vfs: check userland buffers before reading them.
[haiku.git] / src / kits / network / netresolv / nameser / ns_name.c
blob75afb0802baa5cc1ccf07821f8fdfb81b98fd1ab
1 /* $NetBSD: ns_name.c,v 1.9 2012/03/13 21:13:39 christos Exp $ */
3 /*
4 * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
5 * Copyright (c) 1996,1999 by Internet Software Consortium.
7 * Permission to use, copy, modify, and distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
11 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
17 * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 #ifndef lint
21 static const char rcsid[] = "$Id: ns_name.c,v 1.11 2009/01/23 19:59:16 each Exp $";
22 #endif
24 #include "port_before.h"
26 #include <sys/types.h>
28 #include <netinet/in.h>
29 #include <arpa/nameser.h>
31 #include <assert.h>
32 #include <errno.h>
33 #include <resolv.h>
34 #include <string.h>
35 #include <ctype.h>
36 #include <stdlib.h>
37 #include <limits.h>
39 #include "port_after.h"
41 #ifdef SPRINTF_CHAR
42 # define SPRINTF(x) ((int)strlen(sprintf/**/x))
43 #else
44 # define SPRINTF(x) (sprintf x)
45 #endif
47 #define NS_TYPE_ELT 0x40 /*%< EDNS0 extended label type */
48 #define DNS_LABELTYPE_BITSTRING 0x41
50 /* Data. */
52 static const char digits[] = "0123456789";
54 static const char digitvalue[256] = {
55 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*16*/
56 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*32*/
57 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*48*/
58 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, -1, -1, -1, -1, -1, -1, /*64*/
59 -1, 10, 11, 12, 13, 14, 15, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*80*/
60 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*96*/
61 -1, 10, 11, 12, 13, 14, 15, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*112*/
62 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*128*/
63 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
64 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
65 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
66 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
67 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
68 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
69 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
70 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*256*/
73 /* Forward. */
75 static int special(int);
76 static int printable(int);
77 static int dn_find(const u_char *, const u_char *,
78 const u_char * const *,
79 const u_char * const *);
80 static int encode_bitsring(const char **, const char *,
81 unsigned char **, unsigned char **,
82 unsigned const char *);
83 static int labellen(const u_char *);
84 static int decode_bitstring(const unsigned char **,
85 char *, const char *);
87 /* Public. */
89 /*%
90 * Convert an encoded domain name to printable ascii as per RFC1035.
92 * return:
93 *\li Number of bytes written to buffer, or -1 (with errno set)
95 * notes:
96 *\li The root is returned as "."
97 *\li All other domains are returned in non absolute form
99 int
100 ns_name_ntop(const u_char *src, char *dst, size_t dstsiz)
102 const u_char *cp;
103 char *dn, *eom;
104 u_char c;
105 u_int n;
106 int l;
108 cp = src;
109 dn = dst;
110 eom = dst + dstsiz;
112 while ((n = *cp++) != 0) {
113 if ((n & NS_CMPRSFLGS) == NS_CMPRSFLGS) {
114 /* Some kind of compression pointer. */
115 errno = EMSGSIZE;
116 return (-1);
118 if (dn != dst) {
119 if (dn >= eom) {
120 errno = EMSGSIZE;
121 return (-1);
123 *dn++ = '.';
125 if ((l = labellen(cp - 1)) < 0) {
126 errno = EMSGSIZE; /*%< XXX */
127 return (-1);
129 if (dn + l >= eom) {
130 errno = EMSGSIZE;
131 return (-1);
133 if ((n & NS_CMPRSFLGS) == NS_TYPE_ELT) {
134 int m;
136 if (n != DNS_LABELTYPE_BITSTRING) {
137 /* XXX: labellen should reject this case */
138 errno = EINVAL;
139 return (-1);
141 if ((m = decode_bitstring(&cp, dn, eom)) < 0)
143 errno = EMSGSIZE;
144 return (-1);
146 dn += m;
147 continue;
149 for (; l > 0; l--) {
150 c = *cp++;
151 if (special(c)) {
152 if (dn + 1 >= eom) {
153 errno = EMSGSIZE;
154 return (-1);
156 *dn++ = '\\';
157 *dn++ = (char)c;
158 } else if (!printable(c)) {
159 if (dn + 3 >= eom) {
160 errno = EMSGSIZE;
161 return (-1);
163 *dn++ = '\\';
164 *dn++ = digits[c / 100];
165 *dn++ = digits[(c % 100) / 10];
166 *dn++ = digits[c % 10];
167 } else {
168 if (dn >= eom) {
169 errno = EMSGSIZE;
170 return (-1);
172 *dn++ = (char)c;
176 if (dn == dst) {
177 if (dn >= eom) {
178 errno = EMSGSIZE;
179 return (-1);
181 *dn++ = '.';
183 if (dn >= eom) {
184 errno = EMSGSIZE;
185 return (-1);
187 *dn++ = '\0';
188 assert(INT_MIN <= (dn - dst) && (dn - dst) <= INT_MAX);
189 return (int)(dn - dst);
193 * Convert a ascii string into an encoded domain name as per RFC1035.
