-//! Serialization/Deserialization logic lives here
+//! Logic to read and write resource record (streams)
use alloc::vec::Vec;
use alloc::string::String;
-use ring::signature;
-
use crate::rr::*;
+use crate::query::QueryBuf;
pub(crate) fn read_u8(inp: &mut &[u8]) -> Result<u8, ()> {
let res = *inp.get(0).ok_or(())?;
Ok(u32::from_be_bytes(bytes))
}
-fn read_wire_packet_labels(inp: &mut &[u8], wire_packet: &[u8], name: &mut String) -> Result<(), ()> {
+pub(crate) fn read_u8_len_prefixed_bytes(inp: &mut &[u8]) -> Result<Vec<u8>, ()> {
+ let len = *inp.get(0).ok_or(())?;
+ *inp = &inp[1..];
+ if inp.len() < len.into() { return Err(()); }
+ let mut res = Vec::with_capacity(len.into());
+ res.extend_from_slice(&inp[..len.into()]);
+ *inp = &inp[len.into()..];
+ Ok(res)
+}
+
+pub(crate) fn write_nsec_types_bitmap<W: Writer>(out: &mut W, types: &[u8; 8192]) {
+ for (idx, flags) in types.chunks(32).enumerate() {
+ debug_assert_eq!(flags.len(), 32);
+ if flags != &[0; 32] {
+ let last_nonzero_idx = flags.iter().rposition(|flag| *flag != 0)
+ .unwrap_or_else(|| { debug_assert!(false); 0 });
+ out.write(&(idx as u8).to_be_bytes());
+ out.write(&(last_nonzero_idx as u8 + 1).to_be_bytes());
+ out.write(&flags[..last_nonzero_idx + 1]);
+ }
+ }
+}
+pub(crate) fn nsec_types_bitmap_len(types: &[u8; 8192]) -> u16 {
+ let mut total_len = 0;
+ for flags in types.chunks(32) {
+ debug_assert_eq!(flags.len(), 32);
+ if flags != &[0; 32] {
+ total_len += 3 + flags.iter().rposition(|flag| *flag != 0)
+ .unwrap_or_else(|| { debug_assert!(false); 0 }) as u16;
+ }
+ }
+ total_len
+}
+
+pub(crate) fn read_nsec_types_bitmap(inp: &mut &[u8]) -> Result<[u8; 8192], ()> {
+ let mut res = [0; 8192];
+ while !inp.is_empty() {
+ let block = *inp.get(0).ok_or(())?;
+ let len = *inp.get(1).ok_or(())?;
+ *inp = &inp[2..];
+ if inp.len() < len as usize { return Err(()); }
+ res[block as usize * 32..block as usize * 32 + len as usize]
+ .copy_from_slice(&inp[..len as usize]);
+ *inp = &inp[len as usize..];
+ }
+ Ok(res)
+}
+
+fn do_read_wire_packet_labels(inp: &mut &[u8], wire_packet: &[u8], name: &mut String, recursion_limit: usize) -> Result<(), ()> {
loop {
let len = read_u8(inp)? as usize;
if len == 0 {
if name.is_empty() { *name += "."; }
break;
- } else if len >= 0xc0 {
+ } else if len >= 0xc0 && recursion_limit > 0 {
let offs = ((len & !0xc0) << 8) | read_u8(inp)? as usize;
if offs >= wire_packet.len() { return Err(()); }
- read_wire_packet_labels(&mut &wire_packet[offs..], wire_packet, name)?;
+ do_read_wire_packet_labels(&mut &wire_packet[offs..], wire_packet, name, recursion_limit - 1)?;
break;
}
if inp.len() <= len { return Err(()); }
Ok(())
}
+fn read_wire_packet_labels(inp: &mut &[u8], wire_packet: &[u8], name: &mut String) -> Result<(), ()> {
+ do_read_wire_packet_labels(inp, wire_packet, name, 255)
+}
+
pub(crate) fn read_wire_packet_name(inp: &mut &[u8], wire_packet: &[u8]) -> Result<Name, ()> {
let mut name = String::with_capacity(1024);
read_wire_packet_labels(inp, wire_packet, &mut name)?;
