2 * Copyright (C) 2004, 2005 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 1999-2001, 2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
19 * $Id: tkey.c,v 1.71.2.1.10.7 2005/06/12 00:02:26 marka Exp $
24 #include <isc/buffer.h>
25 #include <isc/entropy.h>
28 #include <isc/string.h>
31 #include <dns/dnssec.h>
32 #include <dns/fixedname.h>
33 #include <dns/keyvalues.h>
35 #include <dns/message.h>
37 #include <dns/rdata.h>
38 #include <dns/rdatalist.h>
39 #include <dns/rdataset.h>
40 #include <dns/rdatastruct.h>
41 #include <dns/result.h>
46 #include <dst/gssapi.h>
48 #define TKEY_RANDOM_AMOUNT 16
50 #define RETERR(x) do { \
52 if (result != ISC_R_SUCCESS) \
57 tkey_log(const char *fmt, ...) ISC_FORMAT_PRINTF(1, 2);
60 tkey_log(const char *fmt, ...) {
64 isc_log_vwrite(dns_lctx, DNS_LOGCATEGORY_GENERAL,
65 DNS_LOGMODULE_REQUEST, ISC_LOG_DEBUG(4), fmt, ap);
70 dns_tkeyctx_create(isc_mem_t *mctx, isc_entropy_t *ectx, dns_tkeyctx_t **tctxp)
74 REQUIRE(mctx != NULL);
75 REQUIRE(ectx != NULL);
76 REQUIRE(tctxp != NULL && *tctxp == NULL);
78 tctx = isc_mem_get(mctx, sizeof(dns_tkeyctx_t));
80 return (ISC_R_NOMEMORY);
82 isc_mem_attach(mctx, &tctx->mctx);
84 isc_entropy_attach(ectx, &tctx->ectx);
90 return (ISC_R_SUCCESS);
94 dns_tkeyctx_destroy(dns_tkeyctx_t **tctxp) {
98 REQUIRE(tctxp != NULL && *tctxp != NULL);
103 if (tctx->dhkey != NULL)
104 dst_key_free(&tctx->dhkey);
105 if (tctx->domain != NULL) {
106 if (dns_name_dynamic(tctx->domain))
107 dns_name_free(tctx->domain, mctx);
108 isc_mem_put(mctx, tctx->domain, sizeof(dns_name_t));
110 isc_entropy_detach(&tctx->ectx);
111 isc_mem_put(mctx, tctx, sizeof(dns_tkeyctx_t));
112 isc_mem_detach(&mctx);
117 add_rdata_to_list(dns_message_t *msg, dns_name_t *name, dns_rdata_t *rdata,
118 isc_uint32_t ttl, dns_namelist_t *namelist)
121 isc_region_t r, newr;
122 dns_rdata_t *newrdata = NULL;
123 dns_name_t *newname = NULL;
124 dns_rdatalist_t *newlist = NULL;
125 dns_rdataset_t *newset = NULL;
126 isc_buffer_t *tmprdatabuf = NULL;
128 RETERR(dns_message_gettemprdata(msg, &newrdata));
130 dns_rdata_toregion(rdata, &r);
131 RETERR(isc_buffer_allocate(msg->mctx, &tmprdatabuf, r.length));
132 isc_buffer_availableregion(tmprdatabuf, &newr);
133 memcpy(newr.base, r.base, r.length);
134 dns_rdata_fromregion(newrdata, rdata->rdclass, rdata->type, &newr);
135 dns_message_takebuffer(msg, &tmprdatabuf);
137 RETERR(dns_message_gettempname(msg, &newname));
138 dns_name_init(newname, NULL);
139 RETERR(dns_name_dup(name, msg->mctx, newname));
141 RETERR(dns_message_gettemprdatalist(msg, &newlist));
142 newlist->rdclass = newrdata->rdclass;
143 newlist->type = newrdata->type;
146 ISC_LIST_INIT(newlist->rdata);
147 ISC_LIST_APPEND(newlist->rdata, newrdata, link);
149 RETERR(dns_message_gettemprdataset(msg, &newset));
150 dns_rdataset_init(newset);
151 RETERR(dns_rdatalist_tordataset(newlist, newset));
153 ISC_LIST_INIT(newname->list);
154 ISC_LIST_APPEND(newname->list, newset, link);
156 ISC_LIST_APPEND(*namelist, newname, link);
158 return (ISC_R_SUCCESS);
161 if (newrdata != NULL) {
162 if (ISC_LINK_LINKED(newrdata, link))
163 ISC_LIST_UNLINK(newlist->rdata, newrdata, link);
164 dns_message_puttemprdata(msg, &newrdata);
167 dns_message_puttempname(msg, &newname);
168 if (newset != NULL) {
169 dns_rdataset_disassociate(newset);
170 dns_message_puttemprdataset(msg, &newset);
173 dns_message_puttemprdatalist(msg, &newlist);
178 free_namelist(dns_message_t *msg, dns_namelist_t *namelist) {
182 while (!ISC_LIST_EMPTY(*namelist)) {
183 name = ISC_LIST_HEAD(*namelist);
184 ISC_LIST_UNLINK(*namelist, name, link);
185 while (!ISC_LIST_EMPTY(name->list)) {
186 set = ISC_LIST_HEAD(name->list);
187 ISC_LIST_UNLINK(name->list, set, link);
188 dns_message_puttemprdataset(msg, &set);
190 dns_message_puttempname(msg, &name);
195 compute_secret(isc_buffer_t *shared, isc_region_t *queryrandomness,
196 isc_region_t *serverrandomness, isc_buffer_t *secret)
200 unsigned char digests[32];
203 isc_buffer_usedregion(shared, &r);
206 * MD5 ( query data | DH value ).