195 * return:
197 *\li -1 if it fails
198 *\li 1 if string was fully qualified
199 *\li 0 is string was not fully qualified
201 * notes:
202 *\li Enforces label and domain length limits.
205 ns_name_pton(const char *src, u_char *dst, size_t dstsiz) {
206 return (ns_name_pton2(src, dst, dstsiz, NULL));
210 * ns_name_pton2(src, dst, dstsiz, *dstlen)
211 * Convert a ascii string into an encoded domain name as per RFC1035.
212 * return:
213 * -1 if it fails
214 * 1 if string was fully qualified
215 * 0 is string was not fully qualified
216 * side effects:
217 * fills in *dstlen (if non-NULL)
218 * notes:
219 * Enforces label and domain length limits.
222 ns_name_pton2(const char *src, u_char *dst, size_t dstsiz, size_t *dstlen) {
223 u_char *label, *bp, *eom;
224 int c, n, escaped, e = 0;
225 char *cp;
227 escaped = 0;
228 bp = dst;
229 eom = dst + dstsiz;
230 label = bp++;
232 while ((c = *src++) != 0) {
233 if (escaped) {
234 if (c == '[') { /*%< start a bit string label */
235 if ((cp = strchr(src, ']')) == NULL) {
236 errno = EINVAL; /*%< ??? */
237 return (-1);
239 if ((e = encode_bitsring(&src, cp + 2,
240 &label, &bp, eom))
241 != 0) {
242 errno = e;
243 return (-1);
245 escaped = 0;
246 label = bp++;
247 if ((c = *src++) == 0)
248 goto done;
249 else if (c != '.') {
250 errno = EINVAL;
251 return (-1);
253 continue;
255 else if ((cp = strchr(digits, c)) != NULL) {
256 n = (int)(cp - digits) * 100;
257 if ((c = *src++) == 0 ||
258 (cp = strchr(digits, c)) == NULL) {
259 errno = EMSGSIZE;
260 return (-1);
262 n += (int)(cp - digits) * 10;
263 if ((c = *src++) == 0 ||
264 (cp = strchr(digits, c)) == NULL) {
265 errno = EMSGSIZE;
266 return (-1);
268 n += (int)(cp - digits);
269 if (n > 255) {
270 errno = EMSGSIZE;
271 return (-1);
273 c = n;
275 escaped = 0;
276 } else if (c == '\\') {
277 escaped = 1;
278 continue;
279 } else if (c == '.') {
280 c = (int)(bp - label - 1);
281 if ((c & NS_CMPRSFLGS) != 0) { /*%< Label too big. */
282 errno = EMSGSIZE;
283 return (-1);
285 if (label >= eom) {
286 errno = EMSGSIZE;
287 return (-1);
289 *label = c;
290 /* Fully qualified ? */
291 if (*src == '\0') {
292 if (c != 0) {
293 if (bp >= eom) {
294 errno = EMSGSIZE;
295 return (-1);
297 *bp++ = '\0';
299 if ((bp - dst) > MAXCDNAME) {
300 errno = EMSGSIZE;
301 return (-1);
303 if (dstlen != NULL)
304 *dstlen = (bp - dst);
305 return (1);
307 if (c == 0 || *src == '.') {
308 errno = EMSGSIZE;
309 return (-1);
311 label = bp++;
312 continue;
314 if (bp >= eom) {
315 errno = EMSGSIZE;
316 return (-1);
318 *bp++ = (u_char)c;
320 c = (int)(bp - label - 1);
321 if ((c & NS_CMPRSFLGS) != 0) { /*%< Label too big. */
322 errno = EMSGSIZE;
323 return (-1);
325 done:
326 if (label >= eom) {
327 errno = EMSGSIZE;
328 return (-1);
330 *label = c;
331 if (c != 0) {
332 if (bp >= eom) {
333 errno = EMSGSIZE;
334 return (-1);
336 *bp++ = 0;
338 if ((bp - dst) > MAXCDNAME) { /*%< src too big */
339 errno = EMSGSIZE;
340 return (-1);
342 if (dstlen != NULL)
343 *dstlen = (bp - dst);
344 return (0);
348 * Convert a network strings labels into all lowercase.
