Home | History | Annotate | Line # | Download | only in dns
      1  1.16  christos /*	$NetBSD: nsec3.c,v 1.17 2026/01/29 18:37:49 christos Exp $	*/
      2   1.1  christos 
      3   1.1  christos /*
      4   1.1  christos  * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
      5   1.1  christos  *
      6  1.10  christos  * SPDX-License-Identifier: MPL-2.0
      7  1.10  christos  *
      8   1.1  christos  * This Source Code Form is subject to the terms of the Mozilla Public
      9   1.1  christos  * License, v. 2.0. If a copy of the MPL was not distributed with this
     10   1.7  christos  * file, you can obtain one at https://mozilla.org/MPL/2.0/.
     11   1.1  christos  *
     12   1.1  christos  * See the COPYRIGHT file distributed with this work for additional
     13   1.1  christos  * information regarding copyright ownership.
     14   1.1  christos  */
     15   1.1  christos 
     16   1.3  christos #include <inttypes.h>
     17   1.3  christos #include <stdbool.h>
     18   1.3  christos 
     19   1.1  christos #include <isc/base32.h>
     20   1.1  christos #include <isc/buffer.h>
     21   1.1  christos #include <isc/hex.h>
     22   1.1  christos #include <isc/iterated_hash.h>
     23   1.3  christos #include <isc/md.h>
     24   1.7  christos #include <isc/nonce.h>
     25  1.13  christos #include <isc/result.h>
     26   1.6  christos #include <isc/safe.h>
     27   1.1  christos #include <isc/string.h>
     28   1.1  christos #include <isc/util.h>
     29   1.1  christos 
     30   1.6  christos #include <dns/compress.h>
     31   1.1  christos #include <dns/db.h>
     32   1.1  christos #include <dns/dbiterator.h>
     33   1.1  christos #include <dns/diff.h>
     34   1.1  christos #include <dns/fixedname.h>
     35   1.1  christos #include <dns/nsec.h>
     36   1.1  christos #include <dns/nsec3.h>
     37   1.1  christos #include <dns/rdata.h>
     38   1.1  christos #include <dns/rdatalist.h>
     39   1.1  christos #include <dns/rdataset.h>
     40   1.1  christos #include <dns/rdatasetiter.h>
     41   1.1  christos #include <dns/rdatastruct.h>
     42   1.6  christos #include <dns/zone.h>
     43   1.6  christos 
     44   1.6  christos #include <dst/dst.h>
     45   1.1  christos 
     46  1.13  christos #define OPTOUT(x)  (((x) & DNS_NSEC3FLAG_OPTOUT) != 0)
     47  1.13  christos #define CREATE(x)  (((x) & DNS_NSEC3FLAG_CREATE) != 0)
     48  1.13  christos #define INITIAL(x) (((x) & DNS_NSEC3FLAG_INITIAL) != 0)
     49  1.13  christos #define REMOVE(x)  (((x) & DNS_NSEC3FLAG_REMOVE) != 0)
     50   1.1  christos 
     51   1.1  christos isc_result_t
     52   1.6  christos dns_nsec3_buildrdata(dns_db_t *db, dns_dbversion_t *version, dns_dbnode_t *node,
     53   1.6  christos 		     unsigned int hashalg, unsigned int flags,
     54   1.6  christos 		     unsigned int iterations, const unsigned char *salt,
     55   1.6  christos 		     size_t salt_length, const unsigned char *nexthash,
     56   1.6  christos 		     size_t hash_length, unsigned char *buffer,
     57   1.6  christos 		     dns_rdata_t *rdata) {
     58   1.1  christos 	isc_result_t result;
     59   1.1  christos 	dns_rdataset_t rdataset;
     60   1.1  christos 	isc_region_t r;
     61   1.1  christos 	unsigned int i;
     62   1.3  christos 	bool found;
     63   1.3  christos 	bool found_ns;
     64   1.3  christos 	bool need_rrsig;
     65   1.1  christos 
     66   1.1  christos 	unsigned char *nsec_bits, *bm;
     67   1.1  christos 	unsigned int max_type;
     68   1.1  christos 	dns_rdatasetiter_t *rdsiter;
     69   1.1  christos 	unsigned char *p;
     70   1.1  christos 
     71   1.1  christos 	REQUIRE(salt_length < 256U);
     72   1.1  christos 	REQUIRE(hash_length < 256U);
     73   1.1  christos 	REQUIRE(flags <= 0xffU);
     74   1.1  christos 	REQUIRE(hashalg <= 0xffU);
     75   1.1  christos 	REQUIRE(iterations <= 0xffffU);
     76   1.1  christos 
     77   1.1  christos 	switch (hashalg) {
     78   1.1  christos 	case dns_hash_sha1:
     79   1.1  christos 		REQUIRE(hash_length == ISC_SHA1_DIGESTLENGTH);
     80   1.1  christos 		break;
     81   1.1  christos 	}
     82   1.1  christos 
     83   1.1  christos 	memset(buffer, 0, DNS_NSEC3_BUFFERSIZE);
     84   1.1  christos 
     85   1.1  christos 	p = buffer;
     86   1.1  christos 
     87   1.1  christos 	*p++ = hashalg;
     88   1.1  christos 	*p++ = flags;
     89   1.1  christos 
     90   1.1  christos 	*p++ = iterations >> 8;
     91   1.1  christos 	*p++ = iterations;
     92   1.1  christos 
     93   1.1  christos 	*p++ = (unsigned char)salt_length;
     94   1.1  christos 	memmove(p, salt, salt_length);
     95   1.1  christos 	p += salt_length;
     96   1.1  christos 
     97   1.1  christos 	*p++ = (unsigned char)hash_length;
     98   1.1  christos 	memmove(p, nexthash, hash_length);
     99   1.1  christos 	p += hash_length;
    100   1.1  christos 
    101   1.1  christos 	r.length = (unsigned int)(p - buffer);
    102   1.1  christos 	r.base = buffer;
    103   1.1  christos 
    104   1.1  christos 	/*
    105   1.1  christos 	 * Use the end of the space for a raw bitmap leaving enough
    106   1.1  christos 	 * space for the window identifiers and length octets.
