1 /* $NetBSD: cert_37.c,v 1.5 2014/12/10 04:37:58 christos Exp $ */
2
3 /*
4 * Copyright (C) 2004, 2005, 2007, 2009, 2011, 2012 Internet Systems Consortium, Inc. ("ISC")
5 * Copyright (C) 1999-2003 Internet Software Consortium.
6 *
7 * Permission to use, copy, modify, and/or distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
10 *
11 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
12 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
13 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
14 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
15 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
16 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17 * PERFORMANCE OF THIS SOFTWARE.
18 */
19
20 /* Id */
21
22 /* Reviewed: Wed Mar 15 21:14:32 EST 2000 by tale */
23
24 /* RFC2538 */
25
26 #ifndef RDATA_GENERIC_CERT_37_C
27 #define RDATA_GENERIC_CERT_37_C
28
29 #define RRTYPE_CERT_ATTRIBUTES (0)
30
31 static inline isc_result_t
fromtext_cert(ARGS_FROMTEXT)32 fromtext_cert(ARGS_FROMTEXT) {
33 isc_token_t token;
34 dns_secalg_t secalg;
35 dns_cert_t cert;
36
37 REQUIRE(type == 37);
38
39 UNUSED(type);
40 UNUSED(rdclass);
41 UNUSED(origin);
42 UNUSED(options);
43 UNUSED(callbacks);
44
45 /*
46 * Cert type.
47 */
48 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
49 ISC_FALSE));
50 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion));
51 RETERR(uint16_tobuffer(cert, target));
52
53 /*
54 * Key tag.
55 */
56 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
57 ISC_FALSE));
58 if (token.value.as_ulong > 0xffffU)
59 RETTOK(ISC_R_RANGE);
60 RETERR(uint16_tobuffer(token.value.as_ulong, target));
61
62 /*
63 * Algorithm.
64 */
65 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
66 ISC_FALSE));
67 RETTOK(dns_secalg_fromtext(&secalg, &token.value.as_textregion));
68 RETERR(mem_tobuffer(target, &secalg, 1));
69
70 return (isc_base64_tobuffer(lexer, target, -1));
71 }
72
73 static inline isc_result_t
totext_cert(ARGS_TOTEXT)74 totext_cert(ARGS_TOTEXT) {
75 isc_region_t sr;
76 char buf[sizeof("64000 ")];
77 unsigned int n;
78
79 REQUIRE(rdata->type == 37);
80 REQUIRE(rdata->length != 0);
81
82 UNUSED(tctx);
83
84 dns_rdata_toregion(rdata, &sr);
85
86 /*
87 * Type.
88 */
89 n = uint16_fromregion(&sr);
90 isc_region_consume(&sr, 2);
91 RETERR(dns_cert_totext((dns_cert_t)n, target));
92 RETERR(str_totext(" ", target));
93
94 /*
95 * Key tag.
96 */
97 n = uint16_fromregion(&sr);
98 isc_region_consume(&sr, 2);
99 sprintf(buf, "%u ", n);
100 RETERR(str_totext(buf, target));
101
102 /*
103 * Algorithm.
104 */
105 RETERR(dns_secalg_totext(sr.base[0], target));
106 isc_region_consume(&sr, 1);
107
108 /*
109 * Cert.
110 */
111 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
112 RETERR(str_totext(" (", target));
113 RETERR(str_totext(tctx->linebreak, target));
114 if (tctx->width == 0) /* No splitting */
115 RETERR(isc_base64_totext(&sr, 60, "", target));
116 else
117 RETERR(isc_base64_totext(&sr, tctx->width - 2,
118 tctx->linebreak, target));
119 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
120 RETERR(str_totext(" )", target));
121 return (ISC_R_SUCCESS);
122 }
123
124 static inline isc_result_t
fromwire_cert(ARGS_FROMWIRE)125 fromwire_cert(ARGS_FROMWIRE) {
126 isc_region_t sr;
127
128 REQUIRE(type == 37);
129
130 UNUSED(type);
131 UNUSED(rdclass);
132 UNUSED(dctx);
133 UNUSED(options);
134
135 isc_buffer_activeregion(source, &sr);
136 if (sr.length < 5)
137 return (ISC_R_UNEXPECTEDEND);
138
139 isc_buffer_forward(source, sr.length);
140 return (mem_tobuffer(target, sr.base, sr.length));
141 }
142
143 static inline isc_result_t
towire_cert(ARGS_TOWIRE)144 towire_cert(ARGS_TOWIRE) {