350 * return:
351 *\li Number of bytes written to buffer, or -1 (with errno set)
353 * notes:
354 *\li Enforces label and domain length limits.
358 ns_name_ntol(const u_char *src, u_char *dst, size_t dstsiz)
360 const u_char *cp;
361 u_char *dn, *eom;
362 u_char c;
363 u_int n;
364 int l;
366 cp = src;
367 dn = dst;
368 eom = dst + dstsiz;
370 if (dn >= eom) {
371 errno = EMSGSIZE;
372 return (-1);
374 while ((n = *cp++) != 0) {
375 if ((n & NS_CMPRSFLGS) == NS_CMPRSFLGS) {
376 /* Some kind of compression pointer. */
377 errno = EMSGSIZE;
378 return (-1);
380 *dn++ = n;
381 if ((l = labellen(cp - 1)) < 0) {
382 errno = EMSGSIZE;
383 return (-1);
385 if (dn + l >= eom) {
386 errno = EMSGSIZE;
387 return (-1);
389 for (; l > 0; l--) {
390 c = *cp++;
391 if (isascii(c) && isupper(c))
392 *dn++ = tolower(c);
393 else
394 *dn++ = c;
397 *dn++ = '\0';
398 assert(INT_MIN <= (dn - dst) && (dn - dst) <= INT_MAX);
399 return (int)(dn - dst);
403 * Unpack a domain name from a message, source may be compressed.
405 * return:
406 *\li -1 if it fails, or consumed octets if it succeeds.
409 ns_name_unpack(const u_char *msg, const u_char *eom, const u_char *src,
410 u_char *dst, size_t dstsiz)
412 return (ns_name_unpack2(msg, eom, src, dst, dstsiz, NULL));
416 * ns_name_unpack2(msg, eom, src, dst, dstsiz, *dstlen)
417 * Unpack a domain name from a message, source may be compressed.
418 * return:
419 * -1 if it fails, or consumed octets if it succeeds.
420 * side effect:
421 * fills in *dstlen (if non-NULL).
424 ns_name_unpack2(const u_char *msg, const u_char *eom, const u_char *src,
425 u_char *dst, size_t dstsiz, size_t *dstlen)
427 const u_char *srcp, *dstlim;
428 u_char *dstp;
429 int n, len, checked, l;
431 len = -1;
432 checked = 0;
433 dstp = dst;
434 srcp = src;
435 dstlim = dst + dstsiz;
436 if (srcp < msg || srcp >= eom) {
437 errno = EMSGSIZE;
438 return (-1);
440 /* Fetch next label in domain name. */
441 while ((n = *srcp++) != 0) {
442 /* Check for indirection. */
443 switch (n & NS_CMPRSFLGS) {
444 case 0:
445 case NS_TYPE_ELT:
446 /* Limit checks. */
447 if ((l = labellen(srcp - 1)) < 0) {
448 errno = EMSGSIZE;
449 return (-1);
451 if (dstp + l + 1 >= dstlim || srcp + l >= eom) {
452 errno = EMSGSIZE;
453 return (-1);
455 checked += l + 1;
456 *dstp++ = n;
457 memcpy(dstp, srcp, (size_t)l);
458 dstp += l;
459 srcp += l;
460 break;
462 case NS_CMPRSFLGS:
463 if (srcp >= eom) {
464 errno = EMSGSIZE;
465 return (-1);
467 if (len < 0) {
468 assert(INT_MIN <= (srcp - src + 1) && (srcp - src + 1) <= INT_MAX);
469 len = (int)(srcp - src + 1);
471 srcp = msg + (((n & 0x3f) << 8) | (*srcp & 0xff));
472 if (srcp < msg || srcp >= eom) { /*%< Out of range. */
473 errno = EMSGSIZE;
474 return (-1);
476 checked += 2;
478 * Check for loops in the compressed name;
479 * if we've looked at the whole message,
480 * there must be a loop.