    107   1.1  christos 	 */
    108   1.1  christos 	bm = r.base + r.length + 512;
    109   1.1  christos 	nsec_bits = r.base + r.length;
    110   1.1  christos 	max_type = 0;
    111   1.6  christos 	if (node == NULL) {
    112   1.1  christos 		goto collapse_bitmap;
    113   1.6  christos 	}
    114   1.1  christos 	dns_rdataset_init(&rdataset);
    115   1.1  christos 	rdsiter = NULL;
    116  1.11  christos 	result = dns_db_allrdatasets(db, node, version, 0, 0, &rdsiter);
    117   1.6  christos 	if (result != ISC_R_SUCCESS) {
    118  1.14  christos 		return result;
    119   1.6  christos 	}
    120   1.3  christos 	found = found_ns = need_rrsig = false;
    121   1.6  christos 	for (result = dns_rdatasetiter_first(rdsiter); result == ISC_R_SUCCESS;
    122   1.1  christos 	     result = dns_rdatasetiter_next(rdsiter))
    123   1.1  christos 	{
    124   1.1  christos 		dns_rdatasetiter_current(rdsiter, &rdataset);
    125   1.1  christos 		if (rdataset.type != dns_rdatatype_nsec &&
    126   1.1  christos 		    rdataset.type != dns_rdatatype_nsec3 &&
    127   1.6  christos 		    rdataset.type != dns_rdatatype_rrsig)
    128   1.6  christos 		{
    129   1.6  christos 			if (rdataset.type > max_type) {
    130   1.1  christos 				max_type = rdataset.type;
    131   1.6  christos 			}
    132   1.1  christos 			dns_nsec_setbit(bm, rdataset.type, 1);
    133   1.1  christos 			/*
    134   1.1  christos 			 * Work out if we need to set the RRSIG bit for
    135   1.1  christos 			 * this node.  We set the RRSIG bit if either of
    136   1.1  christos 			 * the following conditions are met:
    137   1.1  christos 			 * 1) We have a SOA or DS then we need to set
    138   1.1  christos 			 *    the RRSIG bit as both always will be signed.
    139   1.1  christos 			 * 2) We set the RRSIG bit if we don't have
    140   1.1  christos 			 *    a NS record but do have other data.
    141   1.1  christos 			 */
    142   1.1  christos 			if (rdataset.type == dns_rdatatype_soa ||
    143  1.11  christos 			    rdataset.type == dns_rdatatype_ds)
    144  1.11  christos 			{
    145   1.3  christos 				need_rrsig = true;
    146   1.6  christos 			} else if (rdataset.type == dns_rdatatype_ns) {
    147   1.3  christos 				found_ns = true;
    148   1.6  christos 			} else {
    149   1.3  christos 				found = true;
    150   1.6  christos 			}
    151   1.1  christos 		}
    152   1.1  christos 		dns_rdataset_disassociate(&rdataset);
    153   1.1  christos 	}
    154   1.1  christos 	if ((found && !found_ns) || need_rrsig) {
    155   1.6  christos 		if (dns_rdatatype_rrsig > max_type) {
    156   1.1  christos 			max_type = dns_rdatatype_rrsig;
    157   1.6  christos 		}
    158   1.1  christos 		dns_nsec_setbit(bm, dns_rdatatype_rrsig, 1);
    159   1.1  christos 	}
    160   1.1  christos 
    161   1.1  christos 	/*
    162   1.1  christos 	 * At zone cuts, deny the existence of glue in the parent zone.
    163   1.1  christos 	 */
    164   1.1  christos 	if (dns_nsec_isset(bm, dns_rdatatype_ns) &&
    165   1.6  christos 	    !dns_nsec_isset(bm, dns_rdatatype_soa))
    166   1.6  christos 	{
    167   1.1  christos 		for (i = 0; i <= max_type; i++) {
    168   1.1  christos 			if (dns_nsec_isset(bm, i) &&
    169  1.11  christos 			    !dns_rdatatype_iszonecutauth((dns_rdatatype_t)i))
    170  1.11  christos 			{
    171   1.1  christos 				dns_nsec_setbit(bm, i, 0);
    172   1.6  christos 			}
    173   1.1  christos 		}
    174   1.1  christos 	}
    175   1.1  christos 
    176   1.1  christos 	dns_rdatasetiter_destroy(&rdsiter);
    177   1.6  christos 	if (result != ISC_R_NOMORE) {
    178  1.14  christos 		return result;
    179   1.6  christos 	}
    180   1.1  christos 
    181   1.6  christos collapse_bitmap:
    182   1.1  christos 	nsec_bits += dns_nsec_compressbitmap(nsec_bits, bm, max_type);
    183   1.1  christos 	r.length = (unsigned int)(nsec_bits - r.base);
    184   1.1  christos 	INSIST(r.length <= DNS_NSEC3_BUFFERSIZE);
    185   1.1  christos 	dns_rdata_fromregion(rdata, dns_db_class(db), dns_rdatatype_nsec3, &r);
    186   1.1  christos 
    187  1.14  christos 	return ISC_R_SUCCESS;
    188   1.1  christos }
    189   1.1  christos 
    190   1.3  christos bool
    191   1.1  christos dns_nsec3_typepresent(dns_rdata_t *rdata, dns_rdatatype_t type) {
    192   1.1  christos 	dns_rdata_nsec3_t nsec3;
    193   1.1  christos 	isc_result_t result;
    194   1.3  christos 	bool present;
    195   1.1  christos 	unsigned int i, len, window;
    196   1.1  christos 
    197   1.1  christos 	REQUIRE(rdata != NULL);
    198   1.1  christos 	REQUIRE(rdata->type == dns_rdatatype_nsec3);
    199   1.1  christos 
    200   1.1  christos 	/* This should never fail */
    201   1.1  christos 	result = dns_rdata_tostruct(rdata, &nsec3, NULL);
    202   1.1  christos 	INSIST(result == ISC_R_SUCCESS);
    203   1.1  christos 
    204   1.3  christos 	present = false;
    205   1.1  christos 	for (i = 0; i < nsec3.len; i += len) {
    206   1.1  christos 		INSIST(i + 2 <= nsec3.len);
    207   1.1  christos 		window = nsec3.typebits[i];
    208   1.1  christos 		len = nsec3.typebits[i + 1];
    209   1.1  christos 		INSIST(len > 0 && len <= 32);
    210   1.1  christos 		i += 2;
    211   1.1  christos 		INSIST(i + len <= nsec3.len);
    212   1.6  christos 		if (window * 256 > type) {
    213   1.1  christos 			break;
    214   1.6  christos 		}
    215   1.6  christos 		if ((window + 1) * 256 <= type) {
