1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
|
// Copyright (C) 2012 Internet Systems Consortium, Inc. ("ISC")
//
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
#include <exceptions/exceptions.h>
#include <util/encode/hex.h>
#include <util/buffer.h>
#include <dns/exceptions.h>
#include <dns/rdata.h>
#include <dns/rdata/generic/detail/nsec3param_common.h>
#include <boost/lexical_cast.hpp>
#include <sstream>
#include <vector>
#include <stdint.h>
using namespace std;
using namespace isc::util;
using namespace isc::util::encode;
namespace isc {
namespace dns {
namespace rdata {
namespace generic {
namespace detail {
namespace nsec3 {
ParseNSEC3ParamResult
parseNSEC3ParamFromLexer(const char* const rrtype_name,
MasterLexer& lexer, vector<uint8_t>& salt)
{
const uint32_t hashalg =
lexer.getNextToken(MasterToken::NUMBER).getNumber();
if (hashalg > 0xff) {
isc_throw(InvalidRdataText, rrtype_name <<
" hash algorithm out of range: " << hashalg);
}
const uint32_t flags =
lexer.getNextToken(MasterToken::NUMBER).getNumber();
if (flags > 0xff) {
isc_throw(InvalidRdataText, rrtype_name << " flags out of range: " <<
flags);
}
const uint32_t iterations =
lexer.getNextToken(MasterToken::NUMBER).getNumber();
if (iterations > 0xffff) {
isc_throw(InvalidRdataText, rrtype_name <<
" iterations out of range: " << iterations);
}
const string salthex =
lexer.getNextToken(MasterToken::STRING).getString();
// Salt is up to 255 bytes, and space is not allowed in the HEX encoding,
// so the encoded string cannot be longer than the double of max length
// of the actual salt.
if (salthex.size() > 255 * 2) {
isc_throw(InvalidRdataText, rrtype_name << " salt is too long: "
<< salthex.size() << " (encoded) bytes");
}
if (salthex != "-") { // "-" means a 0-length salt
decodeHex(salthex, salt);
}
return (ParseNSEC3ParamResult(hashalg, flags, iterations));
}
ParseNSEC3ParamResult
parseNSEC3ParamWire(const char* const rrtype_name,
InputBuffer& buffer,
size_t& rdata_len, std::vector<uint8_t>& salt)
{
// NSEC3/NSEC3PARAM RR must have at least 5 octets:
// hash algorithm(1), flags(1), iteration(2), saltlen(1)
if (rdata_len < 5) {
isc_throw(DNSMessageFORMERR, rrtype_name << " too short, length: "
<< rdata_len);
}
const uint8_t hashalg = buffer.readUint8();
const uint8_t flags = buffer.readUint8();
const uint16_t iterations = buffer.readUint16();
const uint8_t saltlen = buffer.readUint8();
rdata_len -= 5;
if (rdata_len < saltlen) {
isc_throw(DNSMessageFORMERR, rrtype_name <<
" salt length is too large: " <<
static_cast<unsigned int>(saltlen));
}
salt.resize(saltlen);
if (saltlen > 0) {
buffer.readData(&salt[0], saltlen);
rdata_len -= saltlen;
}
return (ParseNSEC3ParamResult(hashalg, flags, iterations));
}
} // end of nsec3
} // end of detail
} // end of generic
} // end of rdata
} // end of dns
} // end of isc
|