config.c 19.8 KB
Newer Older
1
/*
Automatic Updater's avatar
Automatic Updater committed
2
 * Copyright (C) 2004-2007  Internet Systems Consortium, Inc. ("ISC")
Mark Andrews's avatar
Mark Andrews committed
3
 * Copyright (C) 2001-2003  Internet Software Consortium.
4
 *
Automatic Updater's avatar
Automatic Updater committed
5
 * Permission to use, copy, modify, and/or distribute this software for any
6
7
8
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
Mark Andrews's avatar
Mark Andrews committed
9
10
11
12
13
14
15
 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
 * AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
 * PERFORMANCE OF THIS SOFTWARE.
16
17
 */

Evan Hunt's avatar
Evan Hunt committed
18
/* $Id: config.c,v 1.80 2007/09/13 04:45:18 each Exp $ */
19
20

/*! \file */
Brian Wellington's avatar
Brian Wellington committed
21
22

#include <config.h>
23
24
25
26
27
28

#include <stdlib.h>

#include <isc/buffer.h>
#include <isc/log.h>
#include <isc/mem.h>
29
#include <isc/parseint.h>
30
31
32
#include <isc/region.h>
#include <isc/result.h>
#include <isc/sockaddr.h>
Evan Hunt's avatar
Evan Hunt committed
33
#include <isc/string.h>
34
35
#include <isc/util.h>

36
#include <isccfg/namedconf.h>
37
38
39
40

#include <dns/fixedname.h>
#include <dns/name.h>
#include <dns/rdataclass.h>
41
#include <dns/rdatatype.h>
Brian Wellington's avatar
Brian Wellington committed
42
#include <dns/tsig.h>
43
44
45
46
47
#include <dns/zone.h>

#include <named/config.h>
#include <named/globals.h>

48
/*% default configuration */
49
50
static char defaultconf[] = "\
options {\n\
51
52
53
#	blackhole {none;};\n"
#ifndef WIN32
"	coresize default;\n\
54
	datasize default;\n\
55
56
57
58
	files default;\n\
	stacksize default;\n"
#endif
"	deallocate-on-exit true;\n\
59
60
61
62
#	directory <none>\n\
	dump-file \"named_dump.db\";\n\
	fake-iquery no;\n\
	has-old-clients false;\n\
63
	heartbeat-interval 60;\n\
64
	host-statistics no;\n\
65
	interface-interval 60;\n\
66
67
	listen-on {any;};\n\
	listen-on-v6 {none;};\n\
68
	match-mapped-addresses no;\n\
69
70
	memstatistics-file \"named.memstats\";\n\
	multiple-cnames no;\n\
71
#	named-xfer <obsolete>;\n\
72
73
#	pid-file \"" NS_LOCALSTATEDIR "/named.pid\"; /* or /lwresd.pid */\n\
	port 53;\n\
74
	recursing-file \"named.recursing\";\n\
75
76
"
#ifdef PATH_RANDOMDEV
77
78
"\
	random-device \"" PATH_RANDOMDEV "\";\n\
79
80
"
#endif
81
82
"\
	recursive-clients 1000;\n\
83
	rrset-order {type NS order random; order cyclic; };\n\
84
	serial-queries 20;\n\
85
	serial-query-rate 20;\n\
86
	server-id none;\n\
87
	statistics-file \"named.stats\";\n\
88
	statistics-interval 60;\n\
89
	tcp-clients 100;\n\
Michael Graff's avatar
Michael Graff committed
90
	tcp-listen-queue 3;\n\
91
92
93
94
95
96
97
98
99
#	tkey-dhkey <none>\n\
#	tkey-gssapi-credential <none>\n\
#	tkey-domain <none>\n\
	transfers-per-ns 2;\n\
	transfers-in 10;\n\
	transfers-out 10;\n\
	treat-cr-as-space true;\n\
	use-id-pool true;\n\
	use-ixfr true;\n\
100
	edns-udp-size 4096;\n\
101
	max-udp-size 4096;\n\
102
103
104
105
\n\
	/* view */\n\
	allow-notify {none;};\n\
	allow-update-forwarding {none;};\n\
106
	allow-query-cache { localnets; localhost; };\n\
107
	allow-query-cache-on { any; };\n\
108
	allow-recursion { localnets; localhost; };\n\
109
	allow-recursion-on { any; };\n\
110
#	allow-v6-synthesis <obsolete>;\n\
111
112
113
#	sortlist <none>\n\
#	topology <none>\n\
	auth-nxdomain false;\n\
Bob Halley's avatar
Bob Halley committed
114
	minimal-responses false;\n\
115
116
117
118
119
120
121
122
123
124
125
	recursion true;\n\
	provide-ixfr true;\n\
	request-ixfr true;\n\
	fetch-glue no;\n\
	rfc2308-type1 no;\n\
	additional-from-auth true;\n\
	additional-from-cache true;\n\
	query-source address *;\n\
	query-source-v6 address *;\n\
	notify-source *;\n\
	notify-source-v6 *;\n\
126
	cleaning-interval 60;\n\
127
128
129
130
131
132
	min-roots 2;\n\
	lame-ttl 600;\n\
	max-ncache-ttl 10800; /* 3 hours */\n\
	max-cache-ttl 604800; /* 1 week */\n\
	transfer-format many-answers;\n\
	max-cache-size 0;\n\
133
134
	check-names master fail;\n\
	check-names slave warn;\n\
135
	check-names response ignore;\n\
136
	check-mx warn;\n\
137
	acache-enable no;\n\
138
139
	acache-cleaning-interval 60;\n\
	max-acache-size 0;\n\
140
141
	dnssec-enable yes;\n\
	dnssec-validation no; /* Make yes for 9.5. */ \n\
142
	dnssec-accept-expired no;\n\
143
144
	clients-per-query 10;\n\
	max-clients-per-query 100;\n\
145
	zero-no-soa-ttl-cache no;\n\
Mark Andrews's avatar
Mark Andrews committed
146
147
148
"