145 isc_region_t sr;
146
147 REQUIRE(rdata->type == 37);
148 REQUIRE(rdata->length != 0);
149
150 UNUSED(cctx);
151
152 dns_rdata_toregion(rdata, &sr);
153 return (mem_tobuffer(target, sr.base, sr.length));
154 }
155
156 static inline int
compare_cert(ARGS_COMPARE)157 compare_cert(ARGS_COMPARE) {
158 isc_region_t r1;
159 isc_region_t r2;
160
161 REQUIRE(rdata1->type == rdata2->type);
162 REQUIRE(rdata1->rdclass == rdata2->rdclass);
163 REQUIRE(rdata1->type == 37);
164 REQUIRE(rdata1->length != 0);
165 REQUIRE(rdata2->length != 0);
166
167 dns_rdata_toregion(rdata1, &r1);
168 dns_rdata_toregion(rdata2, &r2);
169 return (isc_region_compare(&r1, &r2));
170 }
171
172 static inline isc_result_t
fromstruct_cert(ARGS_FROMSTRUCT)173 fromstruct_cert(ARGS_FROMSTRUCT) {
174 dns_rdata_cert_t *cert = source;
175
176 REQUIRE(type == 37);
177 REQUIRE(source != NULL);
178 REQUIRE(cert->common.rdtype == type);
179 REQUIRE(cert->common.rdclass == rdclass);
180
181 UNUSED(type);
182 UNUSED(rdclass);
183
184 RETERR(uint16_tobuffer(cert->type, target));
185 RETERR(uint16_tobuffer(cert->key_tag, target));
186 RETERR(uint8_tobuffer(cert->algorithm, target));
187
188 return (mem_tobuffer(target, cert->certificate, cert->length));
189 }
190
191 static inline isc_result_t
tostruct_cert(ARGS_TOSTRUCT)192 tostruct_cert(ARGS_TOSTRUCT) {
193 dns_rdata_cert_t *cert = target;
194 isc_region_t region;
195
196 REQUIRE(rdata->type == 37);
197 REQUIRE(target != NULL);
198 REQUIRE(rdata->length != 0);
199
200 cert->common.rdclass = rdata->rdclass;
201 cert->common.rdtype = rdata->type;
202 ISC_LINK_INIT(&cert->common, link);
203
204 dns_rdata_toregion(rdata, ®ion);
205
206 cert->type = uint16_fromregion(®ion);
207 isc_region_consume(®ion, 2);
208 cert->key_tag = uint16_fromregion(®ion);
209 isc_region_consume(®ion, 2);
210 cert->algorithm = uint8_fromregion(®ion);
211 isc_region_consume(®ion, 1);
212 cert->length = region.length;
213
214 cert->certificate = mem_maybedup(mctx, region.base, region.length);
215 if (cert->certificate == NULL)
216 return (ISC_R_NOMEMORY);
217
218 cert->mctx = mctx;
219 return (ISC_R_SUCCESS);
220 }
221
222 static inline void
freestruct_cert(ARGS_FREESTRUCT)223 freestruct_cert(ARGS_FREESTRUCT) {
224 dns_rdata_cert_t *cert = source;
225
226 REQUIRE(cert != NULL);
227 REQUIRE(cert->common.rdtype == 37);
228
229 if (cert->mctx == NULL)
230 return;
231
232 if (cert->certificate != NULL)
233 isc_mem_free(cert->mctx, cert->certificate);
234 cert->mctx = NULL;
235 }
236
237 static inline isc_result_t
additionaldata_cert(ARGS_ADDLDATA)238 additionaldata_cert(ARGS_ADDLDATA) {
239 REQUIRE(rdata->type == 37);
240
241 UNUSED(rdata);
242 UNUSED(add);
243 UNUSED(arg);
244
245 return (ISC_R_SUCCESS);
246 }
247
248 static inline isc_result_t
digest_cert(ARGS_DIGEST)249 digest_cert(ARGS_DIGEST) {
250 isc_region_t r;
251
252 REQUIRE(rdata->type == 37);
253
254 dns_rdata_toregion(rdata, &r);
255
256 return ((digest)(arg, &r));
257 }
258
259 static inline isc_boolean_t
checkowner_cert(ARGS_CHECKOWNER)260 checkowner_cert(ARGS_CHECKOWNER) {
261
262 REQUIRE(type == 37);
263
264 UNUSED(name);
265 UNUSED(type);
266 UNUSED(rdclass);
267 UNUSED(wildcard);
268
269 return (ISC_TRUE);
270 }
271
272 static inline isc_boolean_t
checknames_cert(ARGS_CHECKNAMES)273 checknames_cert(ARGS_CHECKNAMES) {
274
275 REQUIRE(rdata->type == 37);
276
277 UNUSED(rdata);
278 UNUSED(owner);
279 UNUSED(bad);
280
281 return (ISC_TRUE);
282 }
283
284
285 static inline int
casecompare_cert(ARGS_COMPARE)286 casecompare_cert(ARGS_COMPARE) {
287 return (compare_cert(rdata1, rdata2));
288 }
289 #endif /* RDATA_GENERIC_CERT_37_C */
290