns_rdatatype_t *typep, isc_textregion_t *source) {
1310 return (DNS_R_UNKNOWN);
1312 a = tolower((unsigned char)source->base[0]);
1313 b = tolower((unsigned char)source->base[n - 1]);
1315 hash = ((a + n) * b) % 256;
1318 * This switch block is inlined via \#define, and will use "return"
1319 * to return a result to the caller if it is a valid (known)
1322 RDATATYPE_FROMTEXT_SW(hash, source->base, n, typep);
1324 if (source->length > 4 && source->length < (4 + sizeof("65000")) &&
1325 strncasecmp("type", source->base, 4) == 0) {
1326 char buf[sizeof("65000")];
1330 strncpy(buf, source->base + 4, source->length - 4);
1331 buf[source->length - 4] = '\0';
1332 val = strtoul(buf, &endp, 10);
1333 if (*endp == '\0' && val <= 0xffff) {
1334 *typep = (dns_rdatatype_t)val;
1335 return (ISC_R_SUCCESS);
1339 return (DNS_R_UNKNOWN);
1343 dns_rdatatype_totext(dns_rdatatype_t type, isc_buffer_t *target) {
1344 char buf[sizeof("TYPE65535")];
1347 snprintf(buf, sizeof(buf), "TYPE%u", type);
1348 return (str_totext(buf, target));
1352 dns_rdatatype_format(dns_rdatatype_t rdtype,
1353 char *array, unsigned int size)
1355 isc_result_t result;
1361 isc_buffer_init(&buf, array, size);
1362 result = dns_rdatatype_totext(rdtype, &buf);
1366 if (result == ISC_R_SUCCESS) {
1367 if (isc_buffer_availablelength(&buf) >= 1)
1368 isc_buffer_putuint8(&buf, 0);
1370 result = ISC_R_NOSPACE;
1372 if (result != ISC_R_SUCCESS)
1373 strlcpy(array, "<unknown>", size);
1381 name_length(dns_name_t *name) {
1382 return (name->length);
1386 txt_totext(isc_region_t *source, isc_boolean_t quote, isc_buffer_t *target) {
1391 isc_region_t region;
1393 isc_buffer_availableregion(target, ®ion);
1395 tp = (char *)region.base;
1400 REQUIRE(n + 1 <= source->length);
1402 REQUIRE(quote == ISC_TRUE);
1406 return (ISC_R_NOSPACE);
1412 * \DDD space (0x20) if not quoting.
1414 if (*sp < (quote ? 0x20 : 0x21) || *sp >= 0x7f) {
1416 return (ISC_R_NOSPACE);
1418 *tp++ = 0x30 + ((*sp / 100) % 10);
1419 *tp++ = 0x30 + ((*sp / 10) % 10);
1420 *tp++ = 0x30 + (*sp % 10);
1426 * Escape double quote and backslash. If we are not
1427 * enclosing the string in double quotes also escape
1428 * at sign and semicolon.
1430 if (*sp == 0x22 || *sp == 0x5c ||
1431 (!quote && (*sp == 0x40 || *sp == 0x3b))) {
1433 return (ISC_R_NOSPACE);
1438 return (ISC_R_NOSPACE);
1444 return (ISC_R_NOSPACE);
1448 isc_buffer_add(target, (unsigned int)(tp - (char *)region.base));
1449 isc_region_consume(source, *source->base + 1);
1450 return (ISC_R_SUCCESS);
1454 txt_fromtext(isc_textregion_t *source, isc_buffer_t *target) {
1455 isc_region_t tregion;
1456 isc_boolean_t escape;
1457 unsigned int n, nrem;
1463 isc_buffer_availableregion(target, &tregion);
1467 nrem = tregion.length;
1470 return (ISC_R_NOSPACE);
1477 * Maximum text string length.