"	/* zone */\n\
149
	allow-query {any;};\n\
150
	allow-query-on {any;};\n\
151
152
153
	allow-transfer {any;};\n\
	notify yes;\n\
#	also-notify <none>\n\
154
	notify-delay 5;\n\
155
156
157
158
159
160
161
	dialup no;\n\
#	forward <none>\n\
#	forwarders <none>\n\
	maintain-ixfr-base no;\n\
#	max-ixfr-log-size <obsolete>\n\
	transfer-source *;\n\
	transfer-source-v6 *;\n\
162
	alt-transfer-source *;\n\
163
	alt-transfer-source-v6 *;\n\
164
165
166
167
	max-transfer-time-in 120;\n\
	max-transfer-time-out 120;\n\
	max-transfer-idle-in 60;\n\
	max-transfer-idle-out 60;\n\
168
169
170
171
	max-retry-time 1209600; /* 2 weeks */\n\
	min-retry-time 500;\n\
	max-refresh-time 2419200; /* 4 weeks */\n\
	min-refresh-time 300;\n\
172
	multi-master no;\n\
173
174
	sig-validity-interval 30; /* days */\n\
	zone-statistics false;\n\
175
	max-journal-size unlimited;\n\
176
	ixfr-from-differences false;\n\
177
	check-wildcard yes;\n\
178
179
	check-sibling yes;\n\
	check-integrity yes;\n\
180
181
	check-mx-cname warn;\n\
	check-srv-cname warn;\n\
182
	zero-no-soa-ttl yes;\n\
183
	update-check-ksk yes;\n\
184
	try-tcp-refresh yes; /* BIND 8 compat */\n\
185
};\n\
Mark Andrews's avatar
Mark Andrews committed
186
187
188
"

"#\n\
Mark Andrews's avatar
Mark Andrews committed
189
#  Zones in the \"_bind\" view are NOT counted in the count of zones.\n\
190
#\n\
191
192
view \"_bind\" chaos {\n\
	recursion no;\n\
193
	notify no;\n\
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
\n\
	zone \"version.bind\" chaos {\n\
		type master;\n\
		database \"_builtin version\";\n\
	};\n\
\n\
	zone \"hostname.bind\" chaos {\n\
		type master;\n\
		database \"_builtin hostname\";\n\
	};\n\
\n\
	zone \"authors.bind\" chaos {\n\
		type master;\n\
		database \"_builtin authors\";\n\
	};\n\
209
210
211
212
	zone \"id.server\" chaos {\n\
		type master;\n\
		database \"_builtin id\";\n\
	};\n\
213
};\n\
214
";
215
216
217
218
219
220
221
222
223
224
225

isc_result_t
ns_config_parsedefaults(cfg_parser_t *parser, cfg_obj_t **conf) {
	isc_buffer_t b;

	isc_buffer_init(&b, defaultconf, sizeof(defaultconf) - 1);
	isc_buffer_add(&b, sizeof(defaultconf) - 1);
	return (cfg_parse_buffer(parser, &b, &cfg_type_namedconf, conf));
}

isc_result_t
226
ns_config_get(const cfg_obj_t **maps, const char *name, const cfg_obj_t **obj) {
227
228
	int i;