208 isc_md5_init(&md5ctx);
209 isc_md5_update(&md5ctx, queryrandomness->base,
210 queryrandomness->length);
211 isc_md5_update(&md5ctx, r.base, r.length);
212 isc_md5_final(&md5ctx, digests);
215 * MD5 ( server data | DH value ).
217 isc_md5_init(&md5ctx);
218 isc_md5_update(&md5ctx, serverrandomness->base,
219 serverrandomness->length);
220 isc_md5_update(&md5ctx, r.base, r.length);
221 isc_md5_final(&md5ctx, &digests[ISC_MD5_DIGESTLENGTH]);
224 * XOR ( DH value, MD5-1 | MD5-2).
226 isc_buffer_availableregion(secret, &r);
227 isc_buffer_usedregion(shared, &r2);
228 if (r.length < sizeof(digests) || r.length < r2.length)
229 return (ISC_R_NOSPACE);
230 if (r2.length > sizeof(digests)) {
231 memcpy(r.base, r2.base, r2.length);
232 for (i = 0; i < sizeof(digests); i++)
233 r.base[i] ^= digests[i];
234 isc_buffer_add(secret, r2.length);
236 memcpy(r.base, digests, sizeof(digests));
237 for (i = 0; i < r2.length; i++)
238 r.base[i] ^= r2.base[i];
239 isc_buffer_add(secret, sizeof(digests));
241 return (ISC_R_SUCCESS);
246 process_dhtkey(dns_message_t *msg, dns_name_t *signer, dns_name_t *name,
247 dns_rdata_tkey_t *tkeyin, dns_tkeyctx_t *tctx,
248 dns_rdata_tkey_t *tkeyout,
249 dns_tsig_keyring_t *ring, dns_namelist_t *namelist)
251 isc_result_t result = ISC_R_SUCCESS;
252 dns_name_t *keyname, ourname;
253 dns_rdataset_t *keyset = NULL;
254 dns_rdata_t keyrdata = DNS_RDATA_INIT, ourkeyrdata = DNS_RDATA_INIT;
255 isc_boolean_t found_key = ISC_FALSE, found_incompatible = ISC_FALSE;
256 dst_key_t *pubkey = NULL;
257 isc_buffer_t ourkeybuf, *shared = NULL;
258 isc_region_t r, r2, ourkeyr;
259 unsigned char keydata[DST_KEY_MAXSIZE];
260 unsigned int sharedsize;
262 unsigned char *randomdata = NULL, secretdata[256];
265 if (tctx->dhkey == NULL) {
266 tkey_log("process_dhtkey: tkey-dhkey not defined");
267 tkeyout->error = dns_tsigerror_badalg;
268 return (DNS_R_REFUSED);
271 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_HMACMD5_NAME)) {
272 tkey_log("process_dhtkey: algorithms other than "
273 "hmac-md5 are not supported");
274 tkeyout->error = dns_tsigerror_badalg;
275 return (ISC_R_SUCCESS);
279 * Look for a DH KEY record that will work with ours.
281 for (result = dns_message_firstname(msg, DNS_SECTION_ADDITIONAL);
282 result == ISC_R_SUCCESS && !found_key;
283 result = dns_message_nextname(msg, DNS_SECTION_ADDITIONAL))
286 dns_message_currentname(msg, DNS_SECTION_ADDITIONAL, &keyname);
288 result = dns_message_findtype(keyname, dns_rdatatype_key, 0,
290 if (result != ISC_R_SUCCESS)
293 for (result = dns_rdataset_first(keyset);
294 result == ISC_R_SUCCESS && !found_key;
295 result = dns_rdataset_next(keyset))
297 dns_rdataset_current(keyset, &keyrdata);
299 result = dns_dnssec_keyfromrdata(keyname, &keyrdata,
301 if (result != ISC_R_SUCCESS) {
302 dns_rdata_reset(&keyrdata);
305 if (dst_key_alg(pubkey) == DNS_KEYALG_DH) {
306 if (dst_key_paramcompare(pubkey, tctx->dhkey))
308 found_key = ISC_TRUE;
312 found_incompatible = ISC_TRUE;
314 dst_key_free(&pubkey);
315 dns_rdata_reset(&keyrdata);
320 if (found_incompatible) {
321 tkey_log("process_dhtkey: found an incompatible key");
322 tkeyout->error = dns_tsigerror_badkey;
323 return (ISC_R_SUCCESS);
325 tkey_log("process_dhtkey: failed to find a key");
326 return (DNS_R_FORMERR);
330 RETERR(add_rdata_to_list(msg, keyname, &keyrdata, ttl, namelist));
332 isc_buffer_init(&ourkeybuf, keydata, sizeof(keydata));
333 RETERR(dst_key_todns(tctx->dhkey, &ourkeybuf));
334 isc_buffer_usedregion(&ourkeybuf, &ourkeyr);
335 dns_rdata_fromregion(&ourkeyrdata, dns_rdataclass_any,
336 dns_rdatatype_key, &ourkeyr);
338 dns_name_init(&ourname, NULL);
339 dns_name_clone(dst_key_name(tctx->dhkey), &ourname);
342 * XXXBEW The TTL should be obtained from the database, if it exists.