482 if (checked >= eom - msg) {
483 errno = EMSGSIZE;
484 return (-1);
486 break;
488 default:
489 errno = EMSGSIZE;
490 return (-1); /*%< flag error */
493 *dstp++ = 0;
494 if (dstlen != NULL)
495 *dstlen = dstp - dst;
496 if (len < 0) {
497 assert(INT_MIN <= (srcp - src) && (srcp - src) <= INT_MAX);
498 len = (int)(srcp - src);
500 return len;
504 * Pack domain name 'domain' into 'comp_dn'.
506 * return:
507 *\li Size of the compressed name, or -1.
509 * notes:
510 *\li 'dnptrs' is an array of pointers to previous compressed names.
511 *\li dnptrs[0] is a pointer to the beginning of the message. The array
512 * ends with NULL.
513 *\li 'lastdnptr' is a pointer to the end of the array pointed to
514 * by 'dnptrs'.
516 * Side effects:
517 *\li The list of pointers in dnptrs is updated for labels inserted into
518 * the message as we compress the name. If 'dnptr' is NULL, we don't
519 * try to compress names. If 'lastdnptr' is NULL, we don't update the
520 * list.
523 ns_name_pack(const u_char *src, u_char *dst, int dstsiz,
524 const u_char **dnptrs, const u_char **lastdnptr)
526 u_char *dstp;
527 const u_char **cpp, **lpp, *eob, *msg;
528 const u_char *srcp;
529 int n, l, first = 1;
531 srcp = src;
532 dstp = dst;
533 eob = dstp + dstsiz;
534 lpp = cpp = NULL;
535 if (dnptrs != NULL) {
536 if ((msg = *dnptrs++) != NULL) {
537 for (cpp = dnptrs; *cpp != NULL; cpp++)
538 continue;
539 lpp = cpp; /*%< end of list to search */
541 } else
542 msg = NULL;
544 /* make sure the domain we are about to add is legal */
545 l = 0;
546 do {
547 int l0;
549 n = *srcp;
550 if ((n & NS_CMPRSFLGS) == NS_CMPRSFLGS) {
551 errno = EMSGSIZE;
552 return (-1);
554 if ((l0 = labellen(srcp)) < 0) {
555 errno = EINVAL;
556 return (-1);
558 l += l0 + 1;
559 if (l > MAXCDNAME) {
560 errno = EMSGSIZE;
561 return (-1);
563 srcp += l0 + 1;
564 } while (n != 0);
566 /* from here on we need to reset compression pointer array on error */
567 srcp = src;
568 do {
569 /* Look to see if we can use pointers. */
570 n = *srcp;
571 if (n != 0 && msg != NULL) {
572 l = dn_find(srcp, msg, (const u_char * const *)dnptrs,
573 (const u_char * const *)lpp);
574 if (l >= 0) {
575 if (dstp + 1 >= eob) {
576 goto cleanup;
578 *dstp++ = ((u_int32_t)l >> 8) | NS_CMPRSFLGS;
579 *dstp++ = l % 256;
580 assert(INT_MIN <= (dstp - dst) && (dstp - dst) <= INT_MAX);
581 return (int)(dstp - dst);
583 /* Not found, save it. */
584 if (lastdnptr != NULL && cpp < lastdnptr - 1 &&
585 (dstp - msg) < 0x4000 && first) {
586 *cpp++ = dstp;
587 *cpp = NULL;
588 first = 0;
591 /* copy label to buffer */
592 if ((n & NS_CMPRSFLGS) == NS_CMPRSFLGS) {
593 /* Should not happen. */
594 goto cleanup;
596 n = labellen(srcp);
597 if (dstp + 1 + n >= eob) {
598 goto cleanup;
600 memcpy(dstp, srcp, (size_t)(n + 1));
601 srcp += n + 1;
602 dstp += n + 1;
603 } while (n != 0);
605 if (dstp > eob) {
606 cleanup:
607 if (msg != NULL)
608 *lpp = NULL;
609 errno = EMSGSIZE;
610 return (-1);
612 assert(INT_MIN <= (dstp - dst) && (dstp - dst) <= INT_MAX);
613 return (int)(dstp - dst);
617 * Expand compressed domain name to presentation format.