229
	for (i = 0;; i++) {
230
231
232
233
234
235
236
		if (maps[i] == NULL)
			return (ISC_R_NOTFOUND);
		if (cfg_map_get(maps[i], name, obj) == ISC_R_SUCCESS)
			return (ISC_R_SUCCESS);
	}
}

237
isc_result_t
238
239
240
241
242
243
244
ns_checknames_get(const cfg_obj_t **maps, const char *which,
		  const cfg_obj_t **obj)
{
	const cfg_listelt_t *element;
	const cfg_obj_t *checknames;
	const cfg_obj_t *type;
	const cfg_obj_t *value;
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
	int i;

	for (i = 0;; i++) {
		if (maps[i] == NULL)
			return (ISC_R_NOTFOUND);
		checknames = NULL;
		if (cfg_map_get(maps[i], "check-names", &checknames) == ISC_R_SUCCESS) {
			/*
			 * Zone map entry is not a list.
			 */
			if (checknames != NULL && !cfg_obj_islist(checknames)) {
				*obj = checknames;
				return (ISC_R_SUCCESS);
			}
			for (element = cfg_list_first(checknames);
			     element != NULL;
			     element = cfg_list_next(element)) {
				value = cfg_listelt_value(element);
				type = cfg_tuple_get(value, "type");
				if (strcasecmp(cfg_obj_asstring(type), which) == 0) {
					*obj = cfg_tuple_get(value, "mode");
					return (ISC_R_SUCCESS);
				}
			}

		}
	}
}

274
int
275
276
ns_config_listcount(const cfg_obj_t *list) {
	const cfg_listelt_t *e;
277
278
279
280
281
282
283
284
285
	int i = 0;

	for (e = cfg_list_first(list); e != NULL; e = cfg_list_next(e))
		i++;

	return (i);
}

isc_result_t
286
ns_config_getclass(const cfg_obj_t *classobj, dns_rdataclass_t defclass,
287
		   dns_rdataclass_t *classp) {
288
	isc_textregion_t r;
289
	isc_result_t result;
290
291

	if (!cfg_obj_isstring(classobj)) {
292
		*classp = defclass;
293
294
		return (ISC_R_SUCCESS);
	}
295
296
	DE_CONST(cfg_obj_asstring(classobj), r.base);
	r.length = strlen(r.base);
297
298
299
	result = dns_rdataclass_fromtext(classp, &r);
	if (result != ISC_R_SUCCESS)
		cfg_obj_log(classobj, ns_g_lctx, ISC_LOG_ERROR,
300
			    "unknown class '%s'", r.base);
301
	return (result);
302
303
}

304
isc_result_t
305
ns_config_gettype(const cfg_obj_t *typeobj, dns_rdatatype_t deftype,
306
307
308
309
310
311
312
313
		   dns_rdatatype_t *typep) {
	isc_textregion_t r;
	isc_result_t result;

	if (!cfg_obj_isstring(typeobj)) {
		*typep = deftype;
		return (ISC_R_SUCCESS);
	}
314
315
	DE_CONST(cfg_obj_asstring(typeobj), r.base);
	r.length = strlen(r.base);
316
317
318
	result = dns_rdatatype_fromtext(typep, &r);
	if (result != ISC_R_SUCCESS)
		cfg_obj_log(typeobj, ns_g_lctx, ISC_LOG_ERROR,
319
			    "unknown type '%s'", r.base);
320
321
322
	return (result);
}

323
dns_zonetype_t
324
ns_config_getzonetype(const cfg_obj_t *zonetypeobj) {
325
	dns_zonetype_t ztype = dns_zone_none;
326
	const char *str;
327
328

	str = cfg_obj_asstring(zonetypeobj);
329
	if (strcasecmp(str, "master") == 0)
330
		ztype = dns_zone_master;
331
	else if (strcasecmp(str, "slave") == 0)
332
		ztype = dns_zone_slave;
333
	else if (strcasecmp(str, "stub") == 0)
334
335
336
337
338
339
340
		ztype = dns_zone_stub;
	else
		INSIST(0);
	return (ztype);
}

isc_result_t
341
ns_config_getiplist(const cfg_obj_t *config, const cfg_obj_t *list,
342
343
344
345
		    in_port_t defport, isc_mem_t *mctx,
		    isc_sockaddr_t **addrsp, isc_uint32_t *countp)
{
	int count, i = 0;
346
347
348
	const cfg_obj_t *addrlist;
	const cfg_obj_t *portobj;
	const cfg_listelt_t *element;
349
350
351
352
353
	isc_sockaddr_t *addrs;
	in_port_t port;
	isc_result_t result;

	INSIST(addrsp != NULL && *addrsp == NULL);
354
	INSIST(countp != NULL);
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406

	addrlist = cfg_tuple_get(list, "addresses");
	count = ns_config_listcount(addrlist);

	portobj = cfg_tuple_get(list, "port");
	if (cfg_obj_isuint32(portobj)) {
		isc_uint32_t val = cfg_obj_asuint32(portobj);
		if (val > ISC_UINT16_MAX) {
			cfg_obj_log(portobj, ns_g_lctx, ISC_LOG_ERROR,
				    "port '%u' out of range", val);
			return (ISC_R_RANGE);
		}
		port = (in_port_t) val;
	} else if (defport != 0)
		port = defport;
	else {
		result = ns_config_getport(config, &port);
		if (result != ISC_R_SUCCESS)
			return (result);
	}

	addrs = isc_mem_get(mctx, count * sizeof(isc_sockaddr_t));
	if (addrs == NULL)
		return (ISC_R_NOMEMORY);

	for (element = cfg_list_first(addrlist);
	     element != NULL;
	     element = cfg_list_next(element), i++)
	{
		INSIST(i < count);
		addrs[i] = *cfg_obj_assockaddr(cfg_listelt_value(element));
		if (isc_sockaddr_getport(&addrs[i]) == 0)
			isc_sockaddr_setport(&addrs[i], port);
	}
	INSIST(i == count);

	*addrsp = addrs;
	*countp = count;

	return (ISC_R_SUCCESS);
}

void
ns_config_putiplist(isc_mem_t *mctx, isc_sockaddr_t **addrsp,
		    isc_uint32_t count)
{
	INSIST(addrsp != NULL && *addrsp != NULL);

	isc_mem_put(mctx, *addrsp, count * sizeof(isc_sockaddr_t));
	*addrsp = NULL;
}

407
static isc_result_t
408
409
410
get_masters_def(const cfg_obj_t *cctx, const char *name,
	        const cfg_obj_t **ret)
{
411
	isc_result_t result;
412
413
	const cfg_obj_t *masters = NULL;
	const cfg_listelt_t *elt;
414
415
416
417
418
419
420

	result = cfg_map_get(cctx, "masters", &masters);
	if (result != ISC_R_SUCCESS)
		return (result);
	for (elt = cfg_list_first(masters);
	     elt != NULL;
	     elt = cfg_list_next(elt)) {
421
		const cfg_obj_t *list;
422
423
424
425
426
427
428
429
430
431
432
433
434
		const char *listname;

		list = cfg_listelt_value(elt);
		listname = cfg_obj_asstring(cfg_tuple_get(list, "name"));

		if (strcasecmp(listname, name) == 0) {
			*ret = list;
			return (ISC_R_SUCCESS);
		}
	}
	return (ISC_R_NOTFOUND);
}

435
isc_result_t
436
437
438
ns_config_getipandkeylist(const cfg_obj_t *config, const cfg_obj_t *list,
			  isc_mem_t *mctx, isc_sockaddr_t **addrsp,
			  dns_name_t ***keysp, isc_uint32_t *countp)
439
{
440
441
442
	isc_uint32_t addrcount = 0, keycount = 0, i = 0;
	isc_uint32_t listcount = 0, l = 0, j;
	isc_uint32_t stackcount = 0, pushed = 0;
443
	isc_result_t result;
444
445
446
	const cfg_listelt_t *element;
	const cfg_obj_t *addrlist;
	const cfg_obj_t *portobj;
447
448
449
450
	in_port_t port;
	dns_fixedname_t fname;
	isc_sockaddr_t *addrs = NULL;
	dns_name_t **keys = NULL;
Mark Andrews's avatar
Mark Andrews committed
451
	struct { const char *name; } *lists = NULL;
452
	struct {
453
		const cfg_listelt_t *element;
454
455
		in_port_t port;
	} *stack = NULL;
456