344 RETERR(add_rdata_to_list(msg, &ourname, &ourkeyrdata, 0, namelist));
346 RETERR(dst_key_secretsize(tctx->dhkey, &sharedsize));
347 RETERR(isc_buffer_allocate(msg->mctx, &shared, sharedsize));
349 result = dst_key_computesecret(pubkey, tctx->dhkey, shared);
350 if (result != ISC_R_SUCCESS) {
351 tkey_log("process_dhtkey: failed to compute shared secret: %s",
352 isc_result_totext(result));
355 dst_key_free(&pubkey);
357 isc_buffer_init(&secret, secretdata, sizeof(secretdata));
359 randomdata = isc_mem_get(tkeyout->mctx, TKEY_RANDOM_AMOUNT);
360 if (randomdata == NULL)
363 result = isc_entropy_getdata(tctx->ectx, randomdata,
364 TKEY_RANDOM_AMOUNT, NULL, 0);
365 if (result != ISC_R_SUCCESS) {
366 tkey_log("process_dhtkey: failed to obtain entropy: %s",
367 isc_result_totext(result));
372 r.length = TKEY_RANDOM_AMOUNT;
373 r2.base = tkeyin->key;
374 r2.length = tkeyin->keylen;
375 RETERR(compute_secret(shared, &r2, &r, &secret));
376 isc_buffer_free(&shared);
378 RETERR(dns_tsigkey_create(name, &tkeyin->algorithm,
379 isc_buffer_base(&secret),
380 isc_buffer_usedlength(&secret),
381 ISC_TRUE, signer, tkeyin->inception,
382 tkeyin->expire, msg->mctx, ring, NULL));
384 /* This key is good for a long time */
385 tkeyout->inception = tkeyin->inception;
386 tkeyout->expire = tkeyin->expire;
388 tkeyout->key = randomdata;
389 tkeyout->keylen = TKEY_RANDOM_AMOUNT;
391 return (ISC_R_SUCCESS);
394 if (!ISC_LIST_EMPTY(*namelist))
395 free_namelist(msg, namelist);
397 isc_buffer_free(&shared);
399 dst_key_free(&pubkey);
400 if (randomdata != NULL)
401 isc_mem_put(tkeyout->mctx, randomdata, TKEY_RANDOM_AMOUNT);
406 process_gsstkey(dns_message_t *msg, dns_name_t *signer, dns_name_t *name,
407 dns_rdata_tkey_t *tkeyin, dns_tkeyctx_t *tctx,
408 dns_rdata_tkey_t *tkeyout,
409 dns_tsig_keyring_t *ring, dns_namelist_t *namelist)
411 isc_result_t result = ISC_R_SUCCESS;
412 dst_key_t *dstkey = NULL;
415 isc_region_t intoken;
416 unsigned char array[1024];
417 isc_buffer_t outtoken;
421 if (tctx->gsscred == NULL)
422 return (ISC_R_NOPERM);
424 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPI_NAME) &&
425 !dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPIMS_NAME)) {
426 tkeyout->error = dns_tsigerror_badalg;
427 return (ISC_R_SUCCESS);
430 intoken.base = tkeyin->key;
431 intoken.length = tkeyin->keylen;
433 isc_buffer_init(&outtoken, array, sizeof(array));
434 RETERR(dst_gssapi_acceptctx(name, tctx->gsscred, &intoken,
435 &outtoken, &gssctx));
438 RETERR(dst_key_fromgssapi(name, gssctx, msg->mctx, &dstkey));
440 result = dns_tsigkey_createfromkey(name, &tkeyin->algorithm,
441 dstkey, ISC_TRUE, signer,
442 tkeyin->inception, tkeyin->expire,
443 msg->mctx, ring, NULL);
444 if (result != ISC_R_SUCCESS)
447 if (result == ISC_R_NOTFOUND) {
448 tkeyout->error = dns_tsigerror_badalg;
449 return (ISC_R_SUCCESS);
451 if (result != ISC_R_SUCCESS)
454 /* This key is good for a long time */
455 isc_stdtime_get(&now);
456 tkeyout->inception = tkeyin->inception;
457 tkeyout->expire = tkeyin->expire;
459 tkeyout->key = isc_mem_get(msg->mctx,
460 isc_buffer_usedlength(&outtoken));
461 if (tkeyout->key == NULL) {
462 result = ISC_R_NOMEMORY;
465 tkeyout->keylen = isc_buffer_usedlength(&outtoken);
466 memcpy(tkeyout->key, isc_buffer_base(&outtoken), tkeyout->keylen);
468 return (ISC_R_SUCCESS);
472 dst_key_free(&dstkey);
478 process_deletetkey(dns_message_t *msg, dns_name_t *signer, dns_name_t *name,
479 dns_rdata_tkey_t *tkeyin,
480 dns_rdata_tkey_t *tkeyout,
481 dns_tsig_keyring_t *ring,
482 dns_namelist_t *namelist)
485 dns_tsigkey_t *tsigkey = NULL;
486 dns_name_t *identity;
491 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring);
492 if (result != ISC_R_SUCCESS) {
493 tkeyout->error = dns_tsigerror_badname;
494 return (ISC_R_SUCCESS);
498 * Only allow a delete if the identity that created the key is the
499 * same as the identity that signed the message.
