/* $NetBSD: wks_11.c,v 1.11 2025/01/26 16:25:35 christos Exp $ */ /* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * SPDX-License-Identifier: MPL-2.0 * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef RDATA_IN_1_WKS_11_C #define RDATA_IN_1_WKS_11_C #include #include #include #include #include #define RRTYPE_WKS_ATTRIBUTES (0) static isc_mutex_t wks_lock; static void init_lock(void) { isc_mutex_init(&wks_lock); } static bool mygetprotobyname(const char *name, long *proto) { struct protoent *pe; LOCK(&wks_lock); pe = getprotobyname(name); if (pe != NULL) { *proto = pe->p_proto; } UNLOCK(&wks_lock); return pe != NULL; } static bool mygetservbyname(const char *name, const char *proto, long *port) { struct servent *se; LOCK(&wks_lock); se = getservbyname(name, proto); if (se != NULL) { *port = ntohs(se->s_port); } UNLOCK(&wks_lock); return se != NULL; } static isc_result_t fromtext_in_wks(ARGS_FROMTEXT) { static isc_once_t once = ISC_ONCE_INIT; isc_token_t token; isc_region_t region; struct in_addr addr; char *e = NULL; long proto; unsigned char bm[8 * 1024]; /* 64k bits */ long port; long maxport = -1; const char *ps = NULL; unsigned int n; char service[32]; isc_result_t result; REQUIRE(type == dns_rdatatype_wks); REQUIRE(rdclass == dns_rdataclass_in); UNUSED(type); UNUSED(origin); UNUSED(options); UNUSED(rdclass); UNUSED(callbacks); isc_once_do(&once, init_lock); /* * IPv4 dotted quad. */ CHECK(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string, false)); isc_buffer_availableregion(target, ®ion); if (inet_pton(AF_INET, DNS_AS_STR(token), &addr) != 1) { CHECKTOK(DNS_R_BADDOTTEDQUAD); } if (region.length < 4) { return ISC_R_NOSPACE; } memmove(region.base, &addr, 4); isc_buffer_add(target, 4); /* * Protocol. */ CHECK(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string, false)); proto = strtol(DNS_AS_STR(token), &e, 10); if (*e != '\0' && !mygetprotobyname(DNS_AS_STR(token), &proto)) { CHECKTOK(DNS_R_UNKNOWNPROTO); } if (proto < 0 || proto > 0xff) { CHECKTOK(ISC_R_RANGE); } if (proto == IPPROTO_TCP) { ps = "tcp"; } else if (proto == IPPROTO_UDP) { ps = "udp"; } CHECK(uint8_tobuffer(proto, target)); memset(bm, 0, sizeof(bm)); do { CHECK(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string, true)); if (token.type != isc_tokentype_string) { break; } /* * Lowercase the service string as some getservbyname() are * case sensitive and the database is usually in lowercase. */ strlcpy(service, DNS_AS_STR(token), sizeof(service)); isc_ascii_strtolower(service); port = strtol(DNS_AS_STR(token), &e, 10); if (*e != 0 && !mygetservbyname(service, ps, &port) && !mygetservbyname(DNS_AS_STR(token), ps, &port)) { CHECKTOK(DNS_R_UNKNOWNSERVICE); } if (port < 0 || port > 0xffff) { CHECKTOK(ISC_R_RANGE); } if (port > maxport) { maxport = port; } bm[port / 8] |= (0x80 >> (port % 8)); } while (1); /* * Let upper layer handle eol/eof. */ isc_lex_ungettoken(lexer, &token); n = (maxport + 8) / 8; result = mem_tobuffer(target, bm, n); cleanup: return result; } static isc_result_t totext_in_wks(ARGS_TOTEXT) { isc_region_t sr; unsigned short proto; char buf[sizeof("65535")]; unsigned int i, j; UNUSED(tctx); REQUIRE(rdata->type == dns_rdatatype_wks); REQUIRE(rdata->rdclass == dns_rdataclass_in); REQUIRE(rdata->length >= 5); dns_rdata_toregion(rdata, &sr); RETERR(inet_totext(AF_INET, tctx->flags, &sr, target)); isc_region_consume(&sr, 4); proto = uint8_fromregion(&sr); snprintf(buf, sizeof(buf), "%u", proto); RETERR(str_totext(" ", target)); RETERR(str_totext(buf, target)); isc_region_consume(&sr, 1); INSIST(sr.length <= 8 * 1024); for (i = 0; i < sr.length; i++) { if (sr.base[i] != 0) { for (j = 0; j < 8; j++) { if ((sr.base[i] & (0x80 >> j)) != 0) { { snprintf(buf, sizeof(buf), "%u", i * 8 + j); RETERR(str_totext(" ", target)); RETERR(str_totext(buf, target)); } } } } } return ISC_R_SUCCESS; } static