/* $NetBSD: caa_257.c,v 1.1.4.2 2024/02/29 11:38:50 martin Exp $ */ /* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * SPDX-License-Identifier: MPL-2.0 * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef GENERIC_CAA_257_C #define GENERIC_CAA_257_C 1 #define RRTYPE_CAA_ATTRIBUTES (0) static unsigned char const alphanumeric[256] = { /* 0x00-0x0f */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x10-0x1f */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x20-0x2f */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x30-0x3f */ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, /* 0x40-0x4f */ 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, /* 0x50-0x5f */ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, /* 0x60-0x6f */ 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, /* 0x70-0x7f */ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, /* 0x80-0x8f */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x90-0x9f */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xa0-0xaf */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xb0-0xbf */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xc0-0xcf */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xd0-0xdf */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xe0-0xef */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xf0-0xff */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, }; static isc_result_t fromtext_caa(ARGS_FROMTEXT) { isc_token_t token; isc_textregion_t tr; uint8_t flags; unsigned int i; REQUIRE(type == dns_rdatatype_caa); UNUSED(type); UNUSED(rdclass); UNUSED(origin); UNUSED(options); UNUSED(callbacks); /* Flags. */ RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number, false)); if (token.value.as_ulong > 255U) { RETTOK(ISC_R_RANGE); } flags = (uint8_t)(token.value.as_ulong & 255U); RETERR(uint8_tobuffer(flags, target)); /* * Tag */ RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string, false)); tr = token.value.as_textregion; for (i = 0; i < tr.length; i++) { if (!alphanumeric[(unsigned char)tr.base[i]]) { RETTOK(DNS_R_SYNTAX); } } RETERR(uint8_tobuffer(tr.length, target)); RETERR(mem_tobuffer(target, tr.base, tr.length)); /* * Value */ RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_qstring, false)); if (token.type != isc_tokentype_qstring && token.type != isc_tokentype_string) { RETERR(DNS_R_SYNTAX); } RETERR(multitxt_fromtext(&token.value.as_textregion, target)); return (ISC_R_SUCCESS); } static isc_result_t totext_caa(ARGS_TOTEXT) { isc_region_t region; uint8_t flags; char buf[256]; UNUSED(tctx); REQUIRE(rdata->type == dns_rdatatype_caa); REQUIRE(rdata->length >= 3U); REQUIRE(rdata->data != NULL); dns_rdata_toregion(rdata, ®ion); /* * Flags */ flags = uint8_consume_fromregion(®ion); snprintf(buf, sizeof(buf), "%u ", flags); RETERR(str_totext(buf, target)); /* * Tag */ RETERR(txt_totext(®ion, false, target)); RETERR(str_totext(" ", target)); /* * Value */ RETERR(multitxt_totext(®ion, target)); return (ISC_R_SUCCESS); } static isc_result_t fromwire_caa(ARGS_FROMWIRE) { isc_region_t sr; unsigned int len, i; REQUIRE(type == dns_rdatatype_caa); UNUSED(type); UNUSED(rdclass); UNUSED(dctx); UNUSED(options); /* * Flags */ isc_buffer_activeregion(source, &sr); if (sr.length < 2) { return (ISC_R_UNEXPECTEDEND); } /* * Flags, tag length */ RETERR(mem_tobuffer(target, sr.base, 2)); len = sr.base[1]; isc_region_consume(&sr, 2); isc_buffer_forward(source, 2); /* * Zero length tag fields are illegal. */ if (sr.length < len || len == 0) { RETERR(DNS_R_FORMERR); } /* Check the Tag's value */ for (i = 0; i < len; i++) { if (!alphanumeric[sr.base[i]]) { RETERR(DNS_R_FORMERR); /* * Tag + Value */ } } /* * Tag + Value */ isc_buffer_forward(source, sr.length); return (mem_tobuffer(target, sr.base, sr.length)); } static isc_result_t