Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
ISC Open Source Projects
BIND
Commits
12a12d8a
Commit
12a12d8a
authored
Feb 02, 1999
by
Mark Andrews
Browse files
Initial Implementation
parent
fe47f41b
Changes
2
Hide whitespace changes
Inline
Side-by-side
lib/dns/rdata/generic/cert_37.c
0 → 100644
View file @
12a12d8a
/*
* Copyright (C) 1999 Internet Software Consortium.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
* SOFTWARE.
*/
/* $Id: cert_37.c,v 1.1 1999/02/02 01:19:22 marka Exp $ */
/* draft-ietf-dnssec-certs-04.txt */
#ifndef RDATA_GENERIC_CERT_37_H
#define RDATA_GENERIC_CERT_37_H
static
dns_result_t
fromtext_cert
(
dns_rdataclass_t
class
,
dns_rdatatype_t
type
,
isc_lex_t
*
lexer
,
dns_name_t
*
origin
,
isc_boolean_t
downcase
,
isc_buffer_t
*
target
)
{
isc_token_t
token
;
long
n
;
unsigned
char
c
;
char
*
e
;
REQUIRE
(
type
==
37
);
class
=
class
;
/*unused*/
origin
=
origin
;
/*unused*/
downcase
=
downcase
;
/*unused*/
/* cert type */
RETERR
(
gettoken
(
lexer
,
&
token
,
isc_tokentype_string
,
ISC_FALSE
));
n
=
strtol
(
token
.
value
.
as_pointer
,
&
e
,
10
);
if
(
*
e
!=
0
)
{
return
(
DNS_R_NOTIMPLEMENTED
);
}
else
{
if
(
n
<
0
||
n
>
0xffff
)
return
(
DNS_R_RANGE
);
c
=
n
;
}
RETERR
(
uint16_tobuffer
(
n
,
target
));
/* key tag */
RETERR
(
gettoken
(
lexer
,
&
token
,
isc_tokentype_number
,
ISC_FALSE
));
if
(
token
.
value
.
as_ulong
>
0xffff
)
return
(
DNS_R_RANGE
);
RETERR
(
uint16_tobuffer
(
token
.
value
.
as_ulong
,
target
));
/* algorithm */
RETERR
(
gettoken
(
lexer
,
&
token
,
isc_tokentype_string
,
ISC_FALSE
));
n
=
strtol
(
token
.
value
.
as_pointer
,
&
e
,
10
);
if
(
*
e
)
{
return
(
DNS_R_NOTIMPLEMENTED
);
}
else
{
if
(
n
<
0
||
n
>
0xff
)
return
(
DNS_R_RANGE
);
c
=
n
;
}
RETERR
(
mem_tobuffer
(
target
,
&
c
,
1
));
return
(
base64_tobuffer
(
lexer
,
target
));
}
static
dns_result_t
totext_cert
(
dns_rdata_t
*
rdata
,
dns_name_t
*
origin
,
isc_buffer_t
*
target
)
{
isc_region_t
sr
;
char
buf
[
sizeof
"64000"
];
unsigned
int
n
;
REQUIRE
(
rdata
->
type
==
37
);
origin
=
origin
;
/*unused*/
dns_rdata_toregion
(
rdata
,
&
sr
);
/* type */
n
=
uint16_fromregion
(
&
sr
);
isc_region_consume
(
&
sr
,
2
);
sprintf
(
buf
,
"%u"
,
n
);
RETERR
(
str_totext
(
buf
,
target
));
RETERR
(
str_totext
(
" "
,
target
));
/* key tag */
n
=
uint16_fromregion
(
&
sr
);
isc_region_consume
(
&
sr
,
2
);
sprintf
(
buf
,
"%u"
,
n
);
RETERR
(
str_totext
(
buf
,
target
));
RETERR
(
str_totext
(
" "
,
target
));
/* algorithm */
sprintf
(
buf
,
"%u"
,
sr
.
base
[
0
]);
isc_region_consume
(
&
sr
,
1
);
RETERR
(
str_totext
(
buf
,
target
));
RETERR
(
str_totext
(
" "
,
target
));
/* cert */
return
(
base64_totext
(
&
sr
,
target
));
}
static
dns_result_t
fromwire_cert
(
dns_rdataclass_t
class
,
dns_rdatatype_t
type
,
isc_buffer_t
*
source
,
dns_decompress_t
*
dctx
,
isc_boolean_t
downcase
,
isc_buffer_t
*
target
)
{
isc_region_t
sr
;
REQUIRE
(
type
==
37
);
class
=
class
;
/*unused*/
dctx
=
dctx
;
/*unused*/
downcase
=
downcase
;
/*unused*/
isc_buffer_active
(
source
,
&
sr
);
if
(
sr
.