1483 if (escape && (d = decvalue((char)c)) != -1) {
1486 return (DNS_R_SYNTAX);
1488 if ((d = decvalue(*s++)) != -1)
1491 return (DNS_R_SYNTAX);
1493 return (DNS_R_SYNTAX);
1495 if ((d = decvalue(*s++)) != -1)
1498 return (DNS_R_SYNTAX);
1500 return (DNS_R_SYNTAX);
1501 } else if (!escape && c == '\\') {
1507 return ((tregion.length <= 256U) ?
1508 ISC_R_NOSPACE : DNS_R_SYNTAX);
1513 return (DNS_R_SYNTAX);
1514 *tregion.base = (unsigned char)(t - tregion.base - 1);
1515 isc_buffer_add(target, *tregion.base + 1);
1516 return (ISC_R_SUCCESS);
1520 txt_fromwire(isc_buffer_t *source, isc_buffer_t *target) {
1522 isc_region_t sregion;
1523 isc_region_t tregion;
1525 isc_buffer_activeregion(source, &sregion);
1526 if (sregion.length == 0)
1527 return (ISC_R_UNEXPECTEDEND);
1528 n = *sregion.base + 1;
1529 if (n > sregion.length)
1530 return (ISC_R_UNEXPECTEDEND);
1532 isc_buffer_availableregion(target, &tregion);
1533 if (n > tregion.length)
1534 return (ISC_R_NOSPACE);
1536 if (tregion.base != sregion.base)
1537 memmove(tregion.base, sregion.base, n);
1538 isc_buffer_forward(source, n);
1539 isc_buffer_add(target, n);
1540 return (ISC_R_SUCCESS);
1544 * Conversion of TXT-like rdata fields without length limits.
1547 multitxt_totext(isc_region_t *source, isc_buffer_t *target) {
1552 isc_region_t region;
1554 isc_buffer_availableregion(target, ®ion);
1556 tp = (char *)region.base;
1560 return (ISC_R_NOSPACE);
1565 n0 = source->length - 1;
1568 if (*sp < 0x20 || *sp >= 0x7f) {
1570 return (ISC_R_NOSPACE);
1572 *tp++ = 0x30 + ((*sp / 100) % 10);
1573 *tp++ = 0x30 + ((*sp / 10) % 10);
1574 *tp++ = 0x30 + (*sp % 10);
1579 /* double quote, semi-colon, backslash */
1580 if (*sp == 0x22 || *sp == 0x3b || *sp == 0x5c) {
1582 return (ISC_R_NOSPACE);
1587 return (ISC_R_NOSPACE);
1591 isc_region_consume(source, n0 + 1);
1592 } while (source->length != 0);
1594 return (ISC_R_NOSPACE);
1597 isc_buffer_add(target, (unsigned int)(tp - (char *)region.base));
1598 return (ISC_R_SUCCESS);
1602 multitxt_fromtext(isc_textregion_t *source, isc_buffer_t *target) {
1603 isc_region_t tregion;
1604 isc_boolean_t escape;
1605 unsigned int n, nrem;
1607 unsigned char *t0, *t;
1616 isc_buffer_availableregion(target, &tregion);
1617 t0 = t = tregion.base;
1618 nrem = tregion.length;
1620 return (ISC_R_NOSPACE);
1625 if (escape && (d = decvalue((char)c)) != -1) {
1628 return (DNS_R_SYNTAX);
1630 if ((d = decvalue(*s++)) != -1)
1633 return (DNS_R_SYNTAX);
1635 return (DNS_R_SYNTAX);
1637 if ((d = decvalue(*s++)) != -1)
1640 return (DNS_R_SYNTAX);
1642 return (DNS_R_SYNTAX);
1643 } else if (!escape && c == '\\') {
1654 return (DNS_R_SYNTAX);
1656 isc_buffer_add(target, (unsigned int)(t - t0));
1658 return (ISC_R_SUCCESS);
1661 static isc_boolean_t
1662 name_prefix(dns_name_t *name, dns_name_t *origin, dns_name_t *target) {
1668 if (dns_name_compare(origin, dns_rootname) == 0)
1671 if (!dns_name_issubdomain(name, origin))
1674 l1 = dns_name_countlabels(name);
