193 lines
4.8 KiB
C
193 lines
4.8 KiB
C
#include "../src/hammer.h"
|
|
#include "dns_common.h"
|
|
#include "dns.h"
|
|
#include "rr.h"
|
|
|
|
#define false 0
|
|
#define true 1
|
|
|
|
|
|
///
|
|
// Validations and Semantic Actions
|
|
///
|
|
|
|
bool validate_null(HParseResult *p) {
|
|
if (TT_SEQUENCE != p->ast->token_type)
|
|
return false;
|
|
return (65536 > p->ast->seq->used);
|
|
}
|
|
|
|
HParsedToken *act_null(const HParseResult *p) {
|
|
dns_rr_null_t *null = H_ALLOC(dns_rr_null_t);
|
|
|
|
size_t len = h_seq_len(p->ast);
|
|
uint8_t *buf = h_arena_malloc(p->arena, sizeof(uint8_t)*len);
|
|
for (size_t i=0; i<len; ++i)
|
|
buf[i] = H_FIELD_UINT(i);
|
|
|
|
return H_MAKE(dns_rr_null_t, null);
|
|
}
|
|
|
|
HParsedToken *act_txt(const HParseResult *p) {
|
|
dns_rr_txt_t *txt = H_ALLOC(dns_rr_txt_t);
|
|
|
|
const HCountedArray *arr = H_CAST_SEQ(p->ast);
|
|
uint8_t **ret = h_arena_malloc(arr->arena, sizeof(uint8_t*)*arr->used);
|
|
for (size_t i=0; i<arr->used; ++i) {
|
|
size_t len = h_seq_len(arr->elements[i]);
|
|
uint8_t *tmp = h_arena_malloc(arr->arena, sizeof(uint8_t)*len);
|
|
for (size_t j=0; j<len; ++j)
|
|
tmp[j] = H_INDEX_UINT(arr->elements[i], j);
|
|
ret[i] = tmp;
|
|
}
|
|
|
|
txt->count = arr->used;
|
|
txt->txt_data = ret;
|
|
|
|
return H_MAKE(dns_rr_txt_t, txt);
|
|
}
|
|
|
|
HParsedToken* act_cstr(const HParseResult *p) {
|
|
dns_cstr_t *cs = H_ALLOC(dns_cstr_t);
|
|
|
|
const HCountedArray *arr = H_CAST_SEQ(p->ast);
|
|
uint8_t *ret = h_arena_malloc(arr->arena, sizeof(uint8_t)*arr->used);
|
|
for (size_t i=0; i<arr->used; ++i)
|
|
ret[i] = H_CAST_UINT(arr->elements[i]);
|
|
assert(ret[arr->used-1] == '\0'); // XXX Is this right?! If so, shouldn't it be a validation?
|
|
*cs = ret;
|
|
|
|
return H_MAKE(dns_cstr_t, cs);
|
|
}
|
|
|
|
HParsedToken* act_soa(const HParseResult *p) {
|
|
dns_rr_soa_t *soa = H_ALLOC(dns_rr_soa_t);
|
|
|
|
soa->mname = *H_FIELD(dns_domain_t, 0);
|
|
soa->rname = *H_FIELD(dns_domain_t, 1);
|
|
soa->serial = H_FIELD_UINT(2);
|
|
soa->refresh = H_FIELD_UINT(3);
|
|
soa->retry = H_FIELD_UINT(4);
|
|
soa->expire = H_FIELD_UINT(5);
|
|
soa->minimum = H_FIELD_UINT(6);
|
|
|
|
return H_MAKE(dns_rr_soa_t, soa);
|
|
}
|
|
|
|
HParsedToken* act_wks(const HParseResult *p) {
|
|
dns_rr_wks_t *wks = H_ALLOC(dns_rr_wks_t);
|
|
|
|
wks->address = H_FIELD_UINT(0);
|
|
wks->protocol = H_FIELD_UINT(1);
|
|
wks->len = H_FIELD_SEQ(2)->used;
|
|
wks->bit_map = h_arena_malloc(p->arena, sizeof(uint8_t)*wks->len);
|
|
for (size_t i=0; i<wks->len; ++i)
|
|
wks->bit_map[i] = H_INDEX_UINT(p->ast, 2, i);
|
|
|
|
return H_MAKE(dns_rr_wks_t, wks);