501 identity = dns_tsigkey_identity(tsigkey);
502 if (identity == NULL || !dns_name_equal(identity, signer)) {
503 dns_tsigkey_detach(&tsigkey);
504 return (DNS_R_REFUSED);
508 * Set the key to be deleted when no references are left. If the key
509 * was not generated with TKEY and is in the config file, it may be
512 dns_tsigkey_setdeleted(tsigkey);
514 /* Release the reference */
515 dns_tsigkey_detach(&tsigkey);
517 return (ISC_R_SUCCESS);
521 dns_tkey_processquery(dns_message_t *msg, dns_tkeyctx_t *tctx,
522 dns_tsig_keyring_t *ring)
524 isc_result_t result = ISC_R_SUCCESS;
525 dns_rdata_tkey_t tkeyin, tkeyout;
526 isc_boolean_t freetkeyin = ISC_FALSE;
527 dns_name_t *qname, *name, *keyname, *signer, tsigner;
528 dns_fixedname_t fkeyname;
529 dns_rdataset_t *tkeyset;
531 dns_namelist_t namelist;
532 char tkeyoutdata[512];
533 isc_buffer_t tkeyoutbuf;
535 REQUIRE(msg != NULL);
536 REQUIRE(tctx != NULL);
537 REQUIRE(ring != NULL);
539 ISC_LIST_INIT(namelist);
542 * Interpret the question section.
544 result = dns_message_firstname(msg, DNS_SECTION_QUESTION);
545 if (result != ISC_R_SUCCESS)
546 return (DNS_R_FORMERR);
549 dns_message_currentname(msg, DNS_SECTION_QUESTION, &qname);
552 * Look for a TKEY record that matches the question.
556 result = dns_message_findname(msg, DNS_SECTION_ADDITIONAL, qname,
557 dns_rdatatype_tkey, 0, &name, &tkeyset);
558 if (result != ISC_R_SUCCESS) {
560 * Try the answer section, since that's where Win2000
563 if (dns_message_findname(msg, DNS_SECTION_ANSWER, qname,
564 dns_rdatatype_tkey, 0, &name,
565 &tkeyset) != ISC_R_SUCCESS)
567 result = DNS_R_FORMERR;
568 tkey_log("dns_tkey_processquery: couldn't find a TKEY "
569 "matching the question");
573 result = dns_rdataset_first(tkeyset);
574 if (result != ISC_R_SUCCESS) {
575 result = DNS_R_FORMERR;
578 dns_rdata_init(&rdata);
579 dns_rdataset_current(tkeyset, &rdata);
581 RETERR(dns_rdata_tostruct(&rdata, &tkeyin, NULL));
582 freetkeyin = ISC_TRUE;
584 if (tkeyin.error != dns_rcode_noerror) {
585 result = DNS_R_FORMERR;
590 * Before we go any farther, verify that the message was signed.
591 * GSSAPI TKEY doesn't require a signature, the rest do.
593 dns_name_init(&tsigner, NULL);
594 result = dns_message_signer(msg, &tsigner);
595 if (result != ISC_R_SUCCESS) {
596 if (tkeyin.mode == DNS_TKEYMODE_GSSAPI &&
597 result == ISC_R_NOTFOUND)
600 tkey_log("dns_tkey_processquery: query was not "
601 "properly signed - rejecting");
602 result = DNS_R_FORMERR;
608 tkeyout.common.rdclass = tkeyin.common.rdclass;
609 tkeyout.common.rdtype = tkeyin.common.rdtype;
610 ISC_LINK_INIT(&tkeyout.common, link);
611 tkeyout.mctx = msg->mctx;
613 dns_name_init(&tkeyout.algorithm, NULL);
614 dns_name_clone(&tkeyin.algorithm, &tkeyout.algorithm);
616 tkeyout.inception = tkeyout.expire = 0;
617 tkeyout.mode = tkeyin.mode;
619 tkeyout.keylen = tkeyout.otherlen = 0;
620 tkeyout.key = tkeyout.other = NULL;
623 * A delete operation must have a fully specified key name. If this
624 * is not a delete, we do the following:
626 * keyname = qname + defaultdomain
628 * keyname = <random hex> + defaultdomain
630 if (tkeyin.mode != DNS_TKEYMODE_DELETE) {
631 dns_tsigkey_t *tsigkey = NULL;
633 if (tctx->domain == NULL) {
634 tkey_log("dns_tkey_processquery: tkey-domain not set");
635 result = DNS_R_REFUSED;
639 dns_fixedname_init(&fkeyname);
640 keyname = dns_fixedname_name(&fkeyname);
642 if (!dns_name_equal(qname, dns_rootname)) {
643 unsigned int n = dns_name_countlabels(qname);
644 RUNTIME_CHECK(dns_name_copy(qname, keyname, NULL)
646 dns_name_getlabelsequence(keyname, 0, n - 1, keyname);
648 static char hexdigits[16] = {