length
<
5
)
return
(
DNS_R_UNEXPECTEDEND
);
isc_buffer_forward
(
source
,
sr
.
length
);
return
(
mem_tobuffer
(
target
,
sr
.
base
,
sr
.
length
));
}
static
dns_result_t
towire_cert
(
dns_rdata_t
*
rdata
,
dns_compress_t
*
cctx
,
isc_buffer_t
*
target
)
{
isc_region_t
sr
;
REQUIRE
(
rdata
->
type
==
37
);
cctx
=
cctx
;
/*unused*/
dns_rdata_toregion
(
rdata
,
&
sr
);
return
(
mem_tobuffer
(
target
,
sr
.
base
,
sr
.
length
));
}
static
int
compare_cert
(
dns_rdata_t
*
rdata1
,
dns_rdata_t
*
rdata2
)
{
isc_region_t
r1
;
isc_region_t
r2
;
REQUIRE
(
rdata1
->
type
==
rdata2
->
type
);
REQUIRE
(
rdata1
->
class
==
rdata2
->
class
);
REQUIRE
(
rdata1
->
type
==
37
);
dns_rdata_toregion
(
rdata1
,
&
r1
);
dns_rdata_toregion
(
rdata2
,
&
r2
);
return
(
compare_region
(
&
r1
,
&
r2
));
}
static
dns_result_t
fromstruct_cert
(
dns_rdataclass_t
class
,
dns_rdatatype_t
type
,
void
*
source
,
isc_buffer_t
*
target
)
{
REQUIRE
(
type
==
37
);
class
=
class
;
/*unused*/
source
=
source
;
target
=
target
;
return
(
DNS_R_NOTIMPLEMENTED
);
}
static
dns_result_t
tostruct_cert
(
dns_rdata_t
*
rdata
,
void
*
target
)
{
REQUIRE
(
rdata
->
type
==
37
);
target
=
target
;
return
(
DNS_R_NOTIMPLEMENTED
);
}
#endif
/* RDATA_GENERIC_CERT_37_H */
lib/dns/rdata/generic/cert_37.h
0 → 100644
View file @
12a12d8a
/*
* Copyright (C) 1999 Internet Software Consortium.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
* SOFTWARE.
*/
/* $Id: cert_37.h,v 1.1 1999/02/02 01:19:22 marka Exp $ */
/* draft-ietf-dnssec-certs-04.txt */
#ifndef RDATA_GENERIC_CERT_37_H
#define RDATA_GENERIC_CERT_37_H
static
dns_result_t
fromtext_cert
(
dns_rdataclass_t
class
,
dns_rdatatype_t
type
,
isc_lex_t
*
lexer
,
dns_name_t
*
origin
,
isc_boolean_t
downcase
,
isc_buffer_t
*
target
)
{
isc_token_t
token
;
long
n
;
unsigned
char
c
;
char
*
e
;
REQUIRE
(
type
==
37
);
class
=
class
;
/*unused*/
origin
=
origin
;
/*unused*/
downcase
=
downcase
;
/*unused*/
/* cert type */
RETERR
(
gettoken
(
lexer
,
&
token
,
isc_tokentype_string
,
ISC_FALSE
));
n
=
strtol
(
token
.
value
.
as_pointer
,
&
e
,
10
);
if
(
*
e
!=
0
)
{
return
(
DNS_R_NOTIMPLEMENTED
);
}
else
{
if
(
n
<
0
||
n
>
0xffff
)
return
(
DNS_R_RANGE
);
c
=
n
;
}
RETERR
(
uint16_tobuffer
(
n
,
target
));
/* key tag */
RETERR
(
gettoken
(
lexer
,
&
token
,
isc_tokentype_number
,
ISC_FALSE
));
if
(
token
.
value
.
as_ulong
>
0xffff
)
return
(
DNS_R_RANGE
);
RETERR
(
uint16_tobuffer
(
token
.
value
.
as_ulong
,
target
));
/* algorithm */
RETERR
(
gettoken
(
lexer
,
&
token
,
isc_tokentype_string
,
ISC_FALSE
));
n
=
strtol
(
token
.
