1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553
|
/*
* Copyright 2005-2012 SPARTA, Inc. All rights reserved.
* See the COPYING file distributed with this software for details.
*/
/*
* DESCRIPTION
* Parsing functions for some useful RR types
*/
#include "validator-internal.h"
#include "val_parse.h"
#include "val_support.h"
#include "val_crypto.h"
/*
* From RFC 4034
* Assumes that int is at least 16 bits.
* First octet of the key tag is the most significant 8 bits of the
* return value;
* Second octet of the key tag is the least significant 8 bits of the
* return value.
*/
u_int16_t
keytag(const u_char key[], /* the RDATA part of the DNSKEY RR */
size_t keysize /* the RDLENGTH */
)
{
u_int32_t ac; /* assumed to be 32 bits or larger */
size_t i; /* loop index */
if (key == NULL)
return 0;
for (ac = 0, i = 0; i < keysize; ++i)
ac += (i & 1) ? key[i] : key[i] << 8;
ac += (ac >> 16) & 0xFFFF;
return ac & 0xFFFF;
}
/*
* Parse a domain name
*/
int
val_parse_dname(const u_char *buf, size_t buflen, size_t offset,
char *dname, size_t *dlen)
{
size_t newoffset;
size_t nindex = 0;
size_t count = 0;
int compressed = 0;
if ((dname == NULL) || (dlen == NULL)
|| (buf == NULL) || (offset > buflen))
return VAL_BAD_ARGUMENT;
newoffset = offset;
memset(dname, 0, sizeof(dname));
*dlen = 0;
while ((newoffset < buflen) && (buf[newoffset] != 0)) {
size_t len, i;
if ((buf[newoffset] & 0xC0) == 0xC0) { /* domain name compression */
newoffset =
((buf[newoffset] & 0x3F) << 8) + buf[newoffset + 1];
if (!compressed) {
count += 1;
}
compressed = 1;
continue;
}
len = buf[newoffset];
for (i = 1; (i <= len) && ((newoffset + i) < buflen); i++) {
dname[nindex++] = buf[newoffset + i];
}
dname[nindex++] = '.';
dname[nindex] = '\0';
if (!compressed) {
count += (len + 1);
}
newoffset += (len + 1);
}
*dlen = count + 1;
return VAL_NO_ERROR;
}
/*
* Parse rdata portion of a DNSKEY Resource Record.
* Returns the number of bytes in the DNSKEY rdata portion that were parsed on success.
* Returns 0 on failure.
*/
int
val_parse_dnskey_rdata(const u_char *buf, size_t buflen,
val_dnskey_rdata_t * rdata)
{
size_t index = 0;
const u_char *cp;
if (!rdata || !buf)
return VAL_BAD_ARGUMENT;
if (index + 4 > buflen)
return VAL_BAD_ARGUMENT;
cp = buf;
VAL_GET16(rdata->flags, cp);
index += 2;
rdata->protocol = (u_char) (buf[index]);
index += 1;
rdata->algorithm = (u_char) (buf[index]);
index += 1;
rdata->public_key_len = (buflen > index) ? (buflen - index) : 0;
if (rdata->public_key_len > 0) {
rdata->public_key =
(u_char *) MALLOC(rdata->public_key_len * sizeof(u_char));
if (rdata->public_key == NULL)
return VAL_OUT_OF_MEMORY;
memcpy(rdata->public_key, buf + index, rdata->public_key_len);
index += rdata->public_key_len;
} else
rdata->public_key = NULL;
if (rdata->algorithm == ALG_RSAMD5) {
rdata->key_tag = rsamd5_keytag(buf, buflen);
} else {
rdata->key_tag = keytag(buf, buflen);
}
return VAL_NO_ERROR;
}
#define TOK_IN_STR() do { \
int i = 0; \
token[0] = '\0'; \
while ((sp < ep) && isspace(*sp)) \
sp++; \
if (sp >= ep) \
return VAL_BAD_ARGUMENT; \
while ((sp < ep) && !isspace(*sp) && (i<sizeof(token))) { \
token[i++] = *sp++; \
} \
token[i] = '\0'; \
} while (0)
/*
* Parse the ds record from the string. The string contains
* the keytag, Algorithm and Digest type fields
* delimited by spaces.