649 '0', '1', '2', '3', '4', '5', '6', '7',
650 '8', '9', 'A', 'B', 'C', 'D', 'E', 'F' };
651 unsigned char randomdata[16];
656 result = isc_entropy_getdata(tctx->ectx,
660 if (result != ISC_R_SUCCESS)
663 for (i = 0, j = 0; i < sizeof(randomdata); i++) {
664 unsigned char val = randomdata[i];
665 randomtext[j++] = hexdigits[val >> 4];
666 randomtext[j++] = hexdigits[val & 0xF];
668 isc_buffer_init(&b, randomtext, sizeof(randomtext));
669 isc_buffer_add(&b, sizeof(randomtext));
670 result = dns_name_fromtext(keyname, &b, NULL,
672 if (result != ISC_R_SUCCESS)
675 result = dns_name_concatenate(keyname, tctx->domain,
677 if (result != ISC_R_SUCCESS)
680 result = dns_tsigkey_find(&tsigkey, keyname, NULL, ring);
681 if (result == ISC_R_SUCCESS) {
682 tkeyout.error = dns_tsigerror_badname;
683 dns_tsigkey_detach(&tsigkey);
684 goto failure_with_tkey;
685 } else if (result != ISC_R_NOTFOUND)
690 switch (tkeyin.mode) {
691 case DNS_TKEYMODE_DIFFIEHELLMAN:
692 tkeyout.error = dns_rcode_noerror;
693 RETERR(process_dhtkey(msg, signer, keyname, &tkeyin,
694 tctx, &tkeyout, ring,
697 case DNS_TKEYMODE_GSSAPI:
698 tkeyout.error = dns_rcode_noerror;
699 RETERR(process_gsstkey(msg, signer, keyname, &tkeyin,
700 tctx, &tkeyout, ring,
703 case DNS_TKEYMODE_DELETE:
704 tkeyout.error = dns_rcode_noerror;
705 RETERR(process_deletetkey(msg, signer, keyname,
709 case DNS_TKEYMODE_SERVERASSIGNED:
710 case DNS_TKEYMODE_RESOLVERASSIGNED:
711 result = DNS_R_NOTIMP;
714 tkeyout.error = dns_tsigerror_badmode;
718 dns_rdata_init(&rdata);
719 isc_buffer_init(&tkeyoutbuf, tkeyoutdata, sizeof(tkeyoutdata));
720 result = dns_rdata_fromstruct(&rdata, tkeyout.common.rdclass,
721 tkeyout.common.rdtype, &tkeyout,
725 dns_rdata_freestruct(&tkeyin);
726 freetkeyin = ISC_FALSE;
729 if (tkeyout.key != NULL)
730 isc_mem_put(msg->mctx, tkeyout.key, tkeyout.keylen);
731 if (tkeyout.other != NULL)
732 isc_mem_put(msg->mctx, tkeyout.other, tkeyout.otherlen);
733 if (result != ISC_R_SUCCESS)
736 RETERR(add_rdata_to_list(msg, keyname, &rdata, 0, &namelist));
738 RETERR(dns_message_reply(msg, ISC_TRUE));
740 name = ISC_LIST_HEAD(namelist);
741 while (name != NULL) {
742 dns_name_t *next = ISC_LIST_NEXT(name, link);
743 ISC_LIST_UNLINK(namelist, name, link);
744 dns_message_addname(msg, name, DNS_SECTION_ANSWER);
748 return (ISC_R_SUCCESS);
752 dns_rdata_freestruct(&tkeyin);
753 if (!ISC_LIST_EMPTY(namelist))
754 free_namelist(msg, &namelist);
759 buildquery(dns_message_t *msg, dns_name_t *name,
760 dns_rdata_tkey_t *tkey)
762 dns_name_t *qname = NULL, *aname = NULL;
763 dns_rdataset_t *question = NULL, *tkeyset = NULL;
764 dns_rdatalist_t *tkeylist = NULL;
765 dns_rdata_t *rdata = NULL;
766 isc_buffer_t *dynbuf = NULL;
769 REQUIRE(msg != NULL);
770 REQUIRE(name != NULL);
771 REQUIRE(tkey != NULL);
773 RETERR(dns_message_gettempname(msg, &qname));
774 RETERR(dns_message_gettempname(msg, &aname));
776 RETERR(dns_message_gettemprdataset(msg, &question));
777 dns_rdataset_init(question);
778 dns_rdataset_makequestion(question, dns_rdataclass_any,
781 RETERR(isc_buffer_allocate(msg->mctx, &dynbuf, 512));
782 RETERR(dns_message_gettemprdata(msg, &rdata));
783 RETERR(dns_rdata_fromstruct(rdata, dns_rdataclass_any,
784 dns_rdatatype_tkey, tkey, dynbuf));
785 dns_message_takebuffer(msg, &dynbuf);
787 RETERR(dns_message_gettemprdatalist(msg, &tkeylist));
788 tkeylist->rdclass = dns_rdataclass_any;
789 tkeylist->type = dns_rdatatype_tkey;
790 tkeylist->covers = 0;
792 ISC_LIST_INIT(tkeylist->rdata);
793 ISC_LIST_APPEND(tkeylist->rdata, rdata, link);
795 RETERR(dns_message_gettemprdataset(msg, &tkeyset));
796 dns_rdataset_init(tkeyset);
797 RETERR(dns_rdatalist_tordataset(tkeylist, tkeyset));
