1 /* $NetBSD: ns_name.c,v 1.9 2012/03/13 21:13:39 christos Exp $ */
4 * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
5 * Copyright (c) 1996,1999 by Internet Software Consortium.
7 * Permission to use, copy, modify, and distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
11 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
17 * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 #include <sys/cdefs.h>
23 static const char rcsid
[] = "Id: ns_name.c,v 1.11 2009/01/23 19:59:16 each Exp";
25 __RCSID("$NetBSD: ns_name.c,v 1.9 2012/03/13 21:13:39 christos Exp $");
29 #include "port_before.h"
31 #include <sys/types.h>
33 #include <netinet/in.h>
34 #include <arpa/nameser.h>
44 #include "port_after.h"
47 # define SPRINTF(x) ((int)strlen(sprintf/**/x))
49 # define SPRINTF(x) (sprintf x)
52 #define NS_TYPE_ELT 0x40 /*%< EDNS0 extended label type */
53 #define DNS_LABELTYPE_BITSTRING 0x41
57 static const char digits
[] = "0123456789";
59 static const char digitvalue
[256] = {
60 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*16*/
61 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*32*/
62 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*48*/
63 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, -1, -1, -1, -1, -1, -1, /*64*/
64 -1, 10, 11, 12, 13, 14, 15, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*80*/
65 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*96*/
66 -1, 10, 11, 12, 13, 14, 15, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*112*/
67 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*128*/
68 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
69 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
70 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
71 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
72 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
73 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
74 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
75 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, /*256*/
80 static int special(int);
81 static int printable(int);
82 static int dn_find(const u_char
*, const u_char
*,
83 const u_char
* const *,
84 const u_char
* const *);
85 static int encode_bitsring(const char **, const char *,
86 unsigned char **, unsigned char **,
87 unsigned const char *);
88 static int labellen(const u_char
*);
89 static int decode_bitstring(const unsigned char **,
90 char *, const char *);
95 * Convert an encoded domain name to printable ascii as per RFC1035.
98 *\li Number of bytes written to buffer, or -1 (with errno set)
101 *\li The root is returned as "."
102 *\li All other domains are returned in non absolute form
105 ns_name_ntop(const u_char
*src
, char *dst
, size_t dstsiz
)
117 while ((n
= *cp
++) != 0) {
118 if ((n
& NS_CMPRSFLGS
) == NS_CMPRSFLGS
) {
119 /* Some kind of compression pointer. */
130 if ((l
= labellen(cp
- 1)) < 0) {
131 errno
= EMSGSIZE
; /*%< XXX */
138 if ((n
& NS_CMPRSFLGS
) == NS_TYPE_ELT
) {
141 if (n
!= DNS_LABELTYPE_BITSTRING
) {
142 /* XXX: labellen should reject this case */
146 if ((m
= decode_bitstring(&cp
, dn
, eom
)) < 0)
163 } else if (!printable(c
)) {
169 *dn
++ = digits
[c
/ 100];
170 *dn
++ = digits
[(c
% 100) / 10];
171 *dn
++ = digits
[c
% 10];
193 _DIAGASSERT(__type_fit(int, dn
- dst
));
194 return (int)(dn
- dst
);
198 * Convert a ascii string into an encoded domain name as per RFC1035.
203 *\li 1 if string was fully qualified
204 *\li 0 is string was not fully qualified
207 *\li Enforces label and domain length limits.
210 ns_name_pton(const char *src
, u_char
*dst
, size_t dstsiz
) {
211 return (ns_name_pton2(src
, dst
, dstsiz
, NULL
));
215 * ns_name_pton2(src, dst, dstsiz, *dstlen)
216 * Convert a ascii string into an encoded domain name as per RFC1035.
219 * 1 if string was fully qualified
220 * 0 is string was not fully qualified
222 * fills in *dstlen (if non-NULL)
224 * Enforces label and domain length limits.
