diff options
Diffstat (limited to 'src/utils/common/params.c')
-rw-r--r-- | src/utils/common/params.c | 376 |
1 files changed, 376 insertions, 0 deletions
diff --git a/src/utils/common/params.c b/src/utils/common/params.c new file mode 100644 index 0000000..56dc662 --- /dev/null +++ b/src/utils/common/params.c @@ -0,0 +1,376 @@ +/* Copyright (C) 2011 CZ.NIC, z.s.p.o. <knot-dns@labs.nic.cz> + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include <config.h> +#include "utils/common/params.h" + +#include <stdio.h> +#include <stdlib.h> // free +#include <netinet/in.h> // in_addr +#include <arpa/inet.h> // inet_pton +#include <sys/socket.h> // AF_INET (BSD) + +#include "libknot/libknot.h" +#include "common/errcode.h" // KNOT_EOK +#include "common/mempattern.h" // strcdup +#include "common/descriptor.h" // KNOT_RRTYPE_ +#include "utils/common/msg.h" // WARN +#include "utils/common/resolv.h" // parse_nameserver +#include "utils/common/token.h" // token + +#define IPV4_REVERSE_DOMAIN "in-addr.arpa." +#define IPV6_REVERSE_DOMAIN "ip6.arpa." + +char* get_reverse_name(const char *name) +{ + struct in_addr addr4; + struct in6_addr addr6; + int ret; + char buf[128] = "\0"; + + if (name == NULL) { + DBG_NULL; + return NULL; + } + + // Check name for IPv4 address, IPv6 address or other. + if (inet_pton(AF_INET, name, &addr4) == 1) { + uint32_t num = ntohl(addr4.s_addr); + + // Create IPv4 reverse FQD name. + ret = snprintf(buf, sizeof(buf), "%u.%u.%u.%u.%s", + (num >> 0) & 0xFF, (num >> 8) & 0xFF, + (num >> 16) & 0xFF, (num >> 24) & 0xFF, + IPV4_REVERSE_DOMAIN); + if (ret < 0 || (size_t)ret >= sizeof(buf)) { + return NULL; + } + + return strdup(buf); + } else if (inet_pton(AF_INET6, name, &addr6) == 1) { + char *pos = buf; + size_t len = sizeof(buf); + uint8_t left, right; + + // Create IPv6 reverse name. + for (int i = 15; i >= 0; i--) { + left = ((addr6.s6_addr)[i] & 0xF0) >> 4; + right = (addr6.s6_addr)[i] & 0x0F; + + ret = snprintf(pos, len, "%x.%x.", right, left); + if (ret < 0 || (size_t)ret >= len) { + return NULL; + } + + pos += ret; + len -= ret; + } + + // Add IPv6 reverse domain. + ret = snprintf(pos, len, "%s", IPV6_REVERSE_DOMAIN); + if (ret < 0 || (size_t)ret >= len) { + return NULL; + } + + return strdup(buf); + } else { + return NULL; + } +} + +char* get_fqd_name(const char *name) +{ + char *fqd_name = NULL; + + if (name == NULL) { + DBG_NULL; + return NULL; + } + + size_t name_len = strlen(name); + + // If the name is FQDN, make a copy. + if (name[name_len - 1] == '.') { + fqd_name = strdup(name); + // Else make a copy and append a trailing dot. + } else { + fqd_name = malloc(name_len + 2); + if (fqd_name != NULL) { + strncpy(fqd_name, name, name_len + 2); + fqd_name[name_len] = '.'; + fqd_name[name_len + 1] = 0; + } + } + + return fqd_name; +} + +int params_parse_class(const char *value, uint16_t *rclass) +{ + if (value == NULL || rclass == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + if (knot_rrclass_from_string(value, rclass) == 0) { + return KNOT_EOK; + } else { + return KNOT_EINVAL; + } +} + +int params_parse_type(const char *value, uint16_t *rtype, uint32_t *xfr_serial) +{ + if (value == NULL || rtype == NULL || xfr_serial == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + size_t param_pos = strcspn(value, "="); + + // There is no additional parameter. + if (param_pos == strlen(value)) { + if (knot_rrtype_from_string(value, rtype) != 0) { + return KNOT_EINVAL; + } + + // IXFR requires serial parameter. + if (*rtype == KNOT_RRTYPE_IXFR) { + DBG("SOA serial is required for IXFR query\n"); + return KNOT_EINVAL; + } + } else { + char *type_char = strndup(value, param_pos); + + if (knot_rrtype_from_string(type_char, rtype) != 0) { + free(type_char); + return KNOT_EINVAL; + } + + free(type_char); + + // Additional parameter is accepted for IXFR only. + if (*rtype == KNOT_RRTYPE_IXFR) { + const char *param_str = value + 1 + param_pos; + char *end; + + // Convert string to serial. + unsigned long serial = strtoul(param_str, &end, 10); + + // Check for bad serial string. + if (end == param_str || *end != '\0' || + serial > UINT32_MAX) { + DBG("bad SOA serial %s\n", param_str); + return KNOT_EINVAL; + } + + *xfr_serial = serial; + } else { + char