    216   1.1  christos 			continue;
    217   1.6  christos 		}
    218   1.3  christos 		if (type < (window * 256) + len * 8) {
    219   1.3  christos 			present = dns_nsec_isset(&nsec3.typebits[i],
    220   1.3  christos 						 type % 256);
    221   1.3  christos 		}
    222   1.1  christos 		break;
    223   1.1  christos 	}
    224   1.1  christos 	dns_rdata_freestruct(&nsec3);
    225  1.14  christos 	return present;
    226   1.1  christos }
    227   1.1  christos 
    228   1.1  christos isc_result_t
    229   1.7  christos dns_nsec3_generate_salt(unsigned char *salt, size_t saltlen) {
    230   1.7  christos 	if (saltlen > 255U) {
    231  1.14  christos 		return ISC_R_RANGE;
    232   1.7  christos 	}
    233   1.7  christos 	isc_nonce_buf(salt, saltlen);
    234  1.14  christos 	return ISC_R_SUCCESS;
    235   1.7  christos }
    236   1.7  christos 
    237   1.7  christos isc_result_t
    238   1.1  christos dns_nsec3_hashname(dns_fixedname_t *result,
    239   1.1  christos 		   unsigned char rethash[NSEC3_MAX_HASH_LENGTH],
    240   1.1  christos 		   size_t *hash_length, const dns_name_t *name,
    241   1.6  christos 		   const dns_name_t *origin, dns_hash_t hashalg,
    242   1.6  christos 		   unsigned int iterations, const unsigned char *salt,
    243   1.6  christos 		   size_t saltlength) {
    244   1.1  christos 	unsigned char hash[NSEC3_MAX_HASH_LENGTH];
    245   1.1  christos 	unsigned char nametext[DNS_NAME_FORMATSIZE];
    246   1.1  christos 	dns_fixedname_t fixed;
    247   1.1  christos 	dns_name_t *downcased;
    248   1.1  christos 	isc_buffer_t namebuffer;
    249   1.1  christos 	isc_region_t region;
    250   1.1  christos 	size_t len;
    251   1.1  christos 
    252   1.6  christos 	if (rethash == NULL) {
    253   1.1  christos 		rethash = hash;
    254   1.6  christos 	}
    255   1.1  christos 
    256   1.1  christos 	memset(rethash, 0, NSEC3_MAX_HASH_LENGTH);
    257   1.1  christos 
    258   1.1  christos 	downcased = dns_fixedname_initname(&fixed);
    259   1.1  christos 	dns_name_downcase(name, downcased, NULL);
    260   1.1  christos 
    261   1.1  christos 	/* hash the node name */
    262   1.6  christos 	len = isc_iterated_hash(rethash, hashalg, iterations, salt,
    263   1.6  christos 				(int)saltlength, downcased->ndata,
    264   1.6  christos 				downcased->length);
    265   1.6  christos 	if (len == 0U) {
    266  1.14  christos 		return DNS_R_BADALG;
    267   1.6  christos 	}
    268   1.1  christos 
    269  1.14  christos 	SET_IF_NOT_NULL(hash_length, len);
    270   1.1  christos 
    271   1.1  christos 	/* convert the hash to base32hex non-padded */
    272   1.1  christos 	region.base = rethash;
    273   1.1  christos 	region.length = (unsigned int)len;
    274   1.1  christos 	isc_buffer_init(&namebuffer, nametext, sizeof nametext);
    275   1.1  christos 	isc_base32hexnp_totext(&region, 1, "", &namebuffer);
    276   1.1  christos 
    277   1.1  christos 	/* convert the hex to a domain name */
    278   1.1  christos 	dns_fixedname_init(result);
    279  1.14  christos 	return dns_name_fromtext(dns_fixedname_name(result), &namebuffer,
    280  1.14  christos 				 origin, 0, NULL);
    281   1.1  christos }
    282   1.1  christos 
    283   1.1  christos unsigned int
    284   1.1  christos dns_nsec3_hashlength(dns_hash_t hash) {
    285   1.1  christos 	switch (hash) {
    286   1.1  christos 	case dns_hash_sha1:
    287  1.14  christos 		return ISC_SHA1_DIGESTLENGTH;
    288   1.1  christos 	}
    289  1.14  christos 	return 0;
    290   1.1  christos }
    291   1.1  christos 
    292   1.3  christos bool
    293   1.1  christos dns_nsec3_supportedhash(dns_hash_t hash) {
    294   1.1  christos 	switch (hash) {
    295   1.1  christos 	case dns_hash_sha1:
    296  1.14  christos 		return true;
    297   1.1  christos 	}
    298  1.14  christos 	return false;
    299   1.1  christos }
    300   1.1  christos 
    301   1.1  christos /*%
    302   1.1  christos  * Update a single RR in version 'ver' of 'db' and log the
    303   1.1  christos  * update in 'diff'.
    304   1.1  christos  *
    305   1.1  christos  * Ensures:
    306   1.1  christos  * \li  '*tuple' == NULL.  Either the tuple is freed, or its
    307   1.1  christos  *      ownership has been transferred to the diff.
    308   1.1  christos  */
    309   1.1  christos static isc_result_t
    310   1.1  christos do_one_tuple(dns_difftuple_t **tuple, dns_db_t *db, dns_dbversion_t *ver,
    311   1.6  christos 	     dns_diff_t *diff) {
    312   1.1  christos 	dns_diff_t temp_diff;
    313   1.1  christos 	isc_result_t result;
    314   1.1  christos 
    315   1.1  christos 	/*
    316   1.1  christos 	 * Create a singleton diff.
    317   1.1  christos 	 */
    318   1.1  christos 	dns_diff_init(diff->mctx, &temp_diff);
    319   1.1  christos 	ISC_LIST_APPEND(temp_diff.tuples, *tuple, link);
    320   1.1  christos 
    321   1.1  christos 	/*
    322   1.1  christos 	 * Apply it to the database.
    323   1.1  christos 	 */
    324   1.1  christos 	result = dns_diff_apply(&temp_diff, db, ver);
    325   1.1  christos 	ISC_LIST_UNLINK(temp_diff.tuples, *tuple, link);
    326   1.1  christos 	if (result != ISC_R_SUCCESS) {
    327   1.1  christos 		dns_difftuple_free(tuple);
    328  1.14  christos 		return result;
    329   1.1  christos 	}
    330   1.1  christos 
    331   1.1  christos 	/*
    332   1.1  christos 	 * Merge it into the current pending journal entry.