1675 l2 = dns_name_countlabels(origin);
1680 /* Master files should be case preserving. */
1681 dns_name_getlabelsequence(name, l1 - l2, l2, target);
1682 if (!dns_name_caseequal(origin, target))
1685 dns_name_getlabelsequence(name, 0, l1 - l2, target);
1694 str_totext(const char *source, isc_buffer_t *target) {
1696 isc_region_t region;
1698 isc_buffer_availableregion(target, ®ion);
1701 if (l > region.length)
1702 return (ISC_R_NOSPACE);
1704 memmove(region.base, source, l);
1705 isc_buffer_add(target, l);
1706 return (ISC_R_SUCCESS);
1710 inet_totext(int af, isc_region_t *src, isc_buffer_t *target) {
1713 /* Note - inet_ntop doesn't do size checking on its input. */
1714 if (inet_ntop(af, src->base, tmpbuf, sizeof(tmpbuf)) == NULL)
1715 return (ISC_R_NOSPACE);
1716 if (strlen(tmpbuf) > isc_buffer_availablelength(target))
1717 return (ISC_R_NOSPACE);
1718 isc_buffer_putstr(target, tmpbuf);
1719 return (ISC_R_SUCCESS);
1722 static isc_boolean_t
1723 buffer_empty(isc_buffer_t *source) {
1724 return((source->current == source->active) ? ISC_TRUE : ISC_FALSE);
1728 buffer_fromregion(isc_buffer_t *buffer, isc_region_t *region) {
1729 isc_buffer_init(buffer, region->base, region->length);
1730 isc_buffer_add(buffer, region->length);
1731 isc_buffer_setactive(buffer, region->length);
1735 uint32_tobuffer(isc_uint32_t value, isc_buffer_t *target) {
1736 isc_region_t region;
1738 isc_buffer_availableregion(target, ®ion);
1739 if (region.length < 4)
1740 return (ISC_R_NOSPACE);
1741 isc_buffer_putuint32(target, value);
1742 return (ISC_R_SUCCESS);
1746 uint16_tobuffer(isc_uint32_t value, isc_buffer_t *target) {
1747 isc_region_t region;
1750 return (ISC_R_RANGE);
1751 isc_buffer_availableregion(target, ®ion);
1752 if (region.length < 2)
1753 return (ISC_R_NOSPACE);
1754 isc_buffer_putuint16(target, (isc_uint16_t)value);
1755 return (ISC_R_SUCCESS);
1759 uint8_tobuffer(isc_uint32_t value, isc_buffer_t *target) {
1760 isc_region_t region;
1763 return (ISC_R_RANGE);
1764 isc_buffer_availableregion(target, ®ion);
1765 if (region.length < 1)
1766 return (ISC_R_NOSPACE);
1767 isc_buffer_putuint8(target, (isc_uint8_t)value);
1768 return (ISC_R_SUCCESS);
1772 name_tobuffer(dns_name_t *name, isc_buffer_t *target) {
1774 dns_name_toregion(name, &r);
1775 return (isc_buffer_copyregion(target, &r));
1779 uint32_fromregion(isc_region_t *region) {
1782 REQUIRE(region->length >= 4);
1783 value = region->base[0] << 24;
1784 value |= region->base[1] << 16;
1785 value |= region->base[2] << 8;
1786 value |= region->base[3];
1791 uint16_consume_fromregion(isc_region_t *region) {
1792 isc_uint16_t r = uint16_fromregion(region);
1794 isc_region_consume(region, 2);
1799 uint16_fromregion(isc_region_t *region) {
1801 REQUIRE(region->length >= 2);
1803 return ((region->base[0] << 8) | region->base[1]);
1807 uint8_fromregion(isc_region_t *region) {
1809 REQUIRE(region->length >= 1);
1811 return (region->base[0]);
1815 uint8_consume_fromregion(isc_region_t *region) {