619 * return:
620 *\li Number of bytes read out of `src', or -1 (with errno set).
622 * note:
623 *\li Root domain returns as "." not "".
626 ns_name_uncompress(const u_char *msg, const u_char *eom, const u_char *src,
627 char *dst, size_t dstsiz)
629 u_char tmp[NS_MAXCDNAME];
630 int n;
632 if ((n = ns_name_unpack(msg, eom, src, tmp, sizeof tmp)) == -1)
633 return (-1);
634 if (ns_name_ntop(tmp, dst, dstsiz) == -1)
635 return (-1);
636 return (n);
640 * Compress a domain name into wire format, using compression pointers.
642 * return:
643 *\li Number of bytes consumed in `dst' or -1 (with errno set).
645 * notes:
646 *\li 'dnptrs' is an array of pointers to previous compressed names.
647 *\li dnptrs[0] is a pointer to the beginning of the message.
648 *\li The list ends with NULL. 'lastdnptr' is a pointer to the end of the
649 * array pointed to by 'dnptrs'. Side effect is to update the list of
650 * pointers for labels inserted into the message as we compress the name.
651 *\li If 'dnptr' is NULL, we don't try to compress names. If 'lastdnptr'
652 * is NULL, we don't update the list.
655 ns_name_compress(const char *src, u_char *dst, size_t dstsiz,
656 const u_char **dnptrs, const u_char **lastdnptr)
658 u_char tmp[NS_MAXCDNAME];
660 if (ns_name_pton(src, tmp, sizeof tmp) == -1)
661 return (-1);
662 return (ns_name_pack(tmp, dst, (int)dstsiz, dnptrs, lastdnptr));
666 * Reset dnptrs so that there are no active references to pointers at or
667 * after src.
669 void
670 ns_name_rollback(const u_char *src, const u_char **dnptrs,
671 const u_char **lastdnptr)
673 while (dnptrs < lastdnptr && *dnptrs != NULL) {
674 if (*dnptrs >= src) {
675 *dnptrs = NULL;
676 break;
678 dnptrs++;
683 * Advance *ptrptr to skip over the compressed name it points at.
685 * return:
686 *\li 0 on success, -1 (with errno set) on failure.
689 ns_name_skip(const u_char **ptrptr, const u_char *eom)
691 const u_char *cp;
692 u_int n;
693 int l;
695 cp = *ptrptr;
696 while (cp < eom && (n = *cp++) != 0) {
697 /* Check for indirection. */
698 switch (n & NS_CMPRSFLGS) {
699 case 0: /*%< normal case, n == len */
700 cp += n;
701 continue;
702 case NS_TYPE_ELT: /*%< EDNS0 extended label */
703 if ((l = labellen(cp - 1)) < 0) {
704 errno = EMSGSIZE; /*%< XXX */
705 return (-1);
707 cp += l;
708 continue;
709 case NS_CMPRSFLGS: /*%< indirection */
710 cp++;
711 break;
712 default: /*%< illegal type */
713 errno = EMSGSIZE;
714 return (-1);
716 break;
718 if (cp > eom) {
719 errno = EMSGSIZE;
720 return (-1);
722 *ptrptr = cp;
723 return (0);
726 /* Find the number of octets an nname takes up, including the root label.
727 * (This is basically ns_name_skip() without compression-pointer support.)
728 * ((NOTE: can only return zero if passed-in namesiz argument is zero.))