value
.
as_pointer
,
&
e
,
10
);
if
(
*
e
)
{
return
(
DNS_R_NOTIMPLEMENTED
);
}
else
{
if
(
n
<
0
||
n
>
0xff
)
return
(
DNS_R_RANGE
);
c
=
n
;
}
RETERR
(
mem_tobuffer
(
target
,
&
c
,
1
));
return
(
base64_tobuffer
(
lexer
,
target
));
}
static
dns_result_t
totext_cert
(
dns_rdata_t
*
rdata
,
dns_name_t
*
origin
,
isc_buffer_t
*
target
)
{
isc_region_t
sr
;
char
buf
[
sizeof
"64000"
];
unsigned
int
n
;
REQUIRE
(
rdata
->
type
==
37
);
origin
=
origin
;
/*unused*/
dns_rdata_toregion
(
rdata
,
&
sr
);
/* type */
n
=
uint16_fromregion
(
&
sr
);
isc_region_consume
(
&
sr
,
2
);
sprintf
(
buf
,
"%u"
,
n
);
RETERR
(
str_totext
(
buf
,
target
));
RETERR
(
str_totext
(
" "
,
target
));
/* key tag */
n
=
uint16_fromregion
(
&
sr
);
isc_region_consume
(
&
sr
,
2
);
sprintf
(
buf
,
"%u"
,
n
);
RETERR
(
str_totext
(
buf
,
target
));
RETERR
(
str_totext
(
" "
,
target
));
/* algorithm */
sprintf
(
buf
,
"%u"
,
sr
.
base
[
0
]);
isc_region_consume
(
&
sr
,
1
);
RETERR
(
str_totext
(
buf
,
target
));
RETERR
(
str_totext
(
" "
,
target
));
/* cert */
return
(
base64_totext
(
&
sr
,
target
));
}
static
dns_result_t
fromwire_cert
(
dns_rdataclass_t
class
,
dns_rdatatype_t
type
,
isc_buffer_t
*
source
,
dns_decompress_t
*
dctx
,
isc_boolean_t
downcase
,
isc_buffer_t
*
target
)
{
isc_region_t
sr
;
REQUIRE
(
type
==
37
);
class
=
class
;
/*unused*/
dctx
=
dctx
;
/*unused*/
downcase
=
downcase
;
/*unused*/
isc_buffer_active
(
source
,
&
sr
);
if
(
sr
.
length
<
5
)
return
(
DNS_R_UNEXPECTEDEND
);
isc_buffer_forward
(
source
,
sr
.
length
);
return
(
mem_tobuffer
(
target
,
sr
.
base
,
sr
.
length
));
}
static
dns_result_t
towire_cert
(
dns_rdata_t
*
rdata
,
dns_compress_t
*
cctx
,
isc_buffer_t
*
target
)
{
isc_region_t
sr
;
REQUIRE
(
rdata
->
type
==
37
);
cctx
=
cctx
;
/*unused*/
dns_rdata_toregion
(
rdata
,
&
sr
);
return
(
mem_tobuffer
(
target
,
sr
.
base
,
sr
.
length
));
}
static
int
compare_cert
(
dns_rdata_t
*
rdata1
,
dns_rdata_t
*
rdata2
)
{
isc_region_t
r1
;
isc_region_t
r2
;
REQUIRE
(
rdata1
->
type
==
rdata2
->
type
);
REQUIRE
(
rdata1
->
class
==
rdata2
->
class
);
REQUIRE
(
rdata1
->
type
==
37
);
dns_rdata_toregion
(
rdata1
,
&
r1
);
dns_rdata_toregion
(
rdata2
,
&
r2
);
return
(
compare_region
(
&
r1
,
&
r2
));
}
static
dns_result_t
fromstruct_cert
(
dns_rdataclass_t
class
,
dns_rdatatype_t
type
,
void
*
source
,
isc_buffer_t
*
target
)
{
REQUIRE
(
type
==
37
);
class
=
class
;
/*unused*/
source
=
source
;
target
=
target
;
return
(
DNS_R_NOTIMPLEMENTED
);
}
static
dns_result_t
tostruct_cert
(
dns_rdata_t
*
rdata
,
void
*
target
)
{
REQUIRE
(
rdata
->
type
==
37
);
target
=
target
;
return
(
DNS_R_NOTIMPLEMENTED
);
}
#endif
/* RDATA_GENERIC_CERT_37_H */
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment