hammer/examples/rr.c

194 lines
4.8 KiB
C
Raw Normal View History

#include "../src/hammer.h"
#include "dns_common.h"
#include "dns.h"
#include "rr.h"
#define false 0
#define true 1
///
// Validations and Semantic Actions
///
2013-01-17 01:17:37 +01:00
bool validate_null(HParseResult *p) {
if (TT_SEQUENCE != p->ast->token_type)
return false;
return (65536 > p->ast->seq->used);
}
HParsedToken *act_null(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_null_t *null = H_ALLOC(dns_rr_null_t);
2013-01-25 20:16:44 +01:00
size_t len = h_seq_len(p->ast);
uint8_t *buf = h_arena_malloc(p->arena, sizeof(uint8_t)*len);
for (size_t i=0; i<len; ++i)
2013-01-25 20:16:44 +01:00
buf[i] = H_FIELD_UINT(i);
return H_MAKE(dns_rr_null_t, null);
}
HParsedToken *act_txt(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_txt_t *txt = H_ALLOC(dns_rr_txt_t);
const HCountedArray *arr = H_CAST_SEQ(p->ast);
uint8_t **ret = h_arena_malloc(arr->arena, sizeof(uint8_t*)*arr->used);
for (size_t i=0; i<arr->used; ++i) {
2013-01-25 20:16:44 +01:00
size_t len = h_seq_len(arr->elements[i]);
uint8_t *tmp = h_arena_malloc(arr->arena, sizeof(uint8_t)*len);
for (size_t j=0; j<len; ++j)
tmp[j] = H_INDEX_UINT(arr->elements[i], j);
ret[i] = tmp;
}
2013-01-25 20:16:44 +01:00
txt->count = arr->used;
txt->txt_data = ret;
return H_MAKE(dns_rr_txt_t, txt);
}
HParsedToken* act_cstr(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_cstr_t *cs = H_ALLOC(dns_cstr_t);
2013-01-17 20:43:29 +01:00
const HCountedArray *arr = H_CAST_SEQ(p->ast);
2013-01-17 20:43:29 +01:00
uint8_t *ret = h_arena_malloc(arr->arena, sizeof(uint8_t)*arr->used);
for (size_t i=0; i<arr->used; ++i)
ret[i] = H_CAST_UINT(arr->elements[i]);
2013-01-17 20:43:29 +01:00
assert(ret[arr->used-1] == '\0'); // XXX Is this right?! If so, shouldn't it be a validation?
*cs = ret;
return H_MAKE(dns_cstr_t, cs);
2013-01-17 20:43:29 +01:00
}
HParsedToken* act_soa(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_soa_t *soa = H_ALLOC(dns_rr_soa_t);
2013-01-17 21:35:33 +01:00
soa->mname = *H_FIELD(dns_domain_t, 0);
soa->rname = *H_FIELD(dns_domain_t, 1);
2013-01-25 20:16:44 +01:00
soa->serial = H_FIELD_UINT(2);
soa->refresh = H_FIELD_UINT(3);
soa->retry = H_FIELD_UINT(4);
soa->expire = H_FIELD_UINT(5);
soa->minimum = H_FIELD_UINT(6);
2013-01-17 21:35:33 +01:00
return H_MAKE(dns_rr_soa_t, soa);
2013-01-17 21:35:33 +01:00
}
HParsedToken* act_wks(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_wks_t *wks = H_ALLOC(dns_rr_wks_t);
2013-01-17 21:39:32 +01:00
2013-01-25 20:16:44 +01:00
wks->address = H_FIELD_UINT(0);
wks->protocol = H_FIELD_UINT(1);
wks->len = H_FIELD_SEQ(2)->used;
2013-01-17 21:39:32 +01:00
wks->bit_map = h_arena_malloc(p->arena, sizeof(uint8_t)*wks->len);
for (size_t i=0; i<wks->len; ++i)