730 ssize_t
731 ns_name_length(ns_nname_ct nname, size_t namesiz) {
732 ns_nname_ct orig = nname;
733 u_int n;
735 while (namesiz-- > 0 && (n = *nname++) != 0) {
736 if ((n & NS_CMPRSFLGS) != 0) {
737 errno = EISDIR;
738 return (-1);
740 if (n > namesiz) {
741 errno = EMSGSIZE;
742 return (-1);
744 nname += n;
745 namesiz -= n;
747 return (nname - orig);
750 /* Compare two nname's for equality. Return -1 on error (setting errno).
753 ns_name_eq(ns_nname_ct a, size_t as, ns_nname_ct b, size_t bs) {
754 ns_nname_ct ae = a + as, be = b + bs;
755 int ac, bc;
757 while (ac = *a, bc = *b, ac != 0 && bc != 0) {
758 if ((ac & NS_CMPRSFLGS) != 0 || (bc & NS_CMPRSFLGS) != 0) {
759 errno = EISDIR;
760 return (-1);
762 if (a + ac >= ae || b + bc >= be) {
763 errno = EMSGSIZE;
764 return (-1);
766 if (ac != bc || strncasecmp((const char *) ++a,
767 (const char *) ++b,
768 (size_t)ac) != 0)
769 return (0);
770 a += ac, b += bc;
772 return (ac == 0 && bc == 0);
775 /* Is domain "A" owned by (at or below) domain "B"?
778 ns_name_owned(ns_namemap_ct a, int an, ns_namemap_ct b, int bn) {
779 /* If A is shorter, it cannot be owned by B. */
780 if (an < bn)
781 return (0);
783 /* If they are unequal before the length of the shorter, A cannot... */
784 while (bn > 0) {
785 if (a->len != b->len ||
786 strncasecmp((const char *) a->base,
787 (const char *) b->base, (size_t)a->len) != 0)
788 return (0);
789 a++, an--;
790 b++, bn--;
793 /* A might be longer or not, but either way, B owns it. */
794 return (1);
797 /* Build an array of <base,len> tuples from an nname, top-down order.
798 * Return the number of tuples (labels) thus discovered.
801 ns_name_map(ns_nname_ct nname, size_t namelen, ns_namemap_t map, int mapsize) {
802 u_int n;
803 int l;
805 n = *nname++;
806 namelen--;
808 /* Root zone? */
809 if (n == 0) {
810 /* Extra data follows name? */
811 if (namelen > 0) {
812 errno = EMSGSIZE;
813 return (-1);
815 return (0);
818 /* Compression pointer? */
819 if ((n & NS_CMPRSFLGS) != 0) {
820 errno = EISDIR;
821 return (-1);
824 /* Label too long? */
825 if (n > namelen) {
826 errno = EMSGSIZE;
827 return (-1);
830 /* Recurse to get rest of name done first. */
831 l = ns_name_map(nname + n, namelen - n, map, mapsize);
832 if (l < 0)
833 return (-1);
835 /* Too many labels? */
836 if (l >= mapsize) {
837 errno = ENAMETOOLONG;
838 return (-1);
841 /* We're on our way back up-stack, store current map data. */
842 map[l].base = nname;
843 map[l].len = n;
844 return (l + 1);
847 /* Count the labels in a domain name. Root counts, so COM. has two. This
848 * is to make the result comparable to the result of ns_name_map().
851 ns_name_labels(ns_nname_ct nname, size_t namesiz) {
852 int ret = 0;
853 u_int n;
855 while (namesiz-- > 0 && (n = *nname++) != 0) {
856 if ((n & NS_CMPRSFLGS) != 0) {
857 errno = EISDIR;
858 return (-1);
860 if (n > namesiz) {
861 errno = EMSGSIZE;
862 return (-1);
864 nname += n;
865 namesiz -= n;
866 ret++;
868 return (ret + 1);
871 /* Private. */
874 * Thinking in noninternationalized USASCII (per the DNS spec),
875 * is this characted special ("in need of quoting") ?
877 * return:
878 *\li boolean.