1816 isc_uint8_t r = uint8_fromregion(region);
1818 isc_region_consume(region, 1);
1823 mem_tobuffer(isc_buffer_t *target, void *base, unsigned int length) {
1827 return (ISC_R_SUCCESS);
1829 isc_buffer_availableregion(target, &tr);
1830 if (length > tr.length)
1831 return (ISC_R_NOSPACE);
1832 if (tr.base != base)
1833 memmove(tr.base, base, length);
1834 isc_buffer_add(target, length);
1835 return (ISC_R_SUCCESS);
1839 hexvalue(char value) {
1843 c = (unsigned char)value;
1849 if ((s = strchr(hexdigits, c)) == NULL)
1851 return (int)(s - hexdigits);
1855 decvalue(char value) {
1859 * isascii() is valid for full range of int values, no need to
1862 if (!isascii(value))
1864 if ((s = strchr(decdigits, value)) == NULL)
1866 return (int)(s - decdigits);
1869 static const char atob_digits[86] =
1870 "!\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`" \
1871 "abcdefghijklmnopqrstu";
1873 * Subroutines to convert between 8 bit binary bytes and printable ASCII.
1874 * Computes the number of bytes, and three kinds of simple checksums.
1875 * Incoming bytes are collected into 32-bit words, then printed in base 85:
1876 * exp(85,5) > exp(2,32)
1877 * The ASCII characters used are between '!' and 'u';
1878 * 'z' encodes 32-bit zero; 'x' is used to mark the end of encoded data.
1880 * Originally by Paul Rutter (philabs!per) and Joe Orost (petsd!joe) for
1881 * the atob/btoa programs, released with the compress program, in mod.sources.
1882 * Modified by Mike Schwartz 8/19/86 for use in BIND.
1883 * Modified to be re-entrant 3/2/99.
1895 #define Ceor state->Ceor
1896 #define Csum state->Csum
1897 #define Crot state->Crot
1898 #define word state->word
1899 #define bcount state->bcount
1901 #define times85(x) ((((((x<<2)+x)<<2)+x)<<2)+x)
1903 static isc_result_t byte_atob(int c, isc_buffer_t *target,
1904 struct state *state);
1905 static isc_result_t putbyte(int c, isc_buffer_t *, struct state *state);
1906 static isc_result_t byte_btoa(int c, isc_buffer_t *, struct state *state);
1909 * Decode ASCII-encoded byte c into binary representation and
1910 * place into *bufp, advancing bufp.
1913 byte_atob(int c, isc_buffer_t *target, struct state *state) {
1917 return(DNS_R_SYNTAX);
1919 RETERR(putbyte(0, target, state));
1920 RETERR(putbyte(0, target, state));
1921 RETERR(putbyte(0, target, state));
1922 RETERR(putbyte(0, target, state));
1924 } else if ((s = strchr(atob_digits, c)) != NULL) {
1926 word = (isc_int32_t)(s - atob_digits);
1928 } else if (bcount < 4) {
1929 word = times85(word);
1930 word += (isc_int32_t)(s - atob_digits);
1933 word = times85(word);
1934 word += (isc_int32_t)(s - atob_digits);
1935 RETERR(putbyte((word >> 24) & 0xff, target, state));
1936 RETERR(putbyte((word >> 16) & 0xff, target, state));
1937 RETERR(putbyte((word >> 8) & 0xff, target, state));
1938 RETERR(putbyte(word & 0xff, target, state));
1943 return(DNS_R_SYNTAX);
1944 return(ISC_R_SUCCESS);
1948 * Compute checksum info and place c into target.
