2 * Copyright (C) 2004, 2007, 2009, 2011, 2012, 2014, 2015 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 1999-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
21 * Reviewed: Thu Mar 16 17:35:30 PST 2000 by halley.
24 /* draft-ietf-dnsext-tkey-01.txt */
26 #ifndef RDATA_GENERIC_TKEY_249_C
27 #define RDATA_GENERIC_TKEY_249_C
29 #define RRTYPE_TKEY_ATTRIBUTES (DNS_RDATATYPEATTR_META)
31 static inline isc_result_t
32 fromtext_tkey(ARGS_FROMTEXT) {
40 REQUIRE(type == dns_rdatatype_tkey);
49 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
51 dns_name_init(&name, NULL);
52 buffer_fromregion(&buffer, &token.value.as_region);
54 origin = dns_rootname;
55 RETTOK(dns_name_fromtext(&name, &buffer, origin, options, target));
61 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
63 RETERR(uint32_tobuffer(token.value.as_ulong, target));
68 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
70 RETERR(uint32_tobuffer(token.value.as_ulong, target));
75 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
77 if (token.value.as_ulong > 0xffffU)
79 RETERR(uint16_tobuffer(token.value.as_ulong, target));
84 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
86 if (dns_tsigrcode_fromtext(&rcode, &token.value.as_textregion)
89 i = strtol(DNS_AS_STR(token), &e, 10);
91 RETTOK(DNS_R_UNKNOWN);
92 if (i < 0 || i > 0xffff)
94 rcode = (dns_rcode_t)i;
96 RETERR(uint16_tobuffer(rcode, target));
101 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
103 if (token.value.as_ulong > 0xffffU)
105 RETERR(uint16_tobuffer(token.value.as_ulong, target));
110 RETERR(isc_base64_tobuffer(lexer, target, (int)token.value.as_ulong));
115 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
117 if (token.value.as_ulong > 0xffffU)
119 RETERR(uint16_tobuffer(token.value.as_ulong, target));
124 return (isc_base64_tobuffer(lexer, target, (int)token.value.as_ulong));
127 static inline isc_result_t
128 totext_tkey(ARGS_TOTEXT) {
130 char buf[sizeof("4294967295 ")];
136 REQUIRE(rdata->type == dns_rdatatype_tkey);
137 REQUIRE(rdata->length != 0);
139 dns_rdata_toregion(rdata, &sr);
144 dns_name_init(&name, NULL);
145 dns_name_init(&prefix, NULL);
146 dns_name_fromregion(&name, &sr);
147 sub = name_prefix(&name, tctx->origin, &prefix);
148 RETERR(dns_name_totext(&prefix, sub, target));
149 RETERR(str_totext(" ", target));
150 isc_region_consume(&sr, name_length(&name));
155 n = uint32_fromregion(&sr);
156 isc_region_consume(&sr, 4);
157 sprintf(buf, "%lu ", n);
158 RETERR(str_totext(buf, target));
163 n = uint32_fromregion(&sr);
164 isc_region_consume(&sr, 4);
165 sprintf(buf, "%lu ", n);
166 RETERR(str_totext(buf, target));
171 n = uint16_fromregion(&sr);
172 isc_region_consume(&sr, 2);
173 sprintf(buf, "%lu ", n);
174 RETERR(str_totext(buf, target));
179 n = uint16_fromregion(&sr);
180 isc_region_consume(&sr, 2);
181 if (dns_tsigrcode_totext((dns_rcode_t)n, target) == ISC_R_SUCCESS)
182 RETERR(str_totext(" ", target));
184 sprintf(buf, "%lu ", n);
185 RETERR(str_totext(buf, target));
191 n = uint16_fromregion(&sr);
192 isc_region_consume(&sr, 2);
193 sprintf(buf, "%lu", n);
194 RETERR(str_totext(buf, target));
199 REQUIRE(n <= sr.length);
202 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
203 RETERR(str_totext(" (", target));
204 RETERR(str_totext(tctx->linebreak, target));
205 if (tctx->width == 0) /* No splitting */