457
458
459
	REQUIRE(addrsp != NULL && *addrsp == NULL);
	REQUIRE(keysp != NULL && *keysp == NULL);
	REQUIRE(countp != NULL);
460

461
 newlist:
462
463
464
465
466
467
468
	addrlist = cfg_tuple_get(list, "addresses");
	portobj = cfg_tuple_get(list, "port");
	if (cfg_obj_isuint32(portobj)) {
		isc_uint32_t val = cfg_obj_asuint32(portobj);
		if (val > ISC_UINT16_MAX) {
			cfg_obj_log(portobj, ns_g_lctx, ISC_LOG_ERROR,
				    "port '%u' out of range", val);
469
470
			result = ISC_R_RANGE;
			goto cleanup;
471
472
473
474
475
		}
		port = (in_port_t) val;
	} else {
		result = ns_config_getport(config, &port);
		if (result != ISC_R_SUCCESS)
476
			goto cleanup;
477
478
479
480
	}

	result = ISC_R_NOMEMORY;

481
482
483
	element = cfg_list_first(addrlist);
 resume:
	for ( ;
484
	     element != NULL;
485
	     element = cfg_list_next(element))
486
	{
487
488
		const cfg_obj_t *addr;
		const cfg_obj_t *key;
489
		const char *keystr;
490
491
		isc_buffer_t b;

492
493
		addr = cfg_tuple_get(cfg_listelt_value(element),
				     "masterselement");
494
495
		key = cfg_tuple_get(cfg_listelt_value(element), "key");

496
		if (!cfg_obj_issockaddr(addr)) {
497
			const char *listname = cfg_obj_asstring(addr);
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
			isc_result_t tresult;

			/* Grow lists? */
			if (listcount == l) {
				void * new;
				isc_uint32_t newlen = listcount + 16;
				size_t newsize, oldsize;

				newsize = newlen * sizeof(*lists);
				oldsize = listcount * sizeof(*lists);
				new = isc_mem_get(mctx, newsize);
				if (new == NULL)
					goto cleanup;
				if (listcount != 0) {
					memcpy(new, lists, oldsize);
					isc_mem_put(mctx, lists, oldsize);
				}
				lists = new;
				listcount = newlen;
			}
			/* Seen? */
			for (j = 0; j < l; j++)
Mark Andrews's avatar
Mark Andrews committed
520
				if (strcasecmp(lists[j].name, listname) == 0)
521
522
523
524
525
526
527
528
529
530
531
532
533
					break;
			if (j < l)
				continue;
			tresult = get_masters_def(config, listname, &list);
			if (tresult == ISC_R_NOTFOUND) {
				cfg_obj_log(addr, ns_g_lctx, ISC_LOG_ERROR,
                                    "masters \"%s\" not found", listname);

				result = tresult;
				goto cleanup;
			}
			if (tresult != ISC_R_SUCCESS)
				goto cleanup;
Mark Andrews's avatar
Mark Andrews committed
534
			lists[l++].name = listname;
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
			/* Grow stack? */
			if (stackcount == pushed) {
				void * new;
				isc_uint32_t newlen = stackcount + 16;
				size_t newsize, oldsize;

				newsize = newlen * sizeof(*stack);
				oldsize = stackcount * sizeof(*stack);
				new = isc_mem_get(mctx, newsize);
				if (new == NULL)
					goto cleanup;
				if (stackcount != 0) {
					memcpy(new, stack, oldsize);
					isc_mem_put(mctx, stack, oldsize);
				}
				stack = new;
				stackcount = newlen;
			}
			/*
			 * We want to resume processing this list on the
			 * next element.
			 */
			stack[pushed].element = cfg_list_next(element);
			stack[pushed].port = port;
			pushed++;
			goto newlist;
		}

		if (i == addrcount) {
			void * new;
			isc_uint32_t newlen = addrcount + 16;
			size_t newsize, oldsize;

			newsize = newlen * sizeof(isc_sockaddr_t);
			oldsize = addrcount * sizeof(isc_sockaddr_t);
			new = isc_mem_get(mctx, newsize);
			if (new == NULL)
				goto cleanup;
			if (addrcount != 0) {
				memcpy(new, addrs, oldsize);
				isc_mem_put(mctx, addrs, oldsize);
			}
			addrs = new;
			addrcount = newlen;

			newsize = newlen * sizeof(dns_name_t *);
			oldsize = keycount * sizeof(dns_name_t *);
			new = isc_mem_get(mctx, newsize);
			if (new == NULL)
				goto cleanup;
			if (keycount != 0) {
586
587
				memcpy(new, keys, oldsize);
				isc_mem_put(mctx, keys, oldsize);
588
589
590
591
592
			}
			keys = new;
			keycount = newlen;
		}