1951 putbyte(int c, isc_buffer_t *target, struct state *state) {
1957 if ((Crot & 0x80000000)) {
1964 isc_buffer_availableregion(target, &tr);
1966 return (ISC_R_NOSPACE);
1968 isc_buffer_add(target, 1);
1969 return (ISC_R_SUCCESS);
1973 * Read the ASCII-encoded data from inbuf, of length inbuflen, and convert
1974 * it into T_UNSPEC (binary data) in outbuf, not to exceed outbuflen bytes;
1975 * outbuflen must be divisible by 4. (Note: this is because outbuf is filled
1976 * in 4 bytes at a time. If the actual data doesn't end on an even 4-byte
1977 * boundary, there will be no problem...it will be padded with 0 bytes, and
1978 * numbytes will indicate the correct number of bytes. The main point is
1979 * that since the buffer is filled in 4 bytes at a time, even if there is
1980 * not a full 4 bytes of data at the end, there has to be room to 0-pad the
1981 * data, so the buffer must be of size divisible by 4). Place the number of
1982 * output bytes in numbytes, and return a failure/success status.
1986 atob_tobuffer(isc_lex_t *lexer, isc_buffer_t *target) {
1987 long oeor, osum, orot;
1988 struct state statebuf, *state= &statebuf;
1993 Ceor = Csum = Crot = word = bcount = 0;
1995 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
1997 while (token.value.as_textregion.length != 0) {
1998 if ((c = token.value.as_textregion.base[0]) == 'x') {
2001 RETERR(byte_atob(c, target, state));
2002 isc_textregion_consume(&token.value.as_textregion, 1);
2008 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
2010 if ((token.value.as_ulong % 4) != 0U) {
2011 unsigned long padding = 4 - (token.value.as_ulong % 4);
2012 if (isc_buffer_usedlength(target) < padding)
2013 return (DNS_R_SYNTAX);
2014 isc_buffer_subtract(target, padding);
2020 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
2022 oeor = strtol(DNS_AS_STR(token), &e, 16);
2024 return (DNS_R_SYNTAX);
2029 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
2031 osum = strtol(DNS_AS_STR(token), &e, 16);
2033 return (DNS_R_SYNTAX);
2038 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
2040 orot = strtol(DNS_AS_STR(token), &e, 16);
2042 return (DNS_R_SYNTAX);
2044 if ((oeor != Ceor) || (osum != Csum) || (orot != Crot))
2045 return(DNS_R_BADCKSUM);
2046 return (ISC_R_SUCCESS);
2050 * Encode binary byte c into ASCII representation and place into *bufp,
2054 byte_btoa(int c, isc_buffer_t *target, struct state *state) {
2057 isc_buffer_availableregion(target, &tr);
2061 if ((Crot & 0x80000000)) {
2074 return (ISC_R_NOSPACE);
2076 isc_buffer_add(target, 1);
2078 register int tmp = 0;
2079 register isc_int32_t tmpword = word;
2083 * Because some don't support u_long.