227 ns_name_pton2(const char *src
, u_char
*dst
, size_t dstsiz
, size_t *dstlen
) {
228 u_char
*label
, *bp
, *eom
;
229 int c
, n
, escaped
, e
= 0;
237 while ((c
= *src
++) != 0) {
239 if (c
== '[') { /*%< start a bit string label */
240 if ((cp
= strchr(src
, ']')) == NULL
) {
241 errno
= EINVAL
; /*%< ??? */
244 if ((e
= encode_bitsring(&src
, cp
+ 2,
252 if ((c
= *src
++) == 0)
260 else if ((cp
= strchr(digits
, c
)) != NULL
) {
261 n
= (int)(cp
- digits
) * 100;
262 if ((c
= *src
++) == 0 ||
263 (cp
= strchr(digits
, c
)) == NULL
) {
267 n
+= (int)(cp
- digits
) * 10;
268 if ((c
= *src
++) == 0 ||
269 (cp
= strchr(digits
, c
)) == NULL
) {
273 n
+= (int)(cp
- digits
);
281 } else if (c
== '\\') {
284 } else if (c
== '.') {
285 c
= (int)(bp
- label
- 1);
286 if ((c
& NS_CMPRSFLGS
) != 0) { /*%< Label too big. */
295 /* Fully qualified ? */
304 if ((bp
- dst
) > MAXCDNAME
) {
309 *dstlen
= (bp
- dst
);
312 if (c
== 0 || *src
== '.') {
325 c
= (int)(bp
- label
- 1);
326 if ((c
& NS_CMPRSFLGS
) != 0) { /*%< Label too big. */
343 if ((bp
- dst
) > MAXCDNAME
) { /*%< src too big */
348 *dstlen
= (bp
- dst
);
353 * Convert a network strings labels into all lowercase.
356 *\li Number of bytes written to buffer, or -1 (with errno set)
359 *\li Enforces label and domain length limits.
363 ns_name_ntol(const u_char
*src
, u_char
*dst
, size_t dstsiz
)
379 while ((n
= *cp
++) != 0) {
380 if ((n
& NS_CMPRSFLGS
) == NS_CMPRSFLGS
) {
381 /* Some kind of compression pointer. */
386 if ((l
= labellen(cp
- 1)) < 0) {
396 if (isascii(c
) && isupper(c
))
403 _DIAGASSERT(__type_fit(int, dn
- dst
));
404 return (int)(dn
- dst
);
408 * Unpack a domain name from a message, source may be compressed.
411 *\li -1 if it fails, or consumed octets if it succeeds.
414 ns_name_unpack(const u_char
*msg
, const u_char
*eom
, const u_char
*src
,
415 u_char
*dst
, size_t dstsiz
)
417 return (ns_name_unpack2(msg
, eom
, src
, dst
, dstsiz
, NULL
));
421 * ns_name_unpack2(msg, eom, src, dst, dstsiz, *dstlen)
422 * Unpack a domain name from a message, source may be compressed.
424 * -1 if it fails, or consumed octets if it succeeds.
426 * fills in *dstlen (if non-NULL).
429 ns_name_unpack2(const u_char
*msg
, const u_char
*eom
, const u_char
*src
,
430 u_char
*dst
, size_t dstsiz
, size_t *dstlen
)
432 const u_char
*srcp
, *dstlim
;
434 int n
, len
, checked
, l
;
440 dstlim
= dst
+ dstsiz
;
441 if (srcp
< msg
|| srcp
>= eom
) {
445 /* Fetch next label in domain name. */
446 while ((n
= *srcp
++) != 0) {
447 /* Check for indirection. */
448 switch (n
& NS_CMPRSFLGS
) {
452 if ((l
= labellen(srcp
- 1)) < 0) {
456 if (dstp
+ l
+ 1 >= dstlim
|| srcp
+ l
>= eom
) {
462 memcpy(dstp
, srcp
, (size_t)l
);
473 _DIAGASSERT(__type_fit(int, srcp
- src
+ 1));
474 len
= (int)(srcp
- src
+ 1);
476 srcp
= msg
+ (((n
& 0x3f) << 8) | (*srcp
& 0xff));
477 if (srcp
< msg
|| srcp
>= eom
) { /*%< Out of range. */
483 * Check for loops in the compressed name;
484 * if we've looked at the whole message,
485 * there must be a loop.
487 if (checked
>= eom
- msg
) {
495 return (-1); /*%< flag error */
500 *dstlen
= dstp
- dst
;
502 _DIAGASSERT(__type_fit(int, srcp
- src
));
503 len
= (int)(srcp
- src
);
509 * Pack domain name 'domain' into 'comp_dn'.
512 *\li Size of the compressed name, or -1.
515 *\li 'dnptrs' is an array of pointers to previous compressed names.