799 dns_name_init(qname, NULL);
800 dns_name_clone(name, qname);
802 dns_name_init(aname, NULL);
803 dns_name_clone(name, aname);
805 ISC_LIST_APPEND(qname->list, question, link);
806 ISC_LIST_APPEND(aname->list, tkeyset, link);
808 dns_message_addname(msg, qname, DNS_SECTION_QUESTION);
809 dns_message_addname(msg, aname, DNS_SECTION_ADDITIONAL);
811 return (ISC_R_SUCCESS);
815 dns_message_puttempname(msg, &qname);
817 dns_message_puttempname(msg, &aname);
818 if (question != NULL) {
819 dns_rdataset_disassociate(question);
820 dns_message_puttemprdataset(msg, &question);
823 isc_buffer_free(&dynbuf);
828 dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name,
829 dns_name_t *algorithm, isc_buffer_t *nonce,
830 isc_uint32_t lifetime)
832 dns_rdata_tkey_t tkey;
833 dns_rdata_t *rdata = NULL;
834 isc_buffer_t *dynbuf = NULL;
837 dns_namelist_t namelist;
841 REQUIRE(msg != NULL);
842 REQUIRE(key != NULL);
843 REQUIRE(dst_key_alg(key) == DNS_KEYALG_DH);
844 REQUIRE(dst_key_isprivate(key));
845 REQUIRE(name != NULL);
846 REQUIRE(algorithm != NULL);
848 tkey.common.rdclass = dns_rdataclass_any;
849 tkey.common.rdtype = dns_rdatatype_tkey;
850 ISC_LINK_INIT(&tkey.common, link);
851 tkey.mctx = msg->mctx;
852 dns_name_init(&tkey.algorithm, NULL);
853 dns_name_clone(algorithm, &tkey.algorithm);
854 isc_stdtime_get(&now);
855 tkey.inception = now;
856 tkey.expire = now + lifetime;
857 tkey.mode = DNS_TKEYMODE_DIFFIEHELLMAN;
859 isc_buffer_usedregion(nonce, &r);
861 r.base = isc_mem_get(msg->mctx, 0);
866 tkey.keylen = r.length;
870 RETERR(buildquery(msg, name, &tkey));
873 isc_mem_put(msg->mctx, r.base, 0);
875 RETERR(dns_message_gettemprdata(msg, &rdata));
876 RETERR(isc_buffer_allocate(msg->mctx, &dynbuf, 1024));
877 RETERR(dst_key_todns(key, dynbuf));
878 isc_buffer_usedregion(dynbuf, &r);
879 dns_rdata_fromregion(rdata, dns_rdataclass_any,
880 dns_rdatatype_key, &r);
881 dns_message_takebuffer(msg, &dynbuf);
883 dns_name_init(&keyname, NULL);
884 dns_name_clone(dst_key_name(key), &keyname);
886 ISC_LIST_INIT(namelist);
887 RETERR(add_rdata_to_list(msg, &keyname, rdata, 0, &namelist));
888 dns_message_addname(msg, ISC_LIST_HEAD(namelist),
889 DNS_SECTION_ADDITIONAL);
891 return (ISC_R_SUCCESS);
896 isc_buffer_free(&dynbuf);
901 dns_tkey_buildgssquery(dns_message_t *msg, dns_name_t *name,
902 dns_name_t *gname, void *cred,
903 isc_uint32_t lifetime, void **context)
905 dns_rdata_tkey_t tkey;
909 unsigned char array[1024];
911 REQUIRE(msg != NULL);
912 REQUIRE(name != NULL);
913 REQUIRE(gname != NULL);
914 REQUIRE(context != NULL && *context == NULL);
916 isc_buffer_init(&token, array, sizeof(array));
917 result = dst_gssapi_initctx(gname, cred, NULL, &token, context);
918 if (result != DNS_R_CONTINUE && result != ISC_R_SUCCESS)
921 tkey.common.rdclass = dns_rdataclass_any;
922 tkey.common.rdtype = dns_rdatatype_tkey;
923 ISC_LINK_INIT(&tkey.common, link);
925 dns_name_init(&tkey.algorithm, NULL);
926 dns_name_clone(DNS_TSIG_GSSAPI_NAME, &tkey.algorithm);
927 isc_stdtime_get(&now);
928 tkey.inception = now;
929 tkey.expire = now + lifetime;
930 tkey.mode = DNS_TKEYMODE_GSSAPI;
932 tkey.key = isc_buffer_base(&token);
933 tkey.keylen = isc_buffer_usedlength(&token);
937 RETERR(buildquery(msg, name, &tkey));
939 return (ISC_R_SUCCESS);
946 dns_tkey_builddeletequery(dns_message_t *msg, dns_tsigkey_t *key) {
947 dns_rdata_tkey_t tkey;
949 REQUIRE(msg != NULL);
950 REQUIRE(key != NULL);
952 tkey.common.rdclass = dns_rdataclass_any;
953 tkey.common.rdtype = dns_rdatatype_tkey;
954 ISC_LINK_INIT(&tkey.common, link);
955 tkey.mctx = msg->mctx;
956 dns_name_init(&tkey.algorithm, NULL);