buf[64] = ""; + knot_rrtype_to_string(*rtype, buf, sizeof(buf)); + DBG("type %s can't have a parameter\n", buf); + return KNOT_EINVAL; + } + } + + return KNOT_EOK; +} + +int params_parse_server(const char *value, list *servers, const char *def_port) +{ + if (value == NULL || servers == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + // Add specified nameserver. + server_t *server = parse_nameserver(value, def_port); + if (server == NULL) { + ERR("bad nameserver %s\n", value); + return KNOT_EINVAL; + } + add_tail(servers, (node *)server); + + return KNOT_EOK; +} + +int params_parse_wait(const char *value, int32_t *dst) +{ + char *end; + + if (value == NULL || dst == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + /* Convert string to number. */ + long num = strtol(value, &end, 10); + + /* Check for bad string (empty or incorrect). */ + if (end == value || *end != '\0') { + ERR("bad time value %s\n", value); + return KNOT_EINVAL; + } else if (num < 1) { + num = 1; + WARN("time %s is too short, using %ld instead\n", value, num); + /* Reduce maximal value. Poll takes signed int in milliseconds. */ + } else if (num > INT32_MAX) { + num = INT32_MAX / 1000; + WARN("time %s is too big, using %ld instead\n", value, num); + } + + *dst = num; + + return KNOT_EOK; +} + +int params_parse_num(const char *value, uint32_t *dst) +{ + char *end; + + if (value == NULL || dst == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + // Convert string to number. + unsigned long num = strtoul(value, &end, 10); + + // Check for bad string. + if (end == value || *end != '\0') { + ERR("bad number %s\n", value); + return KNOT_EINVAL; + } + + if (num > UINT32_MAX) { + num = UINT32_MAX; + WARN("number %s is too big, using %lu instead\n", value, num); + } + + *dst = num; + + return KNOT_EOK; +} + +int params_parse_bufsize(const char *value, int32_t *dst) +{ + char *end; + + if (value == NULL || dst == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + // Convert string to number. + unsigned long num = strtoul(value, &end, 10); + + // Check for bad string. + if (end == value || *end != '\0') { + ERR("bad size %s\n", value); + return KNOT_EINVAL; + } + + if (num > UINT16_MAX) { + num = UINT16_MAX; + WARN("size %s is too big, using %lu instead\n", value, num); + } + + *dst = num; + + return KNOT_EOK; +} + +int params_parse_tsig(const char *value, knot_key_params_t *key_params) +{ + if (value == NULL || key_params == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + /* Invalidate previous key. */ + if (key_params->name) { + ERR("Key specified multiple times.\n"); + return KNOT_EINVAL; + } + + char *h = strdup(value); + if (!h) { + return KNOT_ENOMEM; + } + + /* Separate to avoid multiple allocs. */ + char *k = NULL, *s = NULL; + if ((k = (char*)strchr(h, ':'))) { /* Second part - NAME|SECRET */ + *k++ = '\0'; /* String separator */ + s = (char*)strchr(k, ':'); /* Thirt part - |SECRET */ + } + + /* Determine algorithm. */ + key_params->algorithm = KNOT_TSIG_ALG_HMAC_MD5; + if (s) { + *s++ = '\0'; /* Last part separator */ + knot_lookup_table_t *alg = NULL; + alg = knot_lookup_by_name(knot_tsig_alg_names, h); + if (alg) { + DBG("%s: parsed algorithm '%s'\n", __func__, h); + key_params->algorithm = alg->id; + } else { + ERR("invalid TSIG algorithm name '%s'\n", h); + free(h); + return KNOT_EINVAL; + } + } else { + s = k; /* Ignore first part, push down. */ + k = h; + } + + if (!s) { + ERR("invalid key option format, use [hmac:]keyname:secret\n"); + free(h); + return KNOT_EINVAL; + } + + /* Set key name and secret. */ + key_params->name = knot_dname_new_from_nonfqdn_str(k, strlen(k), NULL); + key_params->secret = strdup(s); + + DBG("%s: parsed name '%s'\n", __func__, k); + DBG("%s: parsed secret '%s'\n", __func__, s); + free(h); + + return KNOT_EOK; +} + +int params_parse_keyfile(const char *value, knot_key_params_t *key_params) +{ + if (value == NULL || key_params == NULL) { + DBG_NULL; + return KNOT_EINVAL; + } + + if (key_params->name) { + ERR("Key specified multiple times.\n"); + return KNOT_EINVAL; + } + + int result = knot_load_key_params(value, key_params); + if (result != KNOT_EOK) { + ERR("could not read key file: %s\n", knot_strerror(result)); + return KNOT_EINVAL; + } + + return KNOT_EOK; +} |