516 *\li dnptrs[0] is a pointer to the beginning of the message. The array
518 *\li 'lastdnptr' is a pointer to the end of the array pointed to
522 *\li The list of pointers in dnptrs is updated for labels inserted into
523 * the message as we compress the name. If 'dnptr' is NULL, we don't
524 * try to compress names. If 'lastdnptr' is NULL, we don't update the
528 ns_name_pack(const u_char
*src
, u_char
*dst
, int dstsiz
,
529 const u_char
**dnptrs
, const u_char
**lastdnptr
)
532 const u_char
**cpp
, **lpp
, *eob
, *msg
;
540 if (dnptrs
!= NULL
) {
541 if ((msg
= *dnptrs
++) != NULL
) {
542 for (cpp
= dnptrs
; *cpp
!= NULL
; cpp
++)
544 lpp
= cpp
; /*%< end of list to search */
549 /* make sure the domain we are about to add is legal */
555 if ((n
& NS_CMPRSFLGS
) == NS_CMPRSFLGS
) {
559 if ((l0
= labellen(srcp
)) < 0) {
571 /* from here on we need to reset compression pointer array on error */
574 /* Look to see if we can use pointers. */
576 if (n
!= 0 && msg
!= NULL
) {
577 l
= dn_find(srcp
, msg
, (const u_char
* const *)dnptrs
,
578 (const u_char
* const *)lpp
);
580 if (dstp
+ 1 >= eob
) {
583 *dstp
++ = ((u_int32_t
)l
>> 8) | NS_CMPRSFLGS
;
585 _DIAGASSERT(__type_fit(int, dstp
- dst
));
586 return (int)(dstp
- dst
);
588 /* Not found, save it. */
589 if (lastdnptr
!= NULL
&& cpp
< lastdnptr
- 1 &&
590 (dstp
- msg
) < 0x4000 && first
) {
596 /* copy label to buffer */
597 if ((n
& NS_CMPRSFLGS
) == NS_CMPRSFLGS
) {
598 /* Should not happen. */
602 if (dstp
+ 1 + n
>= eob
) {
605 memcpy(dstp
, srcp
, (size_t)(n
+ 1));
617 _DIAGASSERT(__type_fit(int, dstp
- dst
));
618 return (int)(dstp
- dst
);
622 * Expand compressed domain name to presentation format.
625 *\li Number of bytes read out of `src', or -1 (with errno set).
628 *\li Root domain returns as "." not "".
631 ns_name_uncompress(const u_char
*msg
, const u_char
*eom
, const u_char
*src
,
632 char *dst
, size_t dstsiz
)
634 u_char tmp
[NS_MAXCDNAME
];
637 if ((n
= ns_name_unpack(msg
, eom
, src
, tmp
, sizeof tmp
)) == -1)
639 if (ns_name_ntop(tmp
, dst
, dstsiz
) == -1)
645 * Compress a domain name into wire format, using compression pointers.
648 *\li Number of bytes consumed in `dst' or -1 (with errno set).
651 *\li 'dnptrs' is an array of pointers to previous compressed names.
652 *\li dnptrs[0] is a pointer to the beginning of the message.
653 *\li The list ends with NULL. 'lastdnptr' is a pointer to the end of the
654 * array pointed to by 'dnptrs'. Side effect is to update the list of
655 * pointers for labels inserted into the message as we compress the name.
656 *\li If 'dnptr' is NULL, we don't try to compress names. If 'lastdnptr'
657 * is NULL, we don't update the list.
660 ns_name_compress(const char *src
, u_char
*dst
, size_t dstsiz
,
661 const u_char
**dnptrs
, const u_char
**lastdnptr
)
663 u_char tmp
[NS_MAXCDNAME
];
665 if (ns_name_pton(src
, tmp
, sizeof tmp
) == -1)
667 return (ns_name_pack(tmp
, dst
, (int)dstsiz
, dnptrs
, lastdnptr
));
671 * Reset dnptrs so that there are no active references to pointers at or
675 ns_name_rollback(const u_char
*src
, const u_char
**dnptrs
,
676 const u_char
**lastdnptr
)
678 while (dnptrs
< lastdnptr
&& *dnptrs
!= NULL
) {
679 if (*dnptrs
>= src
) {
688 * Advance *ptrptr to skip over the compressed name it points at.
691 *\li 0 on success, -1 (with errno set) on failure.
694 ns_name_skip(const u_char
**ptrptr
, const u_char
*eom
)
701 while (cp
< eom
&& (n
= *cp
++) != 0) {
702 /* Check for indirection. */
703 switch (n
& NS_CMPRSFLGS
) {
704 case 0: /*%< normal case, n == len */
707 case NS_TYPE_ELT
: /*%< EDNS0 extended label */
708 if ((l
= labellen(cp
- 1)) < 0) {
709 errno
= EMSGSIZE
; /*%< XXX */
714 case NS_CMPRSFLGS
: /*%< indirection */
717 default: /*%< illegal type */
731 /* Find the number of octets an nname takes up, including the root label.