880 static int
881 special(int ch) {
882 switch (ch) {
883 case 0x22: /*%< '"' */
884 case 0x2E: /*%< '.' */
885 case 0x3B: /*%< ';' */
886 case 0x5C: /*%< '\\' */
887 case 0x28: /*%< '(' */
888 case 0x29: /*%< ')' */
889 /* Special modifiers in zone files. */
890 case 0x40: /*%< '@' */
891 case 0x24: /*%< '$' */
892 return (1);
893 default:
894 return (0);
899 * Thinking in noninternationalized USASCII (per the DNS spec),
900 * is this character visible and not a space when printed ?
902 * return:
903 *\li boolean.
905 static int
906 printable(int ch) {
907 return (ch > 0x20 && ch < 0x7f);
911 * Thinking in noninternationalized USASCII (per the DNS spec),
912 * convert this character to lower case if it's upper case.
914 static int
915 mklower(int ch) {
916 if (ch >= 0x41 && ch <= 0x5A)
917 return (ch + 0x20);
918 return (ch);
922 * Search for the counted-label name in an array of compressed names.
924 * return:
925 *\li offset from msg if found, or -1.
927 * notes:
928 *\li dnptrs is the pointer to the first name on the list,
929 *\li not the pointer to the start of the message.
931 static int
932 dn_find(const u_char *domain, const u_char *msg,
933 const u_char * const *dnptrs,
934 const u_char * const *lastdnptr)
936 const u_char *dn, *cp, *sp;
937 const u_char * const *cpp;
938 u_int n;
940 for (cpp = dnptrs; cpp < lastdnptr; cpp++) {
941 sp = *cpp;
943 * terminate search on:
944 * root label
945 * compression pointer
946 * unusable offset
948 while (*sp != 0 && (*sp & NS_CMPRSFLGS) == 0 &&
949 (sp - msg) < 0x4000) {
950 dn = domain;
951 cp = sp;
952 while ((n = *cp++) != 0) {
954 * check for indirection
956 switch (n & NS_CMPRSFLGS) {
957 case 0: /*%< normal case, n == len */
958 n = labellen(cp - 1); /*%< XXX */
959 if (n != *dn++)
960 goto next;
962 for (; n > 0; n--)
963 if (mklower(*dn++) !=
964 mklower(*cp++))
965 goto next;
966 /* Is next root for both ? */
967 if (*dn == '\0' && *cp == '\0') {
968 assert(INT_MIN <= (sp - msg) && (sp - msg) <= INT_MAX);
969 return (int)(sp - msg);
971 if (*dn)
972 continue;
973 goto next;
974 case NS_CMPRSFLGS: /*%< indirection */
975 cp = msg + (((n & 0x3f) << 8) | *cp);
976 break;
978 default: /*%< illegal type */
979 errno = EMSGSIZE;
980 return (-1);
983 next: ;
984 sp += *sp + 1;
987 errno = ENOENT;
988 return (-1);
991 static int
992 decode_bitstring(const unsigned char **cpp, char *dn, const char *eom)
994 const unsigned char *cp = *cpp;
995 char *beg = dn, tc;
996 int b, blen, plen, i;
998 if ((blen = (*cp & 0xff)) == 0)
999 blen = 256;
1000 plen = (blen + 3) / 4;
1001 plen += (int)sizeof("\\[x/]") + (blen > 99 ? 3 : (blen > 9) ? 2 : 1);
1002 if (dn + plen >= eom)
1003 return (-1);
1005 cp++;
1006 i = SPRINTF((dn, "\\[x"));
1007 if (i < 0)
1008 return (-1);
1009 dn += i;
1010 for (b = blen; b > 7; b -= 8, cp++) {
1011 i = SPRINTF((dn, "%02x", *cp & 0xff));
1012 if (i < 0)
1013 return (-1);
1014 dn += i;
1016 if (b > 4) {
1017 tc = *cp++;
1018 i = SPRINTF((dn, "%02x", tc & (0xff << (8 - b))));
1019 if (i < 0)
1020 return (-1);
1021 dn += i;
1022 } else if (b > 0) {
1023 tc = *cp++;
1024 i = SPRINTF((dn, "%1x",
1025 (((u_int32_t)tc >> 4) & 0x0f) & (0x0f << (4 - b))));