957 dns_name_clone(key->algorithm, &tkey.algorithm);
958 tkey.inception = tkey.expire = 0;
959 tkey.mode = DNS_TKEYMODE_DELETE;
961 tkey.keylen = tkey.otherlen = 0;
962 tkey.key = tkey.other = NULL;
964 return (buildquery(msg, &key->name, &tkey));
968 find_tkey(dns_message_t *msg, dns_name_t **name, dns_rdata_t *rdata,
971 dns_rdataset_t *tkeyset;
974 result = dns_message_firstname(msg, section);
975 while (result == ISC_R_SUCCESS) {
977 dns_message_currentname(msg, section, name);
979 result = dns_message_findtype(*name, dns_rdatatype_tkey, 0,
981 if (result == ISC_R_SUCCESS) {
982 result = dns_rdataset_first(tkeyset);
983 if (result != ISC_R_SUCCESS)
985 dns_rdataset_current(tkeyset, rdata);
986 return (ISC_R_SUCCESS);
988 result = dns_message_nextname(msg, section);
990 if (result == ISC_R_NOMORE)
991 return (ISC_R_NOTFOUND);
996 dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg,
997 dst_key_t *key, isc_buffer_t *nonce,
998 dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring)
1000 dns_rdata_t qtkeyrdata = DNS_RDATA_INIT, rtkeyrdata = DNS_RDATA_INIT;
1001 dns_name_t keyname, *tkeyname, *theirkeyname, *ourkeyname, *tempname;
1002 dns_rdataset_t *theirkeyset = NULL, *ourkeyset = NULL;
1003 dns_rdata_t theirkeyrdata = DNS_RDATA_INIT;
1004 dst_key_t *theirkey = NULL;
1005 dns_rdata_tkey_t qtkey, rtkey;
1006 unsigned char secretdata[256];
1007 unsigned int sharedsize;
1008 isc_buffer_t *shared = NULL, secret;
1010 isc_result_t result;
1011 isc_boolean_t freertkey = ISC_FALSE;
1013 REQUIRE(qmsg != NULL);
1014 REQUIRE(rmsg != NULL);
1015 REQUIRE(key != NULL);
1016 REQUIRE(dst_key_alg(key) == DNS_KEYALG_DH);
1017 REQUIRE(dst_key_isprivate(key));
1019 REQUIRE(*outkey == NULL);
1021 if (rmsg->rcode != dns_rcode_noerror)
1022 return (ISC_RESULTCLASS_DNSRCODE + rmsg->rcode);
1023 RETERR(find_tkey(rmsg, &tkeyname, &rtkeyrdata, DNS_SECTION_ANSWER));
1024 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1025 freertkey = ISC_TRUE;
1027 RETERR(find_tkey(qmsg, &tempname, &qtkeyrdata,
1028 DNS_SECTION_ADDITIONAL));
1029 RETERR(dns_rdata_tostruct(&qtkeyrdata, &qtkey, NULL));
1031 if (rtkey.error != dns_rcode_noerror ||
1032 rtkey.mode != DNS_TKEYMODE_DIFFIEHELLMAN ||
1033 rtkey.mode != qtkey.mode ||
1034 !dns_name_equal(&rtkey.algorithm, &qtkey.algorithm) ||
1035 rmsg->rcode != dns_rcode_noerror)
1037 tkey_log("dns_tkey_processdhresponse: tkey mode invalid "
1039 result = DNS_R_INVALIDTKEY;
1040 dns_rdata_freestruct(&qtkey);
1044 dns_rdata_freestruct(&qtkey);
1046 dns_name_init(&keyname, NULL);
1047 dns_name_clone(dst_key_name(key), &keyname);
1051 RETERR(dns_message_findname(rmsg, DNS_SECTION_ANSWER, &keyname,
1052 dns_rdatatype_key, 0, &ourkeyname,
1055 result = dns_message_firstname(rmsg, DNS_SECTION_ANSWER);
1056 while (result == ISC_R_SUCCESS) {
1057 theirkeyname = NULL;
1058 dns_message_currentname(rmsg, DNS_SECTION_ANSWER,
1060 if (dns_name_equal(theirkeyname, ourkeyname))
1063 result = dns_message_findtype(theirkeyname, dns_rdatatype_key,
1065 if (result == ISC_R_SUCCESS) {
1066 RETERR(dns_rdataset_first(theirkeyset));
1070 result = dns_message_nextname(rmsg, DNS_SECTION_ANSWER);
1073 if (theirkeyset == NULL) {
1074 tkey_log("dns_tkey_processdhresponse: failed to find server "
1076 result = ISC_R_NOTFOUND;
1080 dns_rdataset_current(theirkeyset, &theirkeyrdata);
1081 RETERR(dns_dnssec_keyfromrdata(theirkeyname, &theirkeyrdata,
1082 rmsg->mctx, &theirkey));
1084 RETERR(dst_key_secretsize(key, &sharedsize));
1085 RETERR(isc_buffer_allocate(rmsg->mctx, &shared, sharedsize));
1087 RETERR(dst_key_computesecret(theirkey, key, shared));
1089 isc_buffer_init(&secret, secretdata, sizeof(secretdata));