2086 tmpword -= (isc_int32_t)(85 * 85 * 85 * 85 * 32);
2090 tmpword -= (isc_int32_t)(85 * 85 * 85 * 85 * 32);
2093 return (ISC_R_NOSPACE);
2094 tr.base[0] = atob_digits[(tmpword /
2095 (isc_int32_t)(85 * 85 * 85 * 85))
2097 tmpword %= (isc_int32_t)(85 * 85 * 85 * 85);
2098 tr.base[1] = atob_digits[tmpword / (85 * 85 * 85)];
2099 tmpword %= (85 * 85 * 85);
2100 tr.base[2] = atob_digits[tmpword / (85 * 85)];
2101 tmpword %= (85 * 85);
2102 tr.base[3] = atob_digits[tmpword / 85];
2104 tr.base[4] = atob_digits[tmpword];
2105 isc_buffer_add(target, 5);
2111 return (ISC_R_SUCCESS);
2116 * Encode the binary data from inbuf, of length inbuflen, into a
2117 * target. Return success/failure status
2120 btoa_totext(unsigned char *inbuf, int inbuflen, isc_buffer_t *target) {
2122 struct state statebuf, *state = &statebuf;
2123 char buf[sizeof("x 2000000000 ffffffff ffffffff ffffffff")];
2125 Ceor = Csum = Crot = word = bcount = 0;
2126 for (inc = 0; inc < inbuflen; inbuf++, inc++)
2127 RETERR(byte_btoa(*inbuf, target, state));
2130 RETERR(byte_btoa(0, target, state));
2133 * Put byte count and checksum information at end of buffer,
2136 snprintf(buf, sizeof(buf), "x %d %x %x %x", inbuflen, Ceor, Csum, Crot);
2137 return (str_totext(buf, target));
2142 default_fromtext_callback(dns_rdatacallbacks_t *callbacks, const char *fmt,
2150 vfprintf(stderr, fmt, ap);
2152 fprintf(stderr, "\n");
2156 fromtext_warneof(isc_lex_t *lexer, dns_rdatacallbacks_t *callbacks) {
2157 if (isc_lex_isfile(lexer) && callbacks != NULL) {
2158 const char *name = isc_lex_getsourcename(lexer);
2161 (*callbacks->warn)(callbacks,
2162 "%s:%lu: file does not end with newline",
2163 name, isc_lex_getsourceline(lexer));
2168 warn_badmx(isc_token_t *token, isc_lex_t *lexer,
2169 dns_rdatacallbacks_t *callbacks)
2174 if (lexer != NULL) {
2175 file = isc_lex_getsourcename(lexer);
2176 line = isc_lex_getsourceline(lexer);
2177 (*callbacks->warn)(callbacks, "%s:%u: warning: '%s': %s",
2178 file, line, DNS_AS_STR(*token),
2179 dns_result_totext(DNS_R_MXISADDRESS));
2184 warn_badname(dns_name_t *name, isc_lex_t *lexer,
2185 dns_rdatacallbacks_t *callbacks)
2189 char namebuf[DNS_NAME_FORMATSIZE];
2191 if (lexer != NULL) {
2192 file = isc_lex_getsourcename(lexer);
2193 line = isc_lex_getsourceline(lexer);
2194 dns_name_format(name, namebuf, sizeof(namebuf));
2195 (*callbacks->warn)(callbacks, "%s:%u: warning: %s: %s",
2196 file, line, namebuf,
2197 dns_result_totext(DNS_R_BADNAME));
2202 fromtext_error(void (*callback)(dns_rdatacallbacks_t *, const char *, ...),
2203 dns_rdatacallbacks_t *callbacks, const char *name,
2204 unsigned long line, isc_token_t *token, isc_result_t result)
2209 if (token != NULL) {
2210 switch (token->type) {
2211 case isc_tokentype_eol:
2212 (*callback)(callbacks, "%s: %s:%lu: near eol: %s",
2213 "dns_rdata_fromtext", name, line,
2214 dns_result_totext(result));
2216 case isc_tokentype_eof:
2217 (*callback)(callbacks, "%s: %s:%lu: near eof: %s",
2218 "dns_rdata_fromtext", name, line,
2219 dns_result_totext(result));
2221 case isc_tokentype_number:
2222 (*callback)(callbacks, "%s: %s:%lu: near %lu: %s",
2223 "dns_rdata_fromtext", name, line,
2224 token->value.as_ulong,
2225 dns_result_totext(result));
2227 case isc_tokentype_string:
2228 case isc_tokentype_qstring:
2229 (*callback)(callbacks, "%s: %s:%lu: near '%s': %s",