206 RETERR(isc_base64_totext(&dr, 60, "", target));
208 RETERR(isc_base64_totext(&dr, tctx->width - 2,
209 tctx->linebreak, target));
210 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
211 RETERR(str_totext(" ) ", target));
213 RETERR(str_totext(" ", target));
214 isc_region_consume(&sr, n);
219 n = uint16_fromregion(&sr);
220 isc_region_consume(&sr, 2);
221 sprintf(buf, "%lu", n);
222 RETERR(str_totext(buf, target));
227 REQUIRE(n <= sr.length);
231 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
232 RETERR(str_totext(" (", target));
233 RETERR(str_totext(tctx->linebreak, target));
234 if (tctx->width == 0) /* No splitting */
235 RETERR(isc_base64_totext(&dr, 60, "", target));
237 RETERR(isc_base64_totext(&dr, tctx->width - 2,
238 tctx->linebreak, target));
239 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
240 RETERR(str_totext(" )", target));
242 return (ISC_R_SUCCESS);
245 static inline isc_result_t
246 fromwire_tkey(ARGS_FROMWIRE) {
251 REQUIRE(type == dns_rdatatype_tkey);
256 dns_decompress_setmethods(dctx, DNS_COMPRESS_NONE);
261 dns_name_init(&name, NULL);
262 RETERR(dns_name_fromwire(&name, source, dctx, options, target));
270 isc_buffer_activeregion(source, &sr);
272 return (ISC_R_UNEXPECTEDEND);
273 RETERR(mem_tobuffer(target, sr.base, 12));
274 isc_region_consume(&sr, 12);
275 isc_buffer_forward(source, 12);
278 * Key Length + Key Data.
281 return (ISC_R_UNEXPECTEDEND);
282 n = uint16_fromregion(&sr);
283 if (sr.length < n + 2)
284 return (ISC_R_UNEXPECTEDEND);
285 RETERR(mem_tobuffer(target, sr.base, n + 2));
286 isc_region_consume(&sr, n + 2);
287 isc_buffer_forward(source, n + 2);
290 * Other Length + Other Data.
293 return (ISC_R_UNEXPECTEDEND);
294 n = uint16_fromregion(&sr);
295 if (sr.length < n + 2)
296 return (ISC_R_UNEXPECTEDEND);
297 isc_buffer_forward(source, n + 2);
298 return (mem_tobuffer(target, sr.base, n + 2));
301 static inline isc_result_t
302 towire_tkey(ARGS_TOWIRE) {
305 dns_offsets_t offsets;
307 REQUIRE(rdata->type == dns_rdatatype_tkey);
308 REQUIRE(rdata->length != 0);
310 dns_compress_setmethods(cctx, DNS_COMPRESS_NONE);
314 dns_rdata_toregion(rdata, &sr);
315 dns_name_init(&name, offsets);
316 dns_name_fromregion(&name, &sr);
317 RETERR(dns_name_towire(&name, cctx, target));
318 isc_region_consume(&sr, name_length(&name));
320 return (mem_tobuffer(target, sr.base, sr.length));
324 compare_tkey(ARGS_COMPARE) {
331 REQUIRE(rdata1->type == rdata2->type);
332 REQUIRE(rdata1->rdclass == rdata2->rdclass);
333 REQUIRE(rdata1->type == dns_rdatatype_tkey);
334 REQUIRE(rdata1->length != 0);
335 REQUIRE(rdata2->length != 0);
340 dns_rdata_toregion(rdata1, &r1);
341 dns_rdata_toregion(rdata2, &r2);
342 dns_name_init(&name1, NULL);
343 dns_name_init(&name2, NULL);
344 dns_name_fromregion(&name1, &r1);
345 dns_name_fromregion(&name2, &r2);
346 if ((order = dns_name_rdatacompare(&name1, &name2)) != 0)
348 isc_region_consume(&r1, name_length(&name1));
349 isc_region_consume(&r2, name_length(&name2));
350 return (isc_region_compare(&r1, &r2));
353 static inline isc_result_t
354 fromstruct_tkey(ARGS_FROMSTRUCT) {
355 dns_rdata_tkey_t *tkey = source;
357 REQUIRE(type == dns_rdatatype_tkey);
358 REQUIRE(source != NULL);
359 REQUIRE(tkey->common.rdtype == type);
360 REQUIRE(tkey->common.rdclass == rdclass);
368 RETERR(name_tobuffer(&tkey->algorithm, target));
371 * Inception: 32 bits.