1092 r.length = rtkey.keylen;
1094 isc_buffer_usedregion(nonce, &r2);
1096 r2.base = isc_mem_get(rmsg->mctx, 0);
1099 RETERR(compute_secret(shared, &r2, &r, &secret));
1101 isc_mem_put(rmsg->mctx, r2.base, 0);
1103 isc_buffer_usedregion(&secret, &r);
1104 result = dns_tsigkey_create(tkeyname, &rtkey.algorithm,
1105 r.base, r.length, ISC_TRUE,
1106 NULL, rtkey.inception, rtkey.expire,
1107 rmsg->mctx, ring, outkey);
1108 isc_buffer_free(&shared);
1109 dns_rdata_freestruct(&rtkey);
1110 dst_key_free(&theirkey);
1115 isc_buffer_free(&shared);
1117 if (theirkey != NULL)
1118 dst_key_free(&theirkey);
1121 dns_rdata_freestruct(&rtkey);
1127 dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg,
1128 dns_name_t *gname, void *cred, void **context,
1129 dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring)
1131 dns_rdata_t rtkeyrdata = DNS_RDATA_INIT, qtkeyrdata = DNS_RDATA_INIT;
1132 dns_name_t *tkeyname;
1133 dns_rdata_tkey_t rtkey, qtkey;
1134 isc_buffer_t outtoken;
1135 dst_key_t *dstkey = NULL;
1137 isc_result_t result;
1138 unsigned char array[1024];
1140 REQUIRE(qmsg != NULL);
1141 REQUIRE(rmsg != NULL);
1142 REQUIRE(gname != NULL);
1144 REQUIRE(*outkey == NULL);
1146 if (rmsg->rcode != dns_rcode_noerror)
1147 return (ISC_RESULTCLASS_DNSRCODE + rmsg->rcode);
1148 RETERR(find_tkey(rmsg, &tkeyname, &rtkeyrdata, DNS_SECTION_ANSWER));
1149 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1151 RETERR(find_tkey(qmsg, &tkeyname, &qtkeyrdata,
1152 DNS_SECTION_ADDITIONAL));
1153 RETERR(dns_rdata_tostruct(&qtkeyrdata, &qtkey, NULL));
1155 if (rtkey.error != dns_rcode_noerror ||
1156 rtkey.mode != DNS_TKEYMODE_GSSAPI ||
1157 !dns_name_equal(&rtkey.algorithm, &rtkey.algorithm))
1159 tkey_log("dns_tkey_processdhresponse: tkey mode invalid "
1161 result = DNS_R_INVALIDTKEY;
1165 isc_buffer_init(&outtoken, array, sizeof(array));
1167 r.length = rtkey.keylen;
1168 RETERR(dst_gssapi_initctx(gname, cred, &r, &outtoken, context));
1171 RETERR(dst_key_fromgssapi(dns_rootname, *context, rmsg->mctx,
1174 RETERR(dns_tsigkey_createfromkey(tkeyname, DNS_TSIG_GSSAPI_NAME,
1175 dstkey, ISC_TRUE, NULL,
1176 rtkey.inception, rtkey.expire,
1177 rmsg->mctx, ring, outkey));
1179 dns_rdata_freestruct(&rtkey);
1187 dns_tkey_processdeleteresponse(dns_message_t *qmsg, dns_message_t *rmsg,
1188 dns_tsig_keyring_t *ring)
1190 dns_rdata_t qtkeyrdata = DNS_RDATA_INIT, rtkeyrdata = DNS_RDATA_INIT;
1191 dns_name_t *tkeyname, *tempname;
1192 dns_rdata_tkey_t qtkey, rtkey;
1193 dns_tsigkey_t *tsigkey = NULL;
1194 isc_result_t result;
1196 REQUIRE(qmsg != NULL);
1197 REQUIRE(rmsg != NULL);
1199 if (rmsg->rcode != dns_rcode_noerror)
1200 return(ISC_RESULTCLASS_DNSRCODE + rmsg->rcode);
1202 RETERR(find_tkey(rmsg, &tkeyname, &rtkeyrdata, DNS_SECTION_ANSWER));
1203 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1205 RETERR(find_tkey(qmsg, &tempname, &qtkeyrdata,
1206 DNS_SECTION_ADDITIONAL));
1207 RETERR(dns_rdata_tostruct(&qtkeyrdata, &qtkey, NULL));
1209 if (rtkey.error != dns_rcode_noerror ||
1210 rtkey.mode != DNS_TKEYMODE_DELETE ||
1211 rtkey.mode != qtkey.mode ||
1212 !dns_name_equal(&rtkey.algorithm, &qtkey.algorithm) ||
1213 rmsg->rcode != dns_rcode_noerror)
1215 tkey_log("dns_tkey_processdeleteresponse: tkey mode invalid "
1217 result = DNS_R_INVALIDTKEY;
1218 dns_rdata_freestruct(&qtkey);
1219 dns_rdata_freestruct(&rtkey);
1223 dns_rdata_freestruct(&qtkey);
1225 RETERR(dns_tsigkey_find(&tsigkey, tkeyname, &rtkey.algorithm, ring));
1227 dns_rdata_freestruct(&rtkey);
1230 * Mark the key as deleted.
1232 dns_tsigkey_setdeleted(tsigkey);
1234 * Release the reference.
1236 dns_tsigkey_detach(&tsigkey);