    333   1.1  christos 	 */
    334   1.1  christos 	dns_diff_appendminimal(diff, tuple);
    335   1.1  christos 
    336   1.1  christos 	/*
    337   1.1  christos 	 * Do not clear temp_diff.
    338   1.1  christos 	 */
    339  1.14  christos 	return ISC_R_SUCCESS;
    340   1.1  christos }
    341   1.1  christos 
    342   1.1  christos /*%
    343   1.1  christos  * Set '*exists' to true iff the given name exists, to false otherwise.
    344   1.1  christos  */
    345   1.1  christos static isc_result_t
    346   1.1  christos name_exists(dns_db_t *db, dns_dbversion_t *version, const dns_name_t *name,
    347   1.6  christos 	    bool *exists) {
    348   1.1  christos 	isc_result_t result;
    349   1.1  christos 	dns_dbnode_t *node = NULL;
    350   1.1  christos 	dns_rdatasetiter_t *iter = NULL;
    351   1.1  christos 
    352   1.3  christos 	result = dns_db_findnode(db, name, false, &node);
    353   1.1  christos 	if (result == ISC_R_NOTFOUND) {
    354   1.3  christos 		*exists = false;
    355  1.14  christos 		return ISC_R_SUCCESS;
    356   1.1  christos 	}
    357   1.6  christos 	if (result != ISC_R_SUCCESS) {
    358  1.14  christos 		return result;
    359   1.6  christos 	}
    360   1.1  christos 
    361  1.11  christos 	result = dns_db_allrdatasets(db, node, version, 0, (isc_stdtime_t)0,
    362   1.6  christos 				     &iter);
    363   1.6  christos 	if (result != ISC_R_SUCCESS) {
    364   1.1  christos 		goto cleanup_node;
    365   1.6  christos 	}
    366   1.1  christos 
    367   1.1  christos 	result = dns_rdatasetiter_first(iter);
    368   1.1  christos 	if (result == ISC_R_SUCCESS) {
    369   1.3  christos 		*exists = true;
    370   1.1  christos 	} else if (result == ISC_R_NOMORE) {
    371   1.3  christos 		*exists = false;
    372   1.1  christos 		result = ISC_R_SUCCESS;
    373   1.6  christos 	} else {
    374   1.3  christos 		*exists = false;
    375   1.6  christos 	}
    376   1.1  christos 	dns_rdatasetiter_destroy(&iter);
    377   1.1  christos 
    378   1.6  christos cleanup_node:
    379   1.1  christos 	dns_db_detachnode(db, &node);
    380  1.14  christos 	return result;
    381   1.1  christos }
    382   1.1  christos 
    383   1.3  christos static bool
    384   1.1  christos match_nsec3param(const dns_rdata_nsec3_t *nsec3,
    385   1.6  christos 		 const dns_rdata_nsec3param_t *nsec3param) {
    386   1.1  christos 	if (nsec3->hash == nsec3param->hash &&
    387   1.1  christos 	    nsec3->iterations == nsec3param->iterations &&
    388   1.1  christos 	    nsec3->salt_length == nsec3param->salt_length &&
    389   1.1  christos 	    !memcmp(nsec3->salt, nsec3param->salt, nsec3->salt_length))
    390   1.6  christos 	{
    391  1.14  christos 		return true;
    392   1.6  christos 	}
    393  1.14  christos 	return false;
    394   1.1  christos }
    395   1.1  christos 
    396   1.1  christos /*%
    397   1.1  christos  * Delete NSEC3 records at "name" which match "param", recording the
    398   1.1  christos  * change in "diff".
    399   1.1  christos  */
    400   1.1  christos static isc_result_t
    401   1.1  christos delnsec3(dns_db_t *db, dns_dbversion_t *version, const dns_name_t *name,
    402   1.6  christos 	 const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff) {
    403   1.6  christos 	dns_dbnode_t *node = NULL;
    404   1.1  christos 	dns_difftuple_t *tuple = NULL;
    405   1.1  christos 	dns_rdata_nsec3_t nsec3;
    406   1.1  christos 	dns_rdataset_t rdataset;
    407   1.1  christos 	isc_result_t result;
    408   1.1  christos 
    409   1.3  christos 	result = dns_db_findnsec3node(db, name, false, &node);
    410   1.6  christos 	if (result == ISC_R_NOTFOUND) {
    411  1.14  christos 		return ISC_R_SUCCESS;
    412   1.6  christos 	}
    413   1.6  christos 	if (result != ISC_R_SUCCESS) {
    414  1.14  christos 		return result;
    415   1.6  christos 	}
    416   1.1  christos 
    417   1.1  christos 	dns_rdataset_init(&rdataset);
    418   1.1  christos 	result = dns_db_findrdataset(db, node, version, dns_rdatatype_nsec3, 0,
    419   1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
    420   1.1  christos 
    421   1.1  christos 	if (result == ISC_R_NOTFOUND) {
    422   1.1  christos 		result = ISC_R_SUCCESS;
    423   1.1  christos 		goto cleanup_node;
    424   1.1  christos 	}
    425   1.6  christos 	if (result != ISC_R_SUCCESS) {
    426   1.1  christos 		goto cleanup_node;
    427   1.6  christos 	}
    428   1.1  christos 
    429   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
    430   1.1  christos 	     result = dns_rdataset_next(&rdataset))
    431   1.1  christos 	{
    432   1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    433   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
    434   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3, NULL));
    435   1.1  christos 
    436   1.6  christos 		if (!match_nsec3param(&nsec3, nsec3param)) {
    437   1.1  christos 			continue;
    438   1.6  christos 		}
    439   1.1  christos 
    440  1.17  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, name,
    441  1.17  christos 					   rdataset.ttl, &rdata, &tuple));
    442  1.17  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
    443   1.1  christos 	}
    444   1.6  christos 	if (result != ISC_R_NOMORE) {
    445  1.17  christos 		goto cleanup;
    446   1.6  christos 	}
    447   1.1  christos 	result = ISC_R_SUCCESS;
    448   1.1  christos 
    449  1.17  christos cleanup:
    450   1.1  christos 	dns_rdataset_disassociate(&rdataset);
    451   1.6  christos cleanup_node:
    452   1.1  christos 	dns_db_detachnode(db, &node);
    453   1.1  christos 
