4 * dname specific rdata implementations
5 * A dname is a rdf structure with type LDNS_RDF_TYPE_DNAME
6 * It is not a /real/ type! All function must therefor check
7 * for LDNS_RDF_TYPE_DNAME.
9 * a Net::DNS like library for C
11 * (c) NLnet Labs, 2004-2006
13 * See the file LICENSE for the license
16 #include <ldns/config.h>
18 #include <ldns/ldns.h>
20 #ifdef HAVE_NETINET_IN_H
21 #include <netinet/in.h>
23 #ifdef HAVE_SYS_SOCKET_H
24 #include <sys/socket.h>
29 #ifdef HAVE_ARPA_INET_H
30 #include <arpa/inet.h>
34 ldns_dname_cat_clone(const ldns_rdf *rd1, const ldns_rdf *rd2)
41 if (ldns_rdf_get_type(rd1) != LDNS_RDF_TYPE_DNAME ||
42 ldns_rdf_get_type(rd2) != LDNS_RDF_TYPE_DNAME) {
46 /* remove root label if it is present at the end of the left
47 * rd, by reducing the size with 1
49 left_size = ldns_rdf_size(rd1);
50 if (left_size > 0 &&ldns_rdf_data(rd1)[left_size - 1] == 0) {
54 /* we overwrite the nullbyte of rd1 */
55 new_size = left_size + ldns_rdf_size(rd2);
56 buf = LDNS_XMALLOC(uint8_t, new_size);
61 /* put the two dname's after each other */
62 memcpy(buf, ldns_rdf_data(rd1), left_size);
63 memcpy(buf + left_size, ldns_rdf_data(rd2), ldns_rdf_size(rd2));
65 new = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, new_size, buf);
72 ldns_dname_cat(ldns_rdf *rd1, ldns_rdf *rd2)
78 if (ldns_rdf_get_type(rd1) != LDNS_RDF_TYPE_DNAME ||
79 ldns_rdf_get_type(rd2) != LDNS_RDF_TYPE_DNAME) {
80 return LDNS_STATUS_ERR;
83 /* remove root label if it is present at the end of the left
84 * rd, by reducing the size with 1
86 left_size = ldns_rdf_size(rd1);
87 if (left_size > 0 &&ldns_rdf_data(rd1)[left_size - 1] == 0) {
91 return LDNS_STATUS_OK;
94 size = left_size + ldns_rdf_size(rd2);
95 newd = LDNS_XREALLOC(ldns_rdf_data(rd1), uint8_t, size);
97 return LDNS_STATUS_MEM_ERR;
100 ldns_rdf_set_data(rd1, newd);
101 memcpy(ldns_rdf_data(rd1) + left_size, ldns_rdf_data(rd2),
103 ldns_rdf_set_size(rd1, size);
105 return LDNS_STATUS_OK;
109 ldns_dname_reverse(const ldns_rdf *d)
116 d_tmp = ldns_rdf_clone(d);
118 new = ldns_dname_new_frm_str(".");
122 while(ldns_dname_label_count(d_tmp) > 0) {
123 tmp = ldns_dname_label(d_tmp, 0);
124 status = ldns_dname_cat(tmp, new);
125 if(status != LDNS_STATUS_OK) {
126 ldns_rdf_deep_free(new);
127 ldns_rdf_deep_free(d_tmp);
130 ldns_rdf_deep_free(new);
132 tmp = ldns_dname_left_chop(d_tmp);
133 ldns_rdf_deep_free(d_tmp);
136 ldns_rdf_deep_free(d_tmp);
142 ldns_dname_clone_from(const ldns_rdf *d, uint16_t n)
149 ldns_rdf_get_type(d) != LDNS_RDF_TYPE_DNAME ||
150 ldns_dname_label_count(d) < n) {
154 data = ldns_rdf_data(d);
155 data_size = ldns_rdf_size(d);
157 label_size = data[0] + 1;
159 if (data_size < label_size) {
160 /* this label is very broken */
163 data_size -= label_size;
167 return ldns_dname_new_frm_data(data_size, data);
171 ldns_dname_left_chop(const ldns_rdf *d)
180 if (ldns_rdf_get_type(d) != LDNS_RDF_TYPE_DNAME) {
183 if (ldns_dname_label_count(d) == 0) {
188 label_pos = ldns_rdf_data(d)[0];
190 chop = ldns_dname_new_frm_data(ldns_rdf_size(d) - label_pos - 1,
191 ldns_rdf_data(d) + label_pos + 1);
196 ldns_dname_label_count(const ldns_rdf *r)
209 r_size = ldns_rdf_size(r);