pub(crate) trait Writer { fn write(&mut self, buf: &[u8]); }
impl Writer for Vec<u8> { fn write(&mut self, buf: &[u8]) { self.extend_from_slice(buf); } }
-impl Writer for ring::digest::Context { fn write(&mut self, buf: &[u8]) { self.update(buf); } }
+impl Writer for QueryBuf { fn write(&mut self, buf: &[u8]) { self.extend_from_slice(buf); } }
+#[cfg(feature = "validation")]
+impl Writer for crate::crypto::hash::Hasher { fn write(&mut self, buf: &[u8]) { self.update(buf); } }
pub(crate) fn write_name<W: Writer>(out: &mut W, name: &str) {
let canonical_name = name.to_ascii_lowercase();
if canonical_name == "." {
NS::TYPE => RR::NS(NS::read_from_data(name, data, wire_packet)?),
Txt::TYPE => RR::Txt(Txt::read_from_data(name, data, wire_packet)?),
CName::TYPE => RR::CName(CName::read_from_data(name, data, wire_packet)?),
+ DName::TYPE => RR::DName(DName::read_from_data(name, data, wire_packet)?),
TLSA::TYPE => RR::TLSA(TLSA::read_from_data(name, data, wire_packet)?),
DnsKey::TYPE => RR::DnsKey(DnsKey::read_from_data(name, data, wire_packet)?),
DS::TYPE => RR::DS(DS::read_from_data(name, data, wire_packet)?),
RRSig::TYPE => RR::RRSig(RRSig::read_from_data(name, data, wire_packet)?),
+ NSec::TYPE => RR::NSec(NSec::read_from_data(name, data, wire_packet)?),
+ NSec3::TYPE => RR::NSec3(NSec3::read_from_data(name, data, wire_packet)?),
_ => return Err(()),
};
Ok((rr, ttl))
parse_wire_packet_rr(inp, &[]).map(|(rr, _)| rr)
}
-pub(crate) fn bytes_to_rsa_pk<'a>(pubkey: &'a [u8])
--> Result<signature::RsaPublicKeyComponents<&'a [u8]>, ()> {
- if pubkey.len() <= 3 { return Err(()); }
-
- let mut pos = 0;
- let exponent_length;
- if pubkey[0] == 0 {
- exponent_length = ((pubkey[1] as usize) << 8) | (pubkey[2] as usize);
- pos += 3;
- } else {
- exponent_length = pubkey[0] as usize;
- pos += 1;
+/// Parse a stream of [`RR`]s from the format described in [RFC 9102](https://www.rfc-editor.org/rfc/rfc9102.html).
+///
+/// Note that this is only the series of `AuthenticationChain` records, and does not read the
+/// `ExtSupportLifetime` field at the start of a `DnssecChainExtension`.
+pub fn parse_rr_stream(mut inp: &[u8]) -> Result<Vec<RR>, ()> {
+ let mut res = Vec::with_capacity(32);
+ while !inp.is_empty() {
+ res.push(parse_rr(&mut inp)?);
}
+ Ok(res)
+}
- if pubkey.len() <= pos + exponent_length { return Err(()); }
- Ok(signature::RsaPublicKeyComponents {
- n: &pubkey[pos + exponent_length..],
- e: &pubkey[pos..pos + exponent_length]
- })
+/// Writes the given resource record in its wire encoding to the given `Vec`.
+///
+/// An [RFC 9102](https://www.rfc-editor.org/rfc/rfc9102.html) `AuthenticationChain` is simply a
+/// series of such records with no additional bytes in between.
+pub fn write_rr<RR: Record>(rr: &RR, ttl: u32, out: &mut Vec<u8>) {
+ write_name(out, rr.name());
+ out.extend_from_slice(&rr.ty().to_be_bytes());
+ out.extend_from_slice(&1u16.to_be_bytes()); // The INternet class
+ out.extend_from_slice(&ttl.to_be_bytes());
+ rr.write_u16_len_prefixed_data(out);
}