    454  1.14  christos 	return result;
    455   1.1  christos }
    456   1.1  christos 
    457   1.3  christos static bool
    458   1.1  christos better_param(dns_rdataset_t *nsec3paramset, dns_rdata_t *param) {
    459   1.1  christos 	dns_rdataset_t rdataset;
    460   1.1  christos 	isc_result_t result;
    461   1.1  christos 
    462   1.6  christos 	if (REMOVE(param->data[1])) {
    463  1.14  christos 		return true;
    464   1.6  christos 	}
    465   1.1  christos 
    466   1.1  christos 	dns_rdataset_init(&rdataset);
    467   1.1  christos 	dns_rdataset_clone(nsec3paramset, &rdataset);
    468   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
    469   1.6  christos 	     result = dns_rdataset_next(&rdataset))
    470   1.6  christos 	{
    471   1.6  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    472   1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
    473   1.1  christos 
    474   1.1  christos 		if (rdataset.type != dns_rdatatype_nsec3param) {
    475   1.6  christos 			dns_rdata_t tmprdata = DNS_RDATA_INIT;
    476   1.1  christos 			dns_rdataset_current(&rdataset, &tmprdata);
    477   1.6  christos 			if (!dns_nsec3param_fromprivate(&tmprdata, &rdata, buf,
    478  1.11  christos 							sizeof(buf)))
    479  1.11  christos 			{
    480   1.1  christos 				continue;
    481   1.6  christos 			}
    482   1.6  christos 		} else {
    483   1.1  christos 			dns_rdataset_current(&rdataset, &rdata);
    484   1.6  christos 		}
    485   1.1  christos 
    486   1.6  christos 		if (rdata.length != param->length) {
    487   1.1  christos 			continue;
    488   1.6  christos 		}
    489   1.6  christos 		if (rdata.data[0] != param->data[0] || REMOVE(rdata.data[1]) ||
    490   1.1  christos 		    rdata.data[2] != param->data[2] ||
    491   1.1  christos 		    rdata.data[3] != param->data[3] ||
    492   1.1  christos 		    rdata.data[4] != param->data[4] ||
    493   1.1  christos 		    memcmp(&rdata.data[5], &param->data[5], param->data[4]))
    494   1.6  christos 		{
    495   1.1  christos 			continue;
    496   1.6  christos 		}
    497   1.1  christos 		if (CREATE(rdata.data[1]) && !CREATE(param->data[1])) {
    498   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    499  1.14  christos 			return true;
    500   1.1  christos 		}
    501   1.1  christos 	}
    502   1.1  christos 	dns_rdataset_disassociate(&rdataset);
    503  1.14  christos 	return false;
    504   1.1  christos }
    505   1.1  christos 
    506   1.1  christos static isc_result_t
    507   1.1  christos find_nsec3(dns_rdata_nsec3_t *nsec3, dns_rdataset_t *rdataset,
    508   1.6  christos 	   const dns_rdata_nsec3param_t *nsec3param) {
    509   1.1  christos 	isc_result_t result;
    510   1.6  christos 	for (result = dns_rdataset_first(rdataset); result == ISC_R_SUCCESS;
    511   1.6  christos 	     result = dns_rdataset_next(rdataset))
    512   1.6  christos 	{
    513   1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    514   1.1  christos 
    515   1.1  christos 		dns_rdataset_current(rdataset, &rdata);
    516   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, nsec3, NULL));
    517   1.1  christos 		dns_rdata_reset(&rdata);
    518   1.6  christos 		if (match_nsec3param(nsec3, nsec3param)) {
    519   1.1  christos 			break;
    520   1.6  christos 		}
    521   1.1  christos 	}
    522  1.17  christos cleanup:
    523  1.14  christos 	return result;
    524   1.1  christos }
    525   1.1  christos 
    526   1.1  christos isc_result_t
    527   1.1  christos dns_nsec3_addnsec3(dns_db_t *db, dns_dbversion_t *version,
    528   1.1  christos 		   const dns_name_t *name,
    529   1.6  christos 		   const dns_rdata_nsec3param_t *nsec3param, dns_ttl_t nsecttl,
    530   1.6  christos 		   bool unsecure, dns_diff_t *diff) {
    531   1.1  christos 	dns_dbiterator_t *dbit = NULL;
    532   1.1  christos 	dns_dbnode_t *node = NULL;
    533   1.1  christos 	dns_dbnode_t *newnode = NULL;
    534   1.1  christos 	dns_difftuple_t *tuple = NULL;
    535   1.1  christos 	dns_fixedname_t fixed;
    536   1.1  christos 	dns_fixedname_t fprev;
    537   1.1  christos 	dns_hash_t hash;
    538   1.1  christos 	dns_name_t *hashname;
    539   1.1  christos 	dns_name_t *origin;
    540   1.1  christos 	dns_name_t *prev;
    541   1.1  christos 	dns_name_t empty;
    542   1.1  christos 	dns_rdata_nsec3_t nsec3;
    543   1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
    544   1.1  christos 	dns_rdataset_t rdataset;
    545   1.1  christos 	int pass;
    546   1.3  christos 	bool exists = false;
    547   1.3  christos 	bool maybe_remove_unsecure = false;
    548   1.3  christos 	uint8_t flags;
    549   1.1  christos 	isc_buffer_t buffer;
    550   1.1  christos 	isc_result_t result;
    551   1.1  christos 	unsigned char *old_next;
    552   1.1  christos 	unsigned char *salt;
    553   1.1  christos 	unsigned char nexthash[NSEC3_MAX_HASH_LENGTH];
    554   1.1  christos 	unsigned char nsec3buf[DNS_NSEC3_BUFFERSIZE];
    555   1.1  christos 	unsigned int iterations;
    556   1.1  christos 	unsigned int labels;
    557   1.1  christos 	size_t next_length;
    558   1.1  christos 	unsigned int old_length;
    559   1.1  christos 	unsigned int salt_length;
    560   1.1  christos 
    561   1.1  christos 	hashname = dns_fixedname_initname(&fixed);
    562   1.1  christos 	prev = dns_fixedname_initname(&fprev);
    563   1.1  christos 
    564   1.1  christos 	dns_rdataset_init(&rdataset);
    565   1.1  christos 
    566   1.1  christos 	origin = dns_db_origin(db);
    567   1.1  christos 
    568   1.1  christos 	/*
    569   1.1  christos 	 * Chain parameters.