593
594
595
596
		addrs[i] = *cfg_obj_assockaddr(addr);
		if (isc_sockaddr_getport(&addrs[i]) == 0)
			isc_sockaddr_setport(&addrs[i], port);
		keys[i] = NULL;
597
598
		if (!cfg_obj_isstring(key)) {
			i++;
599
			continue;
600
		}
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
		keys[i] = isc_mem_get(mctx, sizeof(dns_name_t));
		if (keys[i] == NULL)
			goto cleanup;
		dns_name_init(keys[i], NULL);
		
		keystr = cfg_obj_asstring(key);
		isc_buffer_init(&b, keystr, strlen(keystr));
		isc_buffer_add(&b, strlen(keystr));
		dns_fixedname_init(&fname);
		result = dns_name_fromtext(dns_fixedname_name(&fname), &b,
					   dns_rootname, ISC_FALSE, NULL);
		if (result != ISC_R_SUCCESS)
			goto cleanup;
		result = dns_name_dup(dns_fixedname_name(&fname), mctx,
				      keys[i]);
		if (result != ISC_R_SUCCESS)
			goto cleanup;
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
		i++;
	}
	if (pushed != 0) {
		pushed--;
		element = stack[pushed].element;
		port = stack[pushed].port;
		goto resume;
	}
	if (i < addrcount) {
		void * new;
		size_t newsize, oldsize;

		newsize = i * sizeof(isc_sockaddr_t);
		oldsize = addrcount * sizeof(isc_sockaddr_t);
		if (i != 0) {
			new = isc_mem_get(mctx, newsize);
			if (new == NULL)
				goto cleanup;
			memcpy(new, addrs, newsize);
		} else
			new = NULL;
639
		isc_mem_put(mctx, addrs, oldsize);
640
641
642
643
644
645
646
647
648
649
650
651
		addrs = new;
		addrcount = i;

		newsize = i * sizeof(dns_name_t *);
		oldsize = keycount * sizeof(dns_name_t *);
		if (i != 0) {
			new = isc_mem_get(mctx, newsize);
			if (new == NULL)
				goto cleanup;
			memcpy(new, keys,  newsize);
		} else
			new = NULL;
652
		isc_mem_put(mctx, keys, oldsize);
653
654
		keys = new;
		keycount = i;
655
	}
656
657
658
659
660
661
662

	if (lists != NULL)
		isc_mem_put(mctx, lists, listcount * sizeof(*lists));
	if (stack != NULL)
		isc_mem_put(mctx, stack, stackcount * sizeof(*stack));
	
	INSIST(keycount == addrcount);
663
664
665

	*addrsp = addrs;
	*keysp = keys;
666
	*countp = addrcount;
667
668
669
670
671

	return (ISC_R_SUCCESS);

 cleanup:
	if (addrs != NULL)
672
		isc_mem_put(mctx, addrs, addrcount * sizeof(isc_sockaddr_t));
673
	if (keys != NULL) {
674
		for (j = 0; j <= i; j++) {
675
676
677
678
679
680
			if (keys[j] == NULL)
				continue;
			if (dns_name_dynamic(keys[j]))
				dns_name_free(keys[j], mctx);
			isc_mem_put(mctx, keys[j], sizeof(dns_name_t));
		}
681
		isc_mem_put(mctx, keys, keycount * sizeof(dns_name_t *));
682
	}
683
684
685
686
	if (lists != NULL)
		isc_mem_put(mctx, lists, listcount * sizeof(*lists));
	if (stack != NULL)
		isc_mem_put(mctx, stack, stackcount * sizeof(*stack));
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
	return (result);
}

void
ns_config_putipandkeylist(isc_mem_t *mctx, isc_sockaddr_t **addrsp,
			  dns_name_t ***keysp, isc_uint32_t count)
{
	unsigned int i;
	dns_name_t **keys = *keysp;