*/
int
val_parse_ds_string(char *dsstr, size_t dsstrlen,
val_ds_rdata_t ** ds_rdata)
{
char *sp = dsstr;
char *ep = sp + dsstrlen;
char token[NS_MAXDNAME];
char *dsptr = NULL;
char *cp;
size_t bufsize;
int i;
if (dsstr == NULL || ds_rdata == NULL)
return VAL_BAD_ARGUMENT;
(*ds_rdata) =
(val_ds_rdata_t *) MALLOC(sizeof(val_ds_rdata_t));
if ((*ds_rdata) == NULL)
return VAL_OUT_OF_MEMORY;
TOK_IN_STR();
(*ds_rdata)->d_keytag = (int)strtol(token, (char **)NULL, 10);
TOK_IN_STR();
(*ds_rdata)->d_algo = (int)strtol(token, (char **)NULL, 10);
TOK_IN_STR();
(*ds_rdata)->d_type = (int)strtol(token, (char **)NULL, 10);
/*
* What follows is the DS hash
*/
if (sp >= ep) {
FREE(*ds_rdata);
*ds_rdata = NULL;
return VAL_CONF_PARSE_ERROR;
}
/*
* Remove any white spaces
*/
for (cp = sp; sp < ep; sp++) {
if (!isspace(*sp)) {
if (dsptr == NULL)
dsptr = cp;
if (cp != sp)
*cp = *sp;
cp++;
}
}
*cp = '\0';
ep = cp;
bufsize = ep - dsptr;
if (bufsize == 0) {
FREE(*ds_rdata);
*ds_rdata = NULL;
return VAL_CONF_PARSE_ERROR;
}
(*ds_rdata)->d_hash =
(u_char *) MALLOC(bufsize * sizeof(u_char));
if ((*ds_rdata)->d_hash == NULL) {
FREE(*ds_rdata);
*ds_rdata = NULL;
return VAL_OUT_OF_MEMORY;
}
/* Convert the hex string to a byte string */
i = 0;
while (dsptr < ep && i < bufsize) {
char hexdigit[3];
memcpy(hexdigit, dsptr, 2);
hexdigit[2] = '\0';
(*ds_rdata)->d_hash[i++] = (u_char)strtol(hexdigit, NULL, 16);
dsptr = dsptr+2;
}
(*ds_rdata)->d_hash_len = i;
return VAL_NO_ERROR;
}
/*
* Parse the dnskey from the string. The string contains the flags,
* protocol, algorithm and the base64 key delimited by spaces.
*/
int
val_parse_dnskey_string(char *keystr, size_t keystrlen,
val_dnskey_rdata_t ** dnskey_rdata)
{
char *sp = keystr;
char *ep = sp + keystrlen;
char token[NS_MAXDNAME];
char *keyptr = NULL;
char *cp;
size_t bufsize;
size_t buflen;
u_char *buf;
u_char *bp;
u_int16_t flags;
if (keystr == NULL || dnskey_rdata == NULL)
return VAL_BAD_ARGUMENT;
(*dnskey_rdata) =
(val_dnskey_rdata_t *) MALLOC(sizeof(val_dnskey_rdata_t));
if ((*dnskey_rdata) == NULL)
return VAL_OUT_OF_MEMORY;
TOK_IN_STR();
(*dnskey_rdata)->flags = (int)strtol(token, (char **)NULL, 10);
TOK_IN_STR();
(*dnskey_rdata)->protocol = (int)strtol(token, (char **)NULL, 10);
TOK_IN_STR();
(*dnskey_rdata)->algorithm = (int)strtol(token, (char **)NULL, 10);
if (sp >= ep) {
FREE(*dnskey_rdata);
*dnskey_rdata = NULL;
return VAL_CONF_PARSE_ERROR;
}
/*
* What follows is the public key in base64.
*/
/*
* Remove any white spaces
*/
for (cp = sp; sp < ep; sp++) {
if (!isspace(*sp)) {
if (keyptr == NULL)
keyptr = cp;
if (cp != sp)
*cp = *sp;
cp++;
}
}
*cp = '\0';
ep = cp; /* this is the last character in the public key */
if (keyptr == NULL || keyptr >= ep) {
FREE(*dnskey_rdata);
*dnskey_rdata = NULL;
return VAL_CONF_PARSE_ERROR;
}
bufsize = ep - keyptr;
(*dnskey_rdata)->public_key =
(u_char *) MALLOC(bufsize * sizeof(char));
if ((*dnskey_rdata)->public_key == NULL) {
FREE(*dnskey_rdata);
*dnskey_rdata = NULL;
return VAL_OUT_OF_MEMORY;
}
/*
* decode the base64 public key
*/
if (((*dnskey_rdata)->public_key_len =
decode_base64_key(keyptr, (*dnskey_rdata)->
public_key, bufsize)) <= 0) {
FREE((*dnskey_rdata)->public_key);
FREE(*dnskey_rdata);
*dnskey_rdata = NULL;
return VAL_BAD_ARGUMENT;
}
/*
* For calculating the keytag, we need the
* complete DNSKEY RDATA in wire format
*/
buflen = (*dnskey_rdata)->public_key_len + sizeof(u_int16_t) + /* flags */
sizeof(u_char) + /* proto */
sizeof(u_char); /*algo */
buf = (u_char *) MALLOC(buflen * sizeof(u_char));
if (buf == NULL) {
FREE((*dnskey_rdata)->public_key);
FREE(*dnskey_rdata);
*dnskey_rdata = NULL;
return VAL_OUT_OF_MEMORY;
}
bp = buf;
flags = (*dnskey_rdata)->flags;
memcpy(bp, &flags, sizeof(u_int16_t));
bp += sizeof(u_int16_t);
*bp = (*dnskey_rdata)->protocol;
bp++;
*bp = (*dnskey_rdata)->algorithm;
bp++;
memcpy(bp, (*dnskey_rdata)->public_key,
(*dnskey_rdata)->public_key_len);
/*
* Calculate the keytag
*/
if ((*dnskey_rdata)->algorithm == ALG_RSAMD5) {
(*dnskey_rdata)->key_tag = rsamd5_keytag(buf, buflen);
} else {
(*dnskey_rdata)->key_tag = keytag(buf, buflen);
}
(*dnskey_rdata)->next = NULL;
FREE(buf);
return VAL_NO_ERROR;
}
/*
* Parse rdata portion of an RRSIG Resource Record.