    570   1.1  christos 	 */
    571   1.1  christos 	hash = nsec3param->hash;
    572   1.1  christos 	iterations = nsec3param->iterations;
    573   1.1  christos 	salt_length = nsec3param->salt_length;
    574   1.1  christos 	salt = nsec3param->salt;
    575   1.1  christos 
    576   1.1  christos 	/*
    577   1.1  christos 	 * Default flags for a new chain.
    578   1.1  christos 	 */
    579   1.1  christos 	flags = nsec3param->flags & DNS_NSEC3FLAG_OPTOUT;
    580   1.1  christos 
    581   1.1  christos 	/*
    582   1.1  christos 	 * If this is the first NSEC3 in the chain nexthash will
    583   1.1  christos 	 * remain pointing to itself.
    584   1.1  christos 	 */
    585   1.1  christos 	next_length = sizeof(nexthash);
    586   1.6  christos 	CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, name, origin,
    587   1.6  christos 				 hash, iterations, salt, salt_length));
    588   1.1  christos 	INSIST(next_length <= sizeof(nexthash));
    589   1.1  christos 
    590   1.1  christos 	/*
    591   1.1  christos 	 * Create the node if it doesn't exist and hold
    592   1.1  christos 	 * a reference to it until we have added the NSEC3.
    593   1.1  christos 	 */
    594  1.17  christos 	result = dns_db_findnsec3node(db, hashname, false, &newnode);
    595  1.17  christos 	if (result != ISC_R_SUCCESS) {
    596  1.17  christos 		isc_result_t tresult;
    597  1.17  christos 
    598  1.17  christos 		CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
    599  1.17  christos 		tresult = dns_dbiterator_seek3(dbit, hashname);
    600  1.17  christos 		CHECK(dns_dbiterator_pause(dbit));
    601  1.17  christos 
    602  1.17  christos 		if (tresult != ISC_R_SUCCESS) {
    603  1.17  christos 			/* Nothing in the NSEC3 space yet. */
    604  1.17  christos 			if (!unsecure) {
    605  1.17  christos 				goto addnsec3;
    606  1.17  christos 			}
    607  1.17  christos 			goto cleanup;
    608  1.17  christos 		}
    609  1.17  christos 
    610  1.17  christos 		goto find_previous;
    611  1.17  christos 	}
    612   1.1  christos 
    613   1.1  christos 	/*
    614   1.1  christos 	 * Seek the iterator to the 'newnode'.
    615   1.1  christos 	 */
    616   1.1  christos 	CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
    617   1.1  christos 	CHECK(dns_dbiterator_seek(dbit, hashname));
    618   1.1  christos 	CHECK(dns_dbiterator_pause(dbit));
    619   1.1  christos 	result = dns_db_findrdataset(db, newnode, version, dns_rdatatype_nsec3,
    620   1.6  christos 				     0, (isc_stdtime_t)0, &rdataset, NULL);
    621   1.1  christos 	/*
    622   1.1  christos 	 * If we updating a existing NSEC3 then find its
    623   1.1  christos 	 * next field.
    624   1.1  christos 	 */
    625   1.1  christos 	if (result == ISC_R_SUCCESS) {
    626   1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
    627   1.1  christos 		if (result == ISC_R_SUCCESS) {
    628   1.6  christos 			if (!CREATE(nsec3param->flags)) {
    629   1.1  christos 				flags = nsec3.flags;
    630   1.6  christos 			}
    631   1.1  christos 			next_length = nsec3.next_length;
    632   1.1  christos 			INSIST(next_length <= sizeof(nexthash));
    633   1.1  christos 			memmove(nexthash, nsec3.next, next_length);
    634   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    635   1.1  christos 			/*
    636   1.1  christos 			 * If the NSEC3 is not for a unsecure delegation then
    637   1.1  christos 			 * we are just updating it.  If it is for a unsecure
    638   1.1  christos 			 * delegation then we need find out if we need to
    639   1.1  christos 			 * remove the NSEC3 record or not by examining the
    640   1.1  christos 			 * previous NSEC3 record.
    641   1.1  christos 			 */
    642   1.6  christos 			if (!unsecure) {
    643   1.1  christos 				goto addnsec3;
    644   1.6  christos 			} else if (CREATE(nsec3param->flags) && OPTOUT(flags)) {
    645   1.1  christos 				result = dns_nsec3_delnsec3(db, version, name,
    646   1.1  christos 							    nsec3param, diff);
    647  1.17  christos 				goto cleanup;
    648   1.6  christos 			} else {
    649   1.3  christos 				maybe_remove_unsecure = true;
    650   1.6  christos 			}
    651   1.1  christos 		} else {
    652   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    653   1.6  christos 			if (result != ISC_R_NOMORE) {
    654  1.17  christos 				goto cleanup;
    655   1.6  christos 			}
    656   1.1  christos 		}
    657   1.1  christos 	}
    658   1.1  christos 
    659  1.17  christos find_previous:
    660   1.1  christos 	/*
    661   1.1  christos 	 * Find the previous NSEC3 (if any) and update it if required.
    662   1.1  christos 	 */
    663   1.1  christos 	pass = 0;
    664   1.1  christos 	do {
    665   1.1  christos 		result = dns_dbiterator_prev(dbit);
    666   1.1  christos 		if (result == ISC_R_NOMORE) {
    667   1.1  christos 			pass++;
    668   1.1  christos 			CHECK(dns_dbiterator_last(dbit));
    669   1.1  christos 		}
    670   1.1  christos 		CHECK(dns_dbiterator_current(dbit, &node, prev));
    671   1.1  christos 		CHECK(dns_dbiterator_pause(dbit));
    672   1.1  christos 		result = dns_db_findrdataset(db, node, version,
    673   1.1  christos 					     dns_rdatatype_nsec3, 0,
    674   1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
    675   1.1  christos 		dns_db_detachnode(db, &node);
    676   1.6  christos 		if (result != ISC_R_SUCCESS) {
    677   1.1  christos 			continue;
    678   1.6  christos 		}
    679   1.1  christos 
    680   1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
    681   1.1  christos 		if (result == ISC_R_NOMORE) {
    682   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    683   1.1  christos 			continue;
    684   1.1  christos 		}
    685  1.17  christos 		CHECK(result);
    686   1.1  christos 
    687   1.1  christos 		if (maybe_remove_unsecure) {
    688   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    689   1.1  christos 			/*
    690   1.1  christos 			 * If we have OPTOUT set in the previous NSEC3 record
    691   1.1  christos 			 * we actually need to delete the NSEC3 record.