2230 "dns_rdata_fromtext", name, line,
2232 dns_result_totext(result));
2235 (*callback)(callbacks, "%s: %s:%lu: %s",
2236 "dns_rdata_fromtext", name, line,
2237 dns_result_totext(result));
2241 (*callback)(callbacks, "dns_rdata_fromtext: %s:%lu: %s",
2242 name, line, dns_result_totext(result));
2247 dns_rdata_covers(dns_rdata_t *rdata) {
2248 if (rdata->type == 46)
2249 return (covers_rrsig(rdata));
2250 return (covers_sig(rdata));
2254 dns_rdatatype_ismeta(dns_rdatatype_t type) {
2255 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_META) != 0)
2261 dns_rdatatype_issingleton(dns_rdatatype_t type) {
2262 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_SINGLETON)
2269 dns_rdatatype_notquestion(dns_rdatatype_t type) {
2270 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_NOTQUESTION)
2277 dns_rdatatype_questiononly(dns_rdatatype_t type) {
2278 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_QUESTIONONLY)
2285 dns_rdatatype_atparent(dns_rdatatype_t type) {
2286 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_ATPARENT) != 0)
2292 dns_rdataclass_ismeta(dns_rdataclass_t rdclass) {
2294 if (rdclass == dns_rdataclass_reserved0
2295 || rdclass == dns_rdataclass_none
2296 || rdclass == dns_rdataclass_any)
2299 return (ISC_FALSE); /* Assume it is not a meta class. */
2303 dns_rdatatype_isdnssec(dns_rdatatype_t type) {
2304 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_DNSSEC) != 0)
2310 dns_rdatatype_iszonecutauth(dns_rdatatype_t type) {
2311 if ((dns_rdatatype_attributes(type)
2312 & (DNS_RDATATYPEATTR_DNSSEC | DNS_RDATATYPEATTR_ZONECUTAUTH))
2319 dns_rdatatype_isknown(dns_rdatatype_t type) {
2320 if ((dns_rdatatype_attributes(type) & DNS_RDATATYPEATTR_UNKNOWN)
2327 dns_rdata_exists(dns_rdata_t *rdata, dns_rdatatype_t type) {
2329 REQUIRE(rdata != NULL);
2330 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
2334 rdata->flags = DNS_RDATA_UPDATE;
2336 rdata->rdclass = dns_rdataclass_any;
2340 dns_rdata_notexist(dns_rdata_t *rdata, dns_rdatatype_t type) {
2342 REQUIRE(rdata != NULL);
2343 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
2347 rdata->flags = DNS_RDATA_UPDATE;
2349 rdata->rdclass = dns_rdataclass_none;
2353 dns_rdata_deleterrset(dns_rdata_t *rdata, dns_rdatatype_t type) {
2355 REQUIRE(rdata != NULL);
2356 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
2360 rdata->flags = DNS_RDATA_UPDATE;
2362 rdata->rdclass = dns_rdataclass_any;
2366 dns_rdata_makedelete(dns_rdata_t *rdata) {
2367 REQUIRE(rdata != NULL);
2369 rdata->rdclass = dns_rdataclass_none;
2373 dns_rdata_updateop(dns_rdata_t *rdata, dns_section_t section) {
2375 REQUIRE(rdata != NULL);
2376 REQUIRE(DNS_RDATA_INITIALIZED(rdata));
2379 case DNS_SECTION_PREREQUISITE:
2380 switch (rdata->rdclass) {
2381 case dns_rdataclass_none:
2382 switch (rdata->type) {
2383 case dns_rdatatype_any:
2384 return ("domain doesn't exist");
2386 return ("rrset doesn't exist");
2388 case dns_rdataclass_any:
2389 switch (rdata->type) {
2390 case dns_rdatatype_any:
2391 return ("domain exists");
2393 return ("rrset exists (value independent)");
2396 return ("rrset exists (value dependent)");
2398 case DNS_SECTION_UPDATE:
2399 switch (rdata->rdclass) {
2400 case dns_rdataclass_none:
2402 case dns_rdataclass_any:
2403 switch (rdata->type) {
2404 case dns_rdatatype_any:
2405 return ("delete all rrsets");
2407 return ("delete rrset");