towire_caa(ARGS_TOWIRE) { isc_region_t region; REQUIRE(rdata->type == dns_rdatatype_caa); REQUIRE(rdata->length >= 3U); REQUIRE(rdata->data != NULL); UNUSED(cctx); dns_rdata_toregion(rdata, ®ion); return (mem_tobuffer(target, region.base, region.length)); } static int compare_caa(ARGS_COMPARE) { isc_region_t r1, r2; REQUIRE(rdata1->type == rdata2->type); REQUIRE(rdata1->rdclass == rdata2->rdclass); REQUIRE(rdata1->type == dns_rdatatype_caa); REQUIRE(rdata1->length >= 3U); REQUIRE(rdata2->length >= 3U); REQUIRE(rdata1->data != NULL); REQUIRE(rdata2->data != NULL); dns_rdata_toregion(rdata1, &r1); dns_rdata_toregion(rdata2, &r2); return (isc_region_compare(&r1, &r2)); } static isc_result_t fromstruct_caa(ARGS_FROMSTRUCT) { dns_rdata_caa_t *caa = source; isc_region_t region; unsigned int i; REQUIRE(type == dns_rdatatype_caa); REQUIRE(caa != NULL); REQUIRE(caa->common.rdtype == type); REQUIRE(caa->common.rdclass == rdclass); REQUIRE(caa->tag != NULL && caa->tag_len != 0); REQUIRE(caa->value != NULL); UNUSED(type); UNUSED(rdclass); /* * Flags */ RETERR(uint8_tobuffer(caa->flags, target)); /* * Tag length */ RETERR(uint8_tobuffer(caa->tag_len, target)); /* * Tag */ region.base = caa->tag; region.length = caa->tag_len; for (i = 0; i < region.length; i++) { if (!alphanumeric[region.base[i]]) { RETERR(DNS_R_SYNTAX); } } RETERR(isc_buffer_copyregion(target, ®ion)); /* * Value */ region.base = caa->value; region.length = caa->value_len; return (isc_buffer_copyregion(target, ®ion)); } static isc_result_t tostruct_caa(ARGS_TOSTRUCT) { dns_rdata_caa_t *caa = target; isc_region_t sr; REQUIRE(rdata->type == dns_rdatatype_caa); REQUIRE(caa != NULL); REQUIRE(rdata->length >= 3U); REQUIRE(rdata->data != NULL); caa->common.rdclass = rdata->rdclass; caa->common.rdtype = rdata->type; ISC_LINK_INIT(&caa->common, link); dns_rdata_toregion(rdata, &sr); /* * Flags */ if (sr.length < 1) { return (ISC_R_UNEXPECTEDEND); } caa->flags = uint8_fromregion(&sr); isc_region_consume(&sr, 1); /* * Tag length */ if (sr.length < 1) { return (ISC_R_UNEXPECTEDEND); } caa->tag_len = uint8_fromregion(&sr); isc_region_consume(&sr, 1); /* * Tag */ if (sr.length < caa->tag_len) { return (ISC_R_UNEXPECTEDEND); } caa->tag = mem_maybedup(mctx, sr.base, caa->tag_len); if (caa->tag == NULL) { return (ISC_R_NOMEMORY); } isc_region_consume(&sr, caa->tag_len); /* * Value */ caa->value_len = sr.length; caa->value = mem_maybedup(mctx, sr.base, sr.length); if (caa->value == NULL) { return (ISC_R_NOMEMORY); } caa->mctx = mctx; return (ISC_R_SUCCESS); } static void freestruct_caa(ARGS_FREESTRUCT) { dns_rdata_caa_t *caa = (dns_rdata_caa_t *)source; REQUIRE(caa != NULL); REQUIRE(caa->common.rdtype == dns_rdatatype_caa); if (caa->mctx == NULL) { return; } if (caa->tag != NULL) { isc_mem_free(caa->mctx, caa->tag); } if (caa->value != NULL) { isc_mem_free(caa->mctx, caa->value); } caa->mctx = NULL; } static isc_result_t additionaldata_caa(ARGS_ADDLDATA) { REQUIRE(rdata->type == dns_rdatatype_caa); REQUIRE(rdata->data != NULL); REQUIRE(rdata->length >= 3U); UNUSED(rdata); UNUSED(add); UNUSED(arg); return (ISC_R_SUCCESS); } static isc_result_t digest_caa(ARGS_DIGEST) { isc_region_t r; REQUIRE(rdata->type == dns_rdatatype_caa); REQUIRE(rdata->data != NULL); REQUIRE(rdata->length >= 3U); dns_rdata_toregion(rdata, &r); return ((digest)(arg, &r)); } static bool checkowner_caa(ARGS_CHECKOWNER) { REQUIRE(type == dns_rdatatype_caa); UNUSED(name); UNUSED(type); UNUSED(rdclass); UNUSED(wildcard); return (true); } static bool checknames_caa(ARGS_CHECKNAMES) { REQUIRE(rdata->type == dns_rdatatype_caa); REQUIRE(rdata->data != NULL); REQUIRE(rdata->length >= 3U); UNUSED(rdata); UNUSED(owner); UNUSED(bad); return (true); } static int casecompare_caa(ARGS_COMPARE) { return (compare_caa(rdata1, rdata2)); } #endif /* GENERIC_CAA_257_C */