732 * (This is basically ns_name_skip() without compression-pointer support.)
733 * ((NOTE: can only return zero if passed-in namesiz argument is zero.))
736 ns_name_length(ns_nname_ct nname
, size_t namesiz
) {
737 ns_nname_ct orig
= nname
;
740 while (namesiz
-- > 0 && (n
= *nname
++) != 0) {
741 if ((n
& NS_CMPRSFLGS
) != 0) {
752 return (nname
- orig
);
755 /* Compare two nname's for equality. Return -1 on error (setting errno).
758 ns_name_eq(ns_nname_ct a
, size_t as
, ns_nname_ct b
, size_t bs
) {
759 ns_nname_ct ae
= a
+ as
, be
= b
+ bs
;
762 while (ac
= *a
, bc
= *b
, ac
!= 0 && bc
!= 0) {
763 if ((ac
& NS_CMPRSFLGS
) != 0 || (bc
& NS_CMPRSFLGS
) != 0) {
767 if (a
+ ac
>= ae
|| b
+ bc
>= be
) {
771 if (ac
!= bc
|| strncasecmp((const char *) ++a
,
777 return (ac
== 0 && bc
== 0);
780 /* Is domain "A" owned by (at or below) domain "B"?
783 ns_name_owned(ns_namemap_ct a
, int an
, ns_namemap_ct b
, int bn
) {
784 /* If A is shorter, it cannot be owned by B. */
788 /* If they are unequal before the length of the shorter, A cannot... */
790 if (a
->len
!= b
->len
||
791 strncasecmp((const char *) a
->base
,
792 (const char *) b
->base
, (size_t)a
->len
) != 0)
798 /* A might be longer or not, but either way, B owns it. */
802 /* Build an array of <base,len> tuples from an nname, top-down order.
803 * Return the number of tuples (labels) thus discovered.
806 ns_name_map(ns_nname_ct nname
, size_t namelen
, ns_namemap_t map
, int mapsize
) {
815 /* Extra data follows name? */
823 /* Compression pointer? */
824 if ((n
& NS_CMPRSFLGS
) != 0) {
829 /* Label too long? */
835 /* Recurse to get rest of name done first. */
836 l
= ns_name_map(nname
+ n
, namelen
- n
, map
, mapsize
);
840 /* Too many labels? */
842 errno
= ENAMETOOLONG
;
846 /* We're on our way back up-stack, store current map data. */
852 /* Count the labels in a domain name. Root counts, so COM. has two. This
853 * is to make the result comparable to the result of ns_name_map().
856 ns_name_labels(ns_nname_ct nname
, size_t namesiz
) {
860 while (namesiz
-- > 0 && (n
= *nname
++) != 0) {
861 if ((n
& NS_CMPRSFLGS
) != 0) {
879 * Thinking in noninternationalized USASCII (per the DNS spec),
880 * is this characted special ("in need of quoting") ?
888 case 0x22: /*%< '"' */
889 case 0x2E: /*%< '.' */
890 case 0x3B: /*%< ';' */
891 case 0x5C: /*%< '\\' */
892 case 0x28: /*%< '(' */
893 case 0x29: /*%< ')' */
894 /* Special modifiers in zone files. */
895 case 0x40: /*%< '@' */
896 case 0x24: /*%< '$' */
904 * Thinking in noninternationalized USASCII (per the DNS spec),
905 * is this character visible and not a space when printed ?
912 return (ch
> 0x20 && ch
< 0x7f);
916 * Thinking in noninternationalized USASCII (per the DNS spec),
917 * convert this character to lower case if it's upper case.
921 if (ch
>= 0x41 && ch
<= 0x5A)
927 * Search for the counted-label name in an array of compressed names.
930 *\li offset from msg if found, or -1.
933 *\li dnptrs is the pointer to the first name on the list,
934 *\li not the pointer to the start of the message.