1026 if (i < 0)
1027 return (-1);
1028 dn += i;
1030 i = SPRINTF((dn, "/%d]", blen));
1031 if (i < 0)
1032 return (-1);
1033 dn += i;
1035 *cpp = cp;
1036 assert(INT_MIN <= (dn - beg) && (dn - beg) <= INT_MAX);
1037 return (int)(dn - beg);
1040 static int
1041 encode_bitsring(const char **bp, const char *end, unsigned char **labelp,
1042 unsigned char ** dst, unsigned const char *eom)
1044 int afterslash = 0;
1045 const char *cp = *bp;
1046 unsigned char *tp;
1047 char c;
1048 const char *beg_blen;
1049 char *end_blen = NULL;
1050 int value = 0, count = 0, tbcount = 0, blen = 0;
1052 beg_blen = end_blen = NULL;
1054 /* a bitstring must contain at least 2 characters */
1055 if (end - cp < 2)
1056 return (EINVAL);
1058 /* XXX: currently, only hex strings are supported */
1059 if (*cp++ != 'x')
1060 return (EINVAL);
1061 if (!isxdigit((*cp) & 0xff)) /*%< reject '\[x/BLEN]' */
1062 return (EINVAL);
1064 for (tp = *dst + 1; cp < end && tp < eom; cp++) {
1065 switch((c = *cp)) {
1066 case ']': /*%< end of the bitstring */
1067 if (afterslash) {
1068 if (beg_blen == NULL)
1069 return (EINVAL);
1070 blen = (int)strtol(beg_blen, &end_blen, 10);
1071 if (*end_blen != ']')
1072 return (EINVAL);
1074 if (count)
1075 *tp++ = ((value << 4) & 0xff);
1076 cp++; /*%< skip ']' */
1077 goto done;
1078 case '/':
1079 afterslash = 1;
1080 break;
1081 default:
1082 if (afterslash) {
1083 if (!isdigit(c&0xff))
1084 return (EINVAL);
1085 if (beg_blen == NULL) {
1087 if (c == '0') {
1088 /* blen never begings with 0 */
1089 return (EINVAL);
1091 beg_blen = cp;
1093 } else {
1094 if (!isxdigit(c&0xff))
1095 return (EINVAL);
1096 value <<= 4;
1097 value += digitvalue[(int)c];
1098 count += 4;
1099 tbcount += 4;
1100 if (tbcount > 256)
1101 return (EINVAL);
1102 if (count == 8) {
1103 *tp++ = value;
1104 count = 0;
1107 break;
1110 done:
1111 if (cp >= end || tp >= eom)
1112 return (EMSGSIZE);
1115 * bit length validation:
1116 * If a <length> is present, the number of digits in the <bit-data>
1117 * MUST be just sufficient to contain the number of bits specified
1118 * by the <length>. If there are insignificant bits in a final
1119 * hexadecimal or octal digit, they MUST be zero.
1120 * RFC2673, Section 3.2.
1122 if (blen > 0) {
1123 int traillen;
1125 if (((blen + 3) & ~3) != tbcount)
1126 return (EINVAL);
1127 traillen = tbcount - blen; /*%< between 0 and 3 */
1128 if (((value << (8 - traillen)) & 0xff) != 0)
1129 return (EINVAL);
1131 else
1132 blen = tbcount;
1133 if (blen == 256)
1134 blen = 0;
1136 /* encode the type and the significant bit fields */
1137 **labelp = DNS_LABELTYPE_BITSTRING;
1138 **dst = blen;
1140 *bp = cp;
1141 *dst = tp;
1143 return (0);
1146 static int
1147 labellen(const u_char *lp)
1149 int bitlen;
1150 u_char l = *lp;
1152 if ((l & NS_CMPRSFLGS) == NS_CMPRSFLGS) {
1153 /* should be avoided by the caller */
1154 return (-1);
1157 if ((l & NS_CMPRSFLGS) == NS_TYPE_ELT) {
1158 if (l == DNS_LABELTYPE_BITSTRING) {
1159 if ((bitlen = *(lp + 1)) == 0)
1160 bitlen = 256;
1161 return ((bitlen + 7 ) / 8 + 1);
1163 return (-1); /*%< unknwon ELT */
1165 return (l);
1168 /*! \file */