wks->bit_map[i] = H_INDEX_UINT(p->ast, 2, i);
2013-01-17 21:39:32 +01:00
return H_MAKE(dns_rr_wks_t, wks);
2013-01-17 21:39:32 +01:00
}
HParsedToken* act_hinfo(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_hinfo_t *hinfo = H_ALLOC(dns_rr_hinfo_t);
hinfo->cpu = *H_FIELD(dns_cstr_t, 0);
hinfo->os = *H_FIELD(dns_cstr_t, 1);
return H_MAKE(dns_rr_hinfo_t, hinfo);
}
HParsedToken* act_minfo(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_minfo_t *minfo = H_ALLOC(dns_rr_minfo_t);
minfo->rmailbx = *H_FIELD(dns_domain_t, 0);
minfo->emailbx = *H_FIELD(dns_domain_t, 1);
return H_MAKE(dns_rr_minfo_t, minfo);
}
HParsedToken* act_mx(const HParseResult *p) {
2013-01-23 18:17:17 +01:00
dns_rr_mx_t *mx = H_ALLOC(dns_rr_mx_t);
2013-01-25 20:16:44 +01:00
mx->preference = H_FIELD_UINT(0);
mx->exchange = *H_FIELD(dns_domain_t, 1);
return H_MAKE(dns_rr_mx_t, mx);
}
///
// Parsers for all types of RDATA
///
#define RDATA_TYPE_MAX 16
HParser* init_rdata(uint16_t type) {
static HParser *parsers[RDATA_TYPE_MAX+1];
static int inited = 0;
2013-01-17 01:17:37 +01:00
if (type >= sizeof(parsers))
return NULL;
if (inited)
return parsers[type];
2013-01-17 01:17:37 +01:00
H_RULE (domain, init_domain());
2013-01-17 20:43:29 +01:00
H_ARULE(cstr, init_character_string());
2013-01-17 01:17:37 +01:00
H_RULE (a, h_uint32());
H_RULE (ns, domain);
H_RULE (md, domain);
H_RULE (mf, domain);
H_RULE (cname, domain);
2013-01-17 21:35:33 +01:00
H_ARULE(soa, h_sequence(domain, // MNAME
2013-01-17 01:17:37 +01:00
domain, // RNAME
h_uint32(), // SERIAL
h_uint32(), // REFRESH
h_uint32(), // RETRY
h_uint32(), // EXPIRE
h_uint32(), // MINIMUM
NULL));
H_RULE (mb, domain);
H_RULE (mg, domain);
H_RULE (mr, domain);
H_VRULE(null, h_many(h_uint8()));
2013-01-17 01:17:37 +01:00
H_RULE (wks, h_sequence(h_uint32(),
h_uint8(),
h_many(h_uint8()),
NULL));
H_RULE (ptr, domain);
H_RULE (hinfo, h_sequence(cstr, cstr, NULL));
H_RULE (minfo, h_sequence(domain, domain, NULL));
H_RULE (mx, h_sequence(h_uint16(), domain, NULL));
H_ARULE(txt, h_many1(cstr));
2013-01-17 01:17:37 +01:00
parsers[ 0] = NULL; // there is no type 0
parsers[ 1] = a;
parsers[ 2] = ns;
parsers[ 3] = md;
parsers[ 4] = mf;
parsers[ 5] = cname;
parsers[ 6] = soa;
parsers[ 7] = mb;
parsers[ 8] = mg;
parsers[ 9] = mr;
parsers[10] = null;
2013-01-17 01:17:37 +01:00
parsers[11] = wks;
parsers[12] = ptr;
parsers[13] = hinfo;
parsers[14] = minfo;
parsers[15] = mx;
parsers[16] = txt;
// All parsers must consume their input exactly.
2013-07-10 21:32:05 +02:00
for(uint16_t i = 0; i<RDATA_TYPE_MAX+1; i++) {
if(parsers[i]) {
parsers[i] = h_action(h_sequence(parsers[i], h_end_p(), NULL),
act_index0);
}
2013-01-17 01:17:37 +01:00
}
2013-01-17 01:17:37 +01:00
inited = 1;
return parsers[type];
}