211 if (ldns_rdf_get_type(r) != LDNS_RDF_TYPE_DNAME) {
214 len = ldns_rdf_data(r)[src_pos]; /* start of the label */
216 /* single root label */
220 while ((len > 0) && src_pos < r_size) {
223 len = ldns_rdf_data(r)[src_pos];
232 ldns_dname_new(uint16_t s, void *d)
236 rd = LDNS_MALLOC(ldns_rdf);
240 ldns_rdf_set_size(rd, s);
241 ldns_rdf_set_type(rd, LDNS_RDF_TYPE_DNAME);
242 ldns_rdf_set_data(rd, d);
247 ldns_dname_new_frm_str(const char *str)
249 return ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, str);
253 ldns_dname_new_frm_data(uint16_t size, const void *data)
255 return ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, size, data);
259 ldns_dname2canonical(const ldns_rdf *rd)
264 if (ldns_rdf_get_type(rd) != LDNS_RDF_TYPE_DNAME) {
268 rdd = (uint8_t*)ldns_rdf_data(rd);
269 for (i = 0; i < ldns_rdf_size(rd); i++, rdd++) {
270 *rdd = (uint8_t)LDNS_DNAME_NORMALIZE((int)*rdd);
275 ldns_dname_is_subdomain(const ldns_rdf *sub, const ldns_rdf *parent)
280 ldns_rdf *tmp_sub = NULL;
281 ldns_rdf *tmp_par = NULL;
283 ldns_rdf *parent_clone;
286 if (ldns_rdf_get_type(sub) != LDNS_RDF_TYPE_DNAME ||
287 ldns_rdf_get_type(parent) != LDNS_RDF_TYPE_DNAME ||
288 ldns_rdf_compare(sub, parent) == 0) {
292 /* would be nicer if we do not have to clone... */
293 sub_clone = ldns_dname_clone_from(sub, 0);
294 parent_clone = ldns_dname_clone_from(parent, 0);
295 ldns_dname2canonical(sub_clone);
296 ldns_dname2canonical(parent_clone);
298 sub_lab = ldns_dname_label_count(sub_clone);
299 par_lab = ldns_dname_label_count(parent_clone);
301 /* if sub sits above parent, it cannot be a child/sub domain */
302 if (sub_lab < par_lab) {
305 /* check all labels the from the parent labels, from right to left.
306 * When they /all/ match we have found a subdomain
308 j = sub_lab - 1; /* we count from zero, thank you */
309 for (i = par_lab -1; i >= 0; i--) {
310 tmp_sub = ldns_dname_label(sub_clone, j);
311 tmp_par = ldns_dname_label(parent_clone, i);
312 if (!tmp_sub || !tmp_par) {
313 /* deep free does null check */
314 ldns_rdf_deep_free(tmp_sub);
315 ldns_rdf_deep_free(tmp_par);
320 if (ldns_rdf_compare(tmp_sub, tmp_par) != 0) {
321 /* they are not equal */
322 ldns_rdf_deep_free(tmp_sub);
323 ldns_rdf_deep_free(tmp_par);
327 ldns_rdf_deep_free(tmp_sub);
328 ldns_rdf_deep_free(tmp_par);
332 ldns_rdf_deep_free(sub_clone);
333 ldns_rdf_deep_free(parent_clone);
338 ldns_dname_compare(const ldns_rdf *dname1, const ldns_rdf *dname2)
340 size_t lc1, lc2, lc1f, lc2f;
345 /* see RFC4034 for this algorithm */
346 /* this algorithm assumes the names are normalized to case */
348 /* only when both are not NULL we can say anything about them */
349 if (!dname1 && !dname2) {
352 if (!dname1 || !dname2) {
355 /* asserts must happen later as we are looking in the
356 * dname, which could be NULL. But this case is handled
359 assert(ldns_rdf_get_type(dname1) == LDNS_RDF_TYPE_DNAME);
360 assert(ldns_rdf_get_type(dname2) == LDNS_RDF_TYPE_DNAME);
362 lc1 = ldns_dname_label_count(dname1);
363 lc2 = ldns_dname_label_count(dname2);
365 if (lc1 == 0 && lc2 == 0) {
376 /* we start at the last label */
378 /* find the label first */
380 lp1 = ldns_rdf_data(dname1);