* Returns the number of bytes in the RRSIG rdata portion that were parsed.
* Caller assumes responsiblity for allocated dnskey_rdata memory.
*/
int
val_parse_rrsig_rdata(const u_char *buf, size_t buflen,
val_rrsig_rdata_t * rdata)
{
size_t index = 0;
const u_char *cp;
size_t namelen;
int retval;
if (!rdata || !buf)
return VAL_BAD_ARGUMENT;
if (index + 18 > buflen)
return VAL_BAD_ARGUMENT;
cp = buf;
VAL_GET16(rdata->type_covered, cp);
index += 2;
rdata->algorithm = (u_char) (buf[index]);
index += 1;
rdata->labels = (u_char) (buf[index]);
index += 1;
cp = (buf + index);
VAL_GET32(rdata->orig_ttl, cp);
index += 4;
VAL_GET32(rdata->sig_expr, cp);
index += 4;
VAL_GET32(rdata->sig_incp, cp);
index += 4;
VAL_GET16(rdata->key_tag, cp);
index += 2;
if (VAL_NO_ERROR !=
(retval = val_parse_dname(buf, buflen, index,
(char *) rdata->signer_name,
&namelen))) {
return retval;
}
index += namelen;
rdata->signature_len = (buflen > index) ? (buflen - index) : 0;
if (rdata->signature_len > 0) {
rdata->signature =
(u_char *) MALLOC(rdata->signature_len * sizeof(u_char));
if (rdata->signature == NULL)
return VAL_OUT_OF_MEMORY;
memcpy(rdata->signature, buf + index, rdata->signature_len);
index += rdata->signature_len;
} else
rdata->signature = NULL;
return VAL_NO_ERROR;
}
/*
* Parse rdata portion of a DS Resource Record.
*/
int
val_parse_ds_rdata(const u_char *buf, size_t buflen,
val_ds_rdata_t * rdata)
{
size_t index = 0;
const u_char *cp = buf;
if (!rdata || !buf)
return VAL_BAD_ARGUMENT;
if (index + 2 + 1 + 1 > buflen)
return VAL_BAD_ARGUMENT;
VAL_GET16(rdata->d_keytag, cp);
index += 2;
rdata->d_algo = (u_char) (buf[index]);
index += 1;
rdata->d_type = (u_char) (buf[index]);
index += 1;
/*
* Only SHA-1 is understood
*/
if (rdata->d_type == ALG_DS_HASH_SHA1)
rdata->d_hash_len = SHA_DIGEST_LENGTH;
else if (rdata->d_type == ALG_DS_HASH_SHA256)
rdata->d_hash_len = SHA256_DIGEST_LENGTH;
else
return VAL_NOT_IMPLEMENTED;
if (index + rdata->d_hash_len > buflen)
return VAL_BAD_ARGUMENT;
rdata->d_hash =
(u_char *) MALLOC(rdata->d_hash_len * sizeof(u_char));
if (rdata->d_hash == NULL)
return VAL_OUT_OF_MEMORY;
memcpy(rdata->d_hash, buf + index, rdata->d_hash_len);
index += rdata->d_hash_len;
return VAL_NO_ERROR;
}
#ifdef LIBVAL_NSEC3
val_nsec3_rdata_t *
val_parse_nsec3_rdata(u_char * rr_rdata, size_t rdatalen,
val_nsec3_rdata_t * nd)
{
u_char *cp;
size_t nexthashlen, retlen;
u_char *nexthash;
if (nd == NULL)
return NULL;
cp = rr_rdata;
if (rdatalen < 5) {
/*
* somethings wrong
*/
return NULL;
}
nd->alg = *cp;
cp += 1;
nd->flags = *cp;
cp += 1;
VAL_GET16(nd->iterations, cp);
nd->saltlen = *cp;
cp += 1;
if ((cp - rr_rdata) >= rdatalen)
return NULL;
nd->salt = cp;
cp += nd->saltlen;
if ((cp - rr_rdata) >= rdatalen)
return NULL;
nexthashlen = *cp;
cp += 1;
if ((cp - rr_rdata) >= rdatalen)
return NULL;
nexthash = cp;
cp += nexthashlen;
/* note that the next check does not check >= */
/* this is because the bit field can be empty */
if ((cp - rr_rdata) > rdatalen)
return NULL;
base32hex_encode(nexthash, nexthashlen, &(nd->nexthash),
&retlen);
nd->nexthashlen = (u_char)retlen;
if (retlen > nd->nexthashlen)
return NULL;
/* bit field can be empty */
if (cp - rr_rdata == rdatalen) {
nd->bit_field = 0;
} else {
nd->bit_field = cp - rr_rdata;
}
return nd;
}
#endif
|