    692   1.1  christos 			 * Otherwise we just need to replace the NSEC3 record.
    693   1.1  christos 			 */
    694   1.1  christos 			if (OPTOUT(nsec3.flags)) {
    695   1.1  christos 				result = dns_nsec3_delnsec3(db, version, name,
    696   1.1  christos 							    nsec3param, diff);
    697  1.17  christos 				goto cleanup;
    698   1.1  christos 			}
    699   1.1  christos 			goto addnsec3;
    700   1.1  christos 		} else {
    701   1.1  christos 			/*
    702   1.1  christos 			 * Is this is a unsecure delegation we are adding?
    703   1.1  christos 			 * If so no change is required.
    704   1.1  christos 			 */
    705   1.1  christos 			if (OPTOUT(nsec3.flags) && unsecure) {
    706   1.1  christos 				dns_rdataset_disassociate(&rdataset);
    707  1.17  christos 				goto cleanup;
    708   1.1  christos 			}
    709   1.1  christos 		}
    710   1.1  christos 
    711   1.1  christos 		old_next = nsec3.next;
    712   1.1  christos 		old_length = nsec3.next_length;
    713   1.1  christos 
    714   1.1  christos 		/*
    715   1.1  christos 		 * Delete the old previous NSEC3.
    716   1.1  christos 		 */
    717   1.1  christos 		CHECK(delnsec3(db, version, prev, nsec3param, diff));
    718   1.1  christos 
    719   1.1  christos 		/*
    720   1.1  christos 		 * Fixup the previous NSEC3.
    721   1.1  christos 		 */
    722   1.1  christos 		nsec3.next = nexthash;
    723   1.1  christos 		nsec3.next_length = (unsigned char)next_length;
    724   1.1  christos 		isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
    725   1.1  christos 		CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
    726   1.1  christos 					   dns_rdatatype_nsec3, &nsec3,
    727   1.1  christos 					   &buffer));
    728   1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, prev,
    729   1.1  christos 					   rdataset.ttl, &rdata, &tuple));
    730   1.1  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
    731   1.1  christos 		INSIST(old_length <= sizeof(nexthash));
    732   1.1  christos 		memmove(nexthash, old_next, old_length);
    733   1.6  christos 		if (!CREATE(nsec3param->flags)) {
    734   1.1  christos 			flags = nsec3.flags;
    735   1.6  christos 		}
    736   1.1  christos 		dns_rdata_reset(&rdata);
    737   1.1  christos 		dns_rdataset_disassociate(&rdataset);
    738   1.1  christos 		break;
    739   1.1  christos 	} while (pass < 2);
    740   1.1  christos 
    741   1.6  christos addnsec3:
    742   1.1  christos 	/*
    743   1.1  christos 	 * Create the NSEC3 RDATA.
    744   1.1  christos 	 */
    745  1.17  christos 	if (newnode == NULL) {
    746  1.17  christos 		CHECK(dns_db_findnsec3node(db, hashname, true, &newnode));
    747  1.17  christos 	}
    748  1.17  christos 
    749   1.3  christos 	CHECK(dns_db_findnode(db, name, false, &node));
    750   1.1  christos 	CHECK(dns_nsec3_buildrdata(db, version, node, hash, flags, iterations,
    751   1.1  christos 				   salt, salt_length, nexthash, next_length,
    752   1.1  christos 				   nsec3buf, &rdata));
    753   1.1  christos 	dns_db_detachnode(db, &node);
    754   1.1  christos 
    755   1.1  christos 	/*
    756   1.1  christos 	 * Delete the old NSEC3 and record the change.
    757   1.1  christos 	 */
    758   1.1  christos 	CHECK(delnsec3(db, version, hashname, nsec3param, diff));
    759   1.1  christos 	/*
    760   1.1  christos 	 * Add the new NSEC3 and record the change.
    761   1.1  christos 	 */
    762   1.6  christos 	CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, hashname,
    763   1.6  christos 				   nsecttl, &rdata, &tuple));
    764   1.1  christos 	CHECK(do_one_tuple(&tuple, db, version, diff));
    765   1.1  christos 	INSIST(tuple == NULL);
    766   1.1  christos 	dns_rdata_reset(&rdata);
    767   1.1  christos 	dns_db_detachnode(db, &newnode);
    768   1.1  christos 
    769   1.1  christos 	/*
    770   1.1  christos 	 * Add missing NSEC3 records for empty nodes
    771   1.1  christos 	 */
    772   1.1  christos 	dns_name_init(&empty, NULL);
    773   1.1  christos 	dns_name_clone(name, &empty);
    774   1.1  christos 	do {
    775   1.1  christos 		labels = dns_name_countlabels(&empty) - 1;
    776   1.6  christos 		if (labels <= dns_name_countlabels(origin)) {
    777   1.1  christos 			break;
    778   1.6  christos 		}
    779   1.1  christos 		dns_name_getlabelsequence(&empty, 1, labels, &empty);
    780   1.1  christos 		CHECK(name_exists(db, version, &empty, &exists));
    781   1.6  christos 		if (exists) {
    782   1.1  christos 			break;
    783   1.6  christos 		}
    784   1.6  christos 		CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, &empty,
    785   1.6  christos 					 origin, hash, iterations, salt,
    786   1.6  christos 					 salt_length));
    787   1.1  christos 
    788   1.1  christos 		/*
    789   1.1  christos 		 * Create the node if it doesn't exist and hold
    790   1.1  christos 		 * a reference to it until we have added the NSEC3
    791  1.15  christos 		 * or we discover we don't need to make a change.