373 RETERR(uint32_tobuffer(tkey->inception, target));
378 RETERR(uint32_tobuffer(tkey->expire, target));
383 RETERR(uint16_tobuffer(tkey->mode, target));
388 RETERR(uint16_tobuffer(tkey->error, target));
393 RETERR(uint16_tobuffer(tkey->keylen, target));
398 RETERR(mem_tobuffer(target, tkey->key, tkey->keylen));
401 * Other size: 16 bits.
403 RETERR(uint16_tobuffer(tkey->otherlen, target));
408 return (mem_tobuffer(target, tkey->other, tkey->otherlen));
411 static inline isc_result_t
412 tostruct_tkey(ARGS_TOSTRUCT) {
413 dns_rdata_tkey_t *tkey = target;
417 REQUIRE(rdata->type == dns_rdatatype_tkey);
418 REQUIRE(target != NULL);
419 REQUIRE(rdata->length != 0);
421 tkey->common.rdclass = rdata->rdclass;
422 tkey->common.rdtype = rdata->type;
423 ISC_LINK_INIT(&tkey->common, link);
425 dns_rdata_toregion(rdata, &sr);
430 dns_name_init(&alg, NULL);
431 dns_name_fromregion(&alg, &sr);
432 dns_name_init(&tkey->algorithm, NULL);
433 RETERR(name_duporclone(&alg, mctx, &tkey->algorithm));
434 isc_region_consume(&sr, name_length(&tkey->algorithm));
439 tkey->inception = uint32_fromregion(&sr);
440 isc_region_consume(&sr, 4);
445 tkey->expire = uint32_fromregion(&sr);
446 isc_region_consume(&sr, 4);
451 tkey->mode = uint16_fromregion(&sr);
452 isc_region_consume(&sr, 2);
457 tkey->error = uint16_fromregion(&sr);
458 isc_region_consume(&sr, 2);
463 tkey->keylen = uint16_fromregion(&sr);
464 isc_region_consume(&sr, 2);
469 INSIST(tkey->keylen + 2U <= sr.length);
470 tkey->key = mem_maybedup(mctx, sr.base, tkey->keylen);
471 if (tkey->key == NULL)
473 isc_region_consume(&sr, tkey->keylen);
478 tkey->otherlen = uint16_fromregion(&sr);
479 isc_region_consume(&sr, 2);
484 INSIST(tkey->otherlen <= sr.length);
485 tkey->other = mem_maybedup(mctx, sr.base, tkey->otherlen);
486 if (tkey->other == NULL)
490 return (ISC_R_SUCCESS);
494 dns_name_free(&tkey->algorithm, mctx);
495 if (mctx != NULL && tkey->key != NULL)
496 isc_mem_free(mctx, tkey->key);
497 return (ISC_R_NOMEMORY);
501 freestruct_tkey(ARGS_FREESTRUCT) {
502 dns_rdata_tkey_t *tkey = (dns_rdata_tkey_t *) source;
504 REQUIRE(source != NULL);
506 if (tkey->mctx == NULL)
509 dns_name_free(&tkey->algorithm, tkey->mctx);
510 if (tkey->key != NULL)
511 isc_mem_free(tkey->mctx, tkey->key);
512 if (tkey->other != NULL)
513 isc_mem_free(tkey->mctx, tkey->other);
517 static inline isc_result_t
518 additionaldata_tkey(ARGS_ADDLDATA) {
523 REQUIRE(rdata->type == dns_rdatatype_tkey);
525 return (ISC_R_SUCCESS);
528 static inline isc_result_t
529 digest_tkey(ARGS_DIGEST) {
534 REQUIRE(rdata->type == dns_rdatatype_tkey);
536 return (ISC_R_NOTIMPLEMENTED);
539 static inline isc_boolean_t
540 checkowner_tkey(ARGS_CHECKOWNER) {
542 REQUIRE(type == dns_rdatatype_tkey);
552 static inline isc_boolean_t
553 checknames_tkey(ARGS_CHECKNAMES) {
555 REQUIRE(rdata->type == dns_rdatatype_tkey);
564 static inline isc_result_t
565 casecompare_tkey(ARGS_COMPARE) {
566 return (compare_tkey(rdata1, rdata2));
568 #endif /* RDATA_GENERIC_TKEY_249_C */