|
|
}
|
|
|
|
HParsedToken* act_hinfo(const HParseResult *p) {
|
|
dns_rr_hinfo_t *hinfo = H_ALLOC(dns_rr_hinfo_t);
|
|
|
|
hinfo->cpu = *H_FIELD(dns_cstr_t, 0);
|
|
hinfo->os = *H_FIELD(dns_cstr_t, 1);
|
|
|
|
return H_MAKE(dns_rr_hinfo_t, hinfo);
|
|
}
|
|
|
|
HParsedToken* act_minfo(const HParseResult *p) {
|
|
dns_rr_minfo_t *minfo = H_ALLOC(dns_rr_minfo_t);
|
|
|
|
minfo->rmailbx = *H_FIELD(dns_domain_t, 0);
|
|
minfo->emailbx = *H_FIELD(dns_domain_t, 1);
|
|
|
|
return H_MAKE(dns_rr_minfo_t, minfo);
|
|
}
|
|
|
|
HParsedToken* act_mx(const HParseResult *p) {
|
|
dns_rr_mx_t *mx = H_ALLOC(dns_rr_mx_t);
|
|
|
|
mx->preference = H_FIELD_UINT(0);
|
|
mx->exchange = *H_FIELD(dns_domain_t, 1);
|
|
|
|
return H_MAKE(dns_rr_mx_t, mx);
|
|
}
|
|
|
|
|
|
///
|
|
// Parsers for all types of RDATA
|
|
///
|
|
|
|
#define RDATA_TYPE_MAX 16
|
|
HParser* init_rdata(uint16_t type) {
|
|
static HParser *parsers[RDATA_TYPE_MAX+1];
|
|
static int inited = 0;
|
|
|
|
if (type >= sizeof(parsers))
|
|
return NULL;
|
|
|
|
if (inited)
|
|
return parsers[type];
|
|
|
|
|
|
H_RULE (domain, init_domain());
|
|
H_ARULE(cstr, init_character_string());
|
|
|
|
H_RULE (a, h_uint32());
|
|
H_RULE (ns, domain);
|
|
H_RULE (md, domain);
|
|
H_RULE (mf, domain);
|
|
H_RULE (cname, domain);
|
|
H_ARULE(soa, h_sequence(domain, // MNAME
|
|
domain, // RNAME
|
|
h_uint32(), // SERIAL
|
|
h_uint32(), // REFRESH
|
|
h_uint32(), // RETRY
|
|
h_uint32(), // EXPIRE
|
|
h_uint32(), // MINIMUM
|
|
NULL));
|
|
H_RULE (mb, domain);
|
|
H_RULE (mg, domain);
|
|
H_RULE (mr, domain);
|
|
H_VRULE(null, h_many(h_uint8()));
|
|
H_RULE (wks, h_sequence(h_uint32(),
|
|
h_uint8(),
|
|
h_many(h_uint8()),
|
|
NULL));
|
|
H_RULE (ptr, domain);
|
|
H_RULE (hinfo, h_sequence(cstr, cstr, NULL));
|
|
H_RULE (minfo, h_sequence(domain, domain, NULL));
|
|
H_RULE (mx, h_sequence(h_uint16(), domain, NULL));
|
|
H_ARULE(txt, h_many1(cstr));
|
|
|
|
|
|
parsers[ 0] = NULL; // there is no type 0
|
|
parsers[ 1] = a;
|
|
parsers[ 2] = ns;
|
|
parsers[ 3] = md;
|
|
parsers[ 4] = mf;
|
|
parsers[ 5] = cname;
|
|
parsers[ 6] = soa;
|
|
parsers[ 7] = mb;
|
|
parsers[ 8] = mg;
|
|
parsers[ 9] = mr;
|
|
parsers[10] = null;
|
|
parsers[11] = wks;
|
|
parsers[12] = ptr;
|
|
parsers[13] = hinfo;
|
|
parsers[14] = minfo;
|
|
parsers[15] = mx;
|
|
parsers[16] = txt;
|
|
|
|
// All parsers must consume their input exactly.
|
|
for(uint16_t i = 0; i<RDATA_TYPE_MAX+1; i++) {
|
|
if(parsers[i]) {
|
|
parsers[i] = h_action(h_sequence(parsers[i], h_end_p(), NULL),
|
|
act_index0);
|
|
}
|
|
}
|
|
|
|
inited = 1;
|
|
return parsers[type];
|
|
}
|