937 dn_find(const u_char
*domain
, const u_char
*msg
,
938 const u_char
* const *dnptrs
,
939 const u_char
* const *lastdnptr
)
941 const u_char
*dn
, *cp
, *sp
;
942 const u_char
* const *cpp
;
945 for (cpp
= dnptrs
; cpp
< lastdnptr
; cpp
++) {
948 * terminate search on:
950 * compression pointer
953 while (*sp
!= 0 && (*sp
& NS_CMPRSFLGS
) == 0 &&
954 (sp
- msg
) < 0x4000) {
957 while ((n
= *cp
++) != 0) {
959 * check for indirection
961 switch (n
& NS_CMPRSFLGS
) {
962 case 0: /*%< normal case, n == len */
963 n
= labellen(cp
- 1); /*%< XXX */
968 if (mklower(*dn
++) !=
971 /* Is next root for both ? */
972 if (*dn
== '\0' && *cp
== '\0') {
973 _DIAGASSERT(__type_fit(int,
975 return (int)(sp
- msg
);
980 case NS_CMPRSFLGS
: /*%< indirection */
981 cp
= msg
+ (((n
& 0x3f) << 8) | *cp
);
984 default: /*%< illegal type */
998 decode_bitstring(const unsigned char **cpp
, char *dn
, const char *eom
)
1000 const unsigned char *cp
= *cpp
;
1002 int b
, blen
, plen
, i
;
1004 if ((blen
= (*cp
& 0xff)) == 0)
1006 plen
= (blen
+ 3) / 4;
1007 plen
+= (int)sizeof("\\[x/]") + (blen
> 99 ? 3 : (blen
> 9) ? 2 : 1);
1008 if (dn
+ plen
>= eom
)
1012 i
= SPRINTF((dn
, "\\[x"));
1016 for (b
= blen
; b
> 7; b
-= 8, cp
++) {
1017 i
= SPRINTF((dn
, "%02x", *cp
& 0xff));
1024 i
= SPRINTF((dn
, "%02x", tc
& (0xff << (8 - b
))));
1030 i
= SPRINTF((dn
, "%1x",
1031 (((u_int32_t
)tc
>> 4) & 0x0f) & (0x0f << (4 - b
))));
1036 i
= SPRINTF((dn
, "/%d]", blen
));
1042 _DIAGASSERT(__type_fit(int, dn
- beg
));
1043 return (int)(dn
- beg
);
1047 encode_bitsring(const char **bp
, const char *end
, unsigned char **labelp
,
1048 unsigned char ** dst
, unsigned const char *eom
)
1051 const char *cp
= *bp
;
1054 const char *beg_blen
;
1055 char *end_blen
= NULL
;
1056 int value
= 0, count
= 0, tbcount
= 0, blen
= 0;
1058 beg_blen
= end_blen
= NULL
;
1060 /* a bitstring must contain at least 2 characters */
1064 /* XXX: currently, only hex strings are supported */
1067 if (!isxdigit((*cp
) & 0xff)) /*%< reject '\[x/BLEN]' */
1070 for (tp
= *dst
+ 1; cp
< end
&& tp
< eom
; cp
++) {
1072 case ']': /*%< end of the bitstring */
1074 if (beg_blen
== NULL
)
1076 blen
= (int)strtol(beg_blen
, &end_blen
, 10);
1077 if (*end_blen
!= ']')
1081 *tp
++ = ((value
<< 4) & 0xff);
1082 cp
++; /*%< skip ']' */
1089 if (!isdigit(c
&0xff))
1091 if (beg_blen
== NULL
) {
1094 /* blen never begings with 0 */
1100 if (!isxdigit(c
&0xff))
1103 value
+= digitvalue
[(int)c
];
1117 if (cp
>= end
|| tp
>= eom
)
1121 * bit length validation:
1122 * If a <length> is present, the number of digits in the <bit-data>
1123 * MUST be just sufficient to contain the number of bits specified
1124 * by the <length>. If there are insignificant bits in a final
1125 * hexadecimal or octal digit, they MUST be zero.
1126 * RFC2673, Section 3.2.
1131 if (((blen
+ 3) & ~3) != tbcount
)
1133 traillen
= tbcount
- blen
; /*%< between 0 and 3 */
1134 if (((value
<< (8 - traillen
)) & 0xff) != 0)
1142 /* encode the type and the significant bit fields */
1143 **labelp
= DNS_LABELTYPE_BITSTRING
;
1153 labellen(const u_char
*lp
)
1158 if ((l
& NS_CMPRSFLGS
) == NS_CMPRSFLGS
) {
1159 /* should be avoided by the caller */
1163 if ((l
& NS_CMPRSFLGS
) == NS_TYPE_ELT
) {
1164 if (l
== DNS_LABELTYPE_BITSTRING
) {
1165 if ((bitlen
= *(lp
+ 1)) == 0)
1167 return ((bitlen
+ 7 ) / 8 + 1);
1169 return (-1); /*%< unknwon ELT */