isc_result_t fromwire_in_wks(ARGS_FROMWIRE) { isc_region_t sr; isc_region_t tr; REQUIRE(type == dns_rdatatype_wks); REQUIRE(rdclass == dns_rdataclass_in); UNUSED(type); UNUSED(dctx); UNUSED(rdclass); isc_buffer_activeregion(source, &sr); isc_buffer_availableregion(target, &tr); if (sr.length < 5) { return ISC_R_UNEXPECTEDEND; } if (sr.length > 8 * 1024 + 5) { return DNS_R_EXTRADATA; } if (sr.length > 5 && sr.base[sr.length - 1] == 0) { return DNS_R_FORMERR; } if (tr.length < sr.length) { return ISC_R_NOSPACE; } memmove(tr.base, sr.base, sr.length); isc_buffer_add(target, sr.length); isc_buffer_forward(source, sr.length); return ISC_R_SUCCESS; } static isc_result_t towire_in_wks(ARGS_TOWIRE) { isc_region_t sr; UNUSED(cctx); REQUIRE(rdata->type == dns_rdatatype_wks); REQUIRE(rdata->rdclass == dns_rdataclass_in); REQUIRE(rdata->length != 0); dns_rdata_toregion(rdata, &sr); return mem_tobuffer(target, sr.base, sr.length); } static int compare_in_wks(ARGS_COMPARE) { isc_region_t r1; isc_region_t r2; REQUIRE(rdata1->type == rdata2->type); REQUIRE(rdata1->rdclass == rdata2->rdclass); REQUIRE(rdata1->type == dns_rdatatype_wks); REQUIRE(rdata1->rdclass == dns_rdataclass_in); REQUIRE(rdata1->length != 0); REQUIRE(rdata2->length != 0); dns_rdata_toregion(rdata1, &r1); dns_rdata_toregion(rdata2, &r2); return isc_region_compare(&r1, &r2); } static isc_result_t fromstruct_in_wks(ARGS_FROMSTRUCT) { dns_rdata_in_wks_t *wks = source; uint32_t a; REQUIRE(type == dns_rdatatype_wks); REQUIRE(rdclass == dns_rdataclass_in); REQUIRE(wks != NULL); REQUIRE(wks->common.rdtype == type); REQUIRE(wks->common.rdclass == rdclass); REQUIRE((wks->map != NULL && wks->map_len <= 8 * 1024) || wks->map_len == 0); UNUSED(type); UNUSED(rdclass); a = ntohl(wks->in_addr.s_addr); RETERR(uint32_tobuffer(a, target)); RETERR(uint8_tobuffer(wks->protocol, target)); return mem_tobuffer(target, wks->map, wks->map_len); } static isc_result_t tostruct_in_wks(ARGS_TOSTRUCT) { dns_rdata_in_wks_t *wks = target; uint32_t n; isc_region_t region; REQUIRE(wks != NULL); REQUIRE(rdata->type == dns_rdatatype_wks); REQUIRE(rdata->rdclass == dns_rdataclass_in); REQUIRE(rdata->length != 0); wks->common.rdclass = rdata->rdclass; wks->common.rdtype = rdata->type; ISC_LINK_INIT(&wks->common, link); dns_rdata_toregion(rdata, ®ion); n = uint32_fromregion(®ion); wks->in_addr.s_addr = htonl(n); isc_region_consume(®ion, 4); wks->protocol = uint8_fromregion(®ion); isc_region_consume(®ion, 1); wks->map_len = region.length; wks->map = mem_maybedup(mctx, region.base, region.length); wks->mctx = mctx; return ISC_R_SUCCESS; } static void freestruct_in_wks(ARGS_FREESTRUCT) { dns_rdata_in_wks_t *wks = source; REQUIRE(wks != NULL); REQUIRE(wks->common.rdtype == dns_rdatatype_wks); REQUIRE(wks->common.rdclass == dns_rdataclass_in); if (wks->mctx == NULL) { return; } if (wks->map != NULL) { isc_mem_free(wks->mctx, wks->map); } wks->mctx = NULL; } static isc_result_t additionaldata_in_wks(ARGS_ADDLDATA) { REQUIRE(rdata->type == dns_rdatatype_wks); REQUIRE(rdata->rdclass == dns_rdataclass_in); UNUSED(rdata); UNUSED(owner); UNUSED(add); UNUSED(arg); return ISC_R_SUCCESS; } static isc_result_t digest_in_wks(ARGS_DIGEST) { isc_region_t r; REQUIRE(rdata->type == dns_rdatatype_wks); REQUIRE(rdata->rdclass == dns_rdataclass_in); dns_rdata_toregion(rdata, &r); return (digest)(arg, &r); } static bool checkowner_in_wks(ARGS_CHECKOWNER) { REQUIRE(type == dns_rdatatype_wks); REQUIRE(rdclass == dns_rdataclass_in); UNUSED(type); UNUSED(rdclass); return dns_name_ishostname(name, wildcard); } static bool checknames_in_wks(ARGS_CHECKNAMES) { REQUIRE(rdata->type == dns_rdatatype_wks); REQUIRE(rdata->rdclass == dns_rdataclass_in); UNUSED(rdata); UNUSED(owner); UNUSED(bad); return true; } static int casecompare_in_wks(ARGS_COMPARE) { return compare_in_wks(rdata1, rdata2); } #endif /* RDATA_IN_1_WKS_11_C */