386 /* and find the other one */
388 lp2 = ldns_rdf_data(dname2);
394 /* now check the label character for character. */
395 for (i = 1; i < (size_t)(*lp1 + 1); i++) {
397 /* apparently label 1 is larger */
401 if (LDNS_DNAME_NORMALIZE((int) *(lp1 + i)) <
402 LDNS_DNAME_NORMALIZE((int) *(lp2 + i))) {
405 } else if (LDNS_DNAME_NORMALIZE((int) *(lp1 + i)) >
406 LDNS_DNAME_NORMALIZE((int) *(lp2 + i))) {
412 /* apparently label 2 is larger */
416 if (lc1 == 0 && lc2 > 0) {
419 } else if (lc1 > 0 && lc2 == 0) {
422 } else if (lc1 == 0 && lc2 == 0) {
435 ldns_dname_is_wildcard(const ldns_rdf* dname)
437 return ( ldns_dname_label_count(dname) > 0 &&
438 ldns_rdf_data(dname)[0] == 1 &&
439 ldns_rdf_data(dname)[1] == '*');
443 ldns_dname_match_wildcard(const ldns_rdf *dname, const ldns_rdf *wildcard)
445 ldns_rdf *wc_chopped;
447 /* check whether it really is a wildcard */
448 if (ldns_dname_is_wildcard(wildcard)) {
449 /* ok, so the dname needs to be a subdomain of the wildcard
452 wc_chopped = ldns_dname_left_chop(wildcard);
453 result = (int) ldns_dname_is_subdomain(dname, wc_chopped);
454 ldns_rdf_deep_free(wc_chopped);
456 result = (ldns_dname_compare(dname, wildcard) == 0);
461 /* nsec test: does prev <= middle < next
463 * 0 = error/can't tell
467 ldns_dname_interval(const ldns_rdf *prev, const ldns_rdf *middle,
468 const ldns_rdf *next)
470 int prev_check, next_check;
472 assert(ldns_rdf_get_type(prev) == LDNS_RDF_TYPE_DNAME);
473 assert(ldns_rdf_get_type(middle) == LDNS_RDF_TYPE_DNAME);
474 assert(ldns_rdf_get_type(next) == LDNS_RDF_TYPE_DNAME);
476 prev_check = ldns_dname_compare(prev, middle);
477 next_check = ldns_dname_compare(middle, next);
478 /* <= next. This cannot be the case for nsec, because then we would
479 * have gotten the nsec of next...
481 if (next_check == 0) {
486 if ((prev_check == -1 || prev_check == 0) &&
497 ldns_dname_str_absolute(const char *dname_str)
500 if(dname_str && strcmp(dname_str, ".") == 0)
502 if(!dname_str || strlen(dname_str) < 2)
504 if(dname_str[strlen(dname_str) - 1] != '.')
506 if(dname_str[strlen(dname_str) - 2] != '\\')
507 return 1; /* ends in . and no \ before it */
508 /* so we have the case of ends in . and there is \ before it */
509 for(s=dname_str; *s; s++) {
511 if(s[1] && s[2] && s[3] /* check length */
512 && isdigit(s[1]) && isdigit(s[2]) &&
515 else if(!s[1] || isdigit(s[1])) /* escape of nul,0-9 */
516 return 0; /* parse error */
517 else s++; /* another character escaped */
519 else if(!*(s+1) && *s == '.')
520 return 1; /* trailing dot, unescaped */
526 ldns_dname_label(const ldns_rdf *rdf, uint8_t labelpos)
534 if (ldns_rdf_get_type(rdf) != LDNS_RDF_TYPE_DNAME) {
540 s = ldns_rdf_size(rdf);
542 len = ldns_rdf_data(rdf)[src_pos]; /* label start */
543 while ((len > 0) && src_pos < s) {
544 if (labelcnt == labelpos) {
545 /* found our label */
546 tmpnew = LDNS_MALLOC(ldns_rdf);
550 tmpnew->_type = LDNS_RDF_TYPE_DNAME;
551 tmpnew->_data = LDNS_XMALLOC(uint8_t, len + 2);
552 if (!tmpnew->_data) {
556 memset(tmpnew->_data, 0, len + 2);
557 memcpy(tmpnew->_data, ldns_rdf_data(rdf) + src_pos, len + 1);
558 tmpnew->_size = len + 2;
563 len = ldns_rdf_data(rdf)[src_pos];