	INSIST(addrsp != NULL && *addrsp != NULL);

	isc_mem_put(mctx, *addrsp, count * sizeof(isc_sockaddr_t));
	for (i = 0; i < count; i++) {
		if (keys[i] == NULL)
			continue;
		if (dns_name_dynamic(keys[i]))
			dns_name_free(keys[i], mctx);
		isc_mem_put(mctx, keys[i], sizeof(dns_name_t));
	}
	isc_mem_put(mctx, *keysp, count * sizeof(dns_name_t *));
	*addrsp = NULL;
	*keysp = NULL;
}

isc_result_t
713
714
715
716
ns_config_getport(const cfg_obj_t *config, in_port_t *portp) {
	const cfg_obj_t *maps[3];
	const cfg_obj_t *options = NULL;
	const cfg_obj_t *portobj = NULL;
717
718
719
	isc_result_t result;
	int i;

720
	(void)cfg_map_get(config, "options", &options);
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
	i = 0;
	if (options != NULL)
		maps[i++] = options;
	maps[i++] = ns_g_defaults;
	maps[i] = NULL;

	result = ns_config_get(maps, "port", &portobj);
	INSIST(result == ISC_R_SUCCESS);
	if (cfg_obj_asuint32(portobj) >= ISC_UINT16_MAX) {
		cfg_obj_log(portobj, ns_g_lctx, ISC_LOG_ERROR,
			    "port '%u' out of range",
			    cfg_obj_asuint32(portobj));
		return (ISC_R_RANGE);
	}
	*portp = (in_port_t)cfg_obj_asuint32(portobj);
	return (ISC_R_SUCCESS);
}
Brian Wellington's avatar
Brian Wellington committed
738

739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
struct keyalgorithms {
	const char *str;
	enum { hmacnone, hmacmd5, hmacsha1, hmacsha224,
	       hmacsha256, hmacsha384, hmacsha512 } hmac;
	isc_uint16_t size;
} algorithms[] = {
	{ "hmac-md5", hmacmd5, 128 },
	{ "hmac-md5.sig-alg.reg.int", hmacmd5, 0 },
	{ "hmac-md5.sig-alg.reg.int.", hmacmd5, 0 },
	{ "hmac-sha1", hmacsha1, 160 },
	{ "hmac-sha224", hmacsha224, 224 },
	{ "hmac-sha256", hmacsha256, 256 },
	{ "hmac-sha384", hmacsha384, 384 },
	{ "hmac-sha512", hmacsha512, 512 },
	{  NULL, hmacnone, 0 }
};

Brian Wellington's avatar
Brian Wellington committed
756
isc_result_t
757
758
ns_config_getkeyalgorithm(const char *str, dns_name_t **name,
			  isc_uint16_t *digestbits)
Brian Wellington's avatar
Brian Wellington committed
759
{
760
761
762
763
764
765
766
767
768
769
770
	int i;
	size_t len = 0;
	isc_uint16_t bits;
	isc_result_t result;

	for (i = 0; algorithms[i].str != NULL; i++) {
		len = strlen(algorithms[i].str);
		if (strncasecmp(algorithms[i].str, str, len) == 0 &&
		    (str[len] == '\0' ||
		     (algorithms[i].size != 0 && str[len] == '-')))
			break;
Brian Wellington's avatar
Brian Wellington committed
771
	}
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
	if (algorithms[i].str == NULL)
		return (ISC_R_NOTFOUND);
	if (str[len] == '-') {
		result = isc_parse_uint16(&bits, str + len + 1, 10);
		if (result != ISC_R_SUCCESS)
			return (result);
		if (bits > algorithms[i].size)
			return (ISC_R_RANGE);
	} else if (algorithms[i].size == 0)
		bits = 128;
	else
		bits = algorithms[i].size;

	if (name != NULL) {
		switch (algorithms[i].hmac) {
		case hmacmd5: *name = dns_tsig_hmacmd5_name; break;
		case hmacsha1: *name = dns_tsig_hmacsha1_name; break;
		case hmacsha224: *name = dns_tsig_hmacsha224_name; break;
		case hmacsha256: *name = dns_tsig_hmacsha256_name; break;
		case hmacsha384: *name = dns_tsig_hmacsha384_name; break;
		case hmacsha512: *name = dns_tsig_hmacsha512_name; break;
		default:
			INSIST(0);
		}
	}
	if (digestbits != NULL)
		*digestbits = bits;
	return (ISC_R_SUCCESS);
Brian Wellington's avatar
Brian Wellington committed
800
}