    792   1.1  christos 		 */
    793   1.3  christos 		CHECK(dns_db_findnsec3node(db, hashname, true, &newnode));
    794   1.1  christos 		result = dns_db_findrdataset(db, newnode, version,
    795   1.1  christos 					     dns_rdatatype_nsec3, 0,
    796   1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
    797   1.1  christos 		if (result == ISC_R_SUCCESS) {
    798   1.1  christos 			result = find_nsec3(&nsec3, &rdataset, nsec3param);
    799   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    800   1.1  christos 			if (result == ISC_R_SUCCESS) {
    801   1.1  christos 				dns_db_detachnode(db, &newnode);
    802   1.1  christos 				break;
    803   1.1  christos 			}
    804   1.6  christos 			if (result != ISC_R_NOMORE) {
    805  1.17  christos 				goto cleanup;
    806   1.6  christos 			}
    807  1.15  christos 		} else if (result == ISC_R_NOTFOUND) {
    808  1.15  christos 			/*
    809  1.15  christos 			 * If we didn't find an NSEC3 in the node,
    810  1.15  christos 			 * then the node must have been newly created
    811  1.15  christos 			 * by dns_db_findnsec3node(). The iterator
    812  1.15  christos 			 * needs to be updated so we can seek for
    813  1.15  christos 			 * the node's predecessor.
    814  1.15  christos 			 */
    815  1.15  christos 			dns_dbiterator_destroy(&dbit);
    816  1.15  christos 			CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY,
    817  1.15  christos 						    &dbit));
    818   1.1  christos 		}
    819   1.1  christos 
    820   1.1  christos 		/*
    821   1.1  christos 		 * Find the previous NSEC3 and update it.
    822   1.1  christos 		 */
    823   1.1  christos 		CHECK(dns_dbiterator_seek(dbit, hashname));
    824   1.1  christos 		pass = 0;
    825   1.1  christos 		do {
    826   1.1  christos 			result = dns_dbiterator_prev(dbit);
    827   1.1  christos 			if (result == ISC_R_NOMORE) {
    828   1.1  christos 				pass++;
    829   1.1  christos 				CHECK(dns_dbiterator_last(dbit));
    830   1.1  christos 			}
    831   1.1  christos 			CHECK(dns_dbiterator_current(dbit, &node, prev));
    832   1.1  christos 			CHECK(dns_dbiterator_pause(dbit));
    833   1.6  christos 			result = dns_db_findrdataset(
    834   1.6  christos 				db, node, version, dns_rdatatype_nsec3, 0,
    835   1.6  christos 				(isc_stdtime_t)0, &rdataset, NULL);
    836   1.1  christos 			dns_db_detachnode(db, &node);
    837   1.6  christos 			if (result != ISC_R_SUCCESS) {
    838   1.1  christos 				continue;
    839   1.6  christos 			}
    840   1.1  christos 			result = find_nsec3(&nsec3, &rdataset, nsec3param);
    841   1.1  christos 			if (result == ISC_R_NOMORE) {
    842   1.1  christos 				dns_rdataset_disassociate(&rdataset);
    843   1.1  christos 				continue;
    844   1.1  christos 			}
    845  1.17  christos 			CHECK(result);
    846   1.1  christos 
    847   1.1  christos 			old_next = nsec3.next;
    848   1.1  christos 			old_length = nsec3.next_length;
    849   1.1  christos 
    850   1.1  christos 			/*
    851   1.1  christos 			 * Delete the old previous NSEC3.
    852   1.1  christos 			 */
    853   1.1  christos 			CHECK(delnsec3(db, version, prev, nsec3param, diff));
    854   1.1  christos 
    855   1.1  christos 			/*
    856   1.1  christos 			 * Fixup the previous NSEC3.
    857   1.1  christos 			 */
    858   1.1  christos 			nsec3.next = nexthash;
    859   1.1  christos 			nsec3.next_length = (unsigned char)next_length;
    860   1.6  christos 			isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
    861   1.1  christos 			CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
    862   1.1  christos 						   dns_rdatatype_nsec3, &nsec3,
    863   1.1  christos 						   &buffer));
    864   1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
    865   1.1  christos 						   prev, rdataset.ttl, &rdata,
    866   1.1  christos 						   &tuple));
    867   1.1  christos 			CHECK(do_one_tuple(&tuple, db, version, diff));
    868   1.1  christos 			INSIST(old_length <= sizeof(nexthash));
    869   1.1  christos 			memmove(nexthash, old_next, old_length);
    870   1.6  christos 			if (!CREATE(nsec3param->flags)) {
    871   1.1  christos 				flags = nsec3.flags;
    872   1.6  christos 			}
    873   1.1  christos 			dns_rdata_reset(&rdata);
    874   1.1  christos 			dns_rdataset_disassociate(&rdataset);
    875   1.1  christos 			break;
    876   1.1  christos 		} while (pass < 2);
    877   1.1  christos 
    878   1.1  christos 		INSIST(pass < 2);
    879   1.1  christos 
    880   1.1  christos 		/*
    881   1.1  christos 		 * Create the NSEC3 RDATA for the empty node.
    882   1.1  christos 		 */
    883   1.6  christos 		CHECK(dns_nsec3_buildrdata(
    884   1.6  christos 			db, version, NULL, hash, flags, iterations, salt,
    885   1.6  christos 			salt_length, nexthash, next_length, nsec3buf, &rdata));
    886   1.1  christos 		/*
    887   1.1  christos 		 * Delete the old NSEC3 and record the change.
    888   1.1  christos 		 */
    889   1.1  christos 		CHECK(delnsec3(db, version, hashname, nsec3param, diff));
    890   1.1  christos 
    891   1.1  christos 		/*
    892   1.1  christos 		 * Add the new NSEC3 and record the change.
    893   1.1  christos 		 */
    894   1.6  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, hashname,
    895   1.6  christos 					   nsecttl, &rdata, &tuple));
    896   1.1  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
    897   1.1  christos 		INSIST(tuple == NULL);
    898   1.1  christos 		dns_rdata_reset(&rdata);
    899   1.1  christos 		dns_db_detachnode(db, &newnode);
    900   1.1  christos 	} while (1);
    901   1.1  christos 
    902   1.1  christos 	/* result cannot be ISC_R_NOMORE here */
    903   1.1  christos 	INSIST(result != ISC_R_NOMORE);
    904   1.1  christos 
    905  1.17  christos cleanup:
    906   1.6  christos 	if (dbit != NULL) {
    907   1.1  christos 		dns_dbiterator_destroy(&dbit);
    908   1.6  christos 	}
    909   1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
    910   1.1  christos 		dns_rdataset_disassociate(&rdataset);
    911   1.6  christos 	}
    912   1.6  christos 	if (node != NULL) {
    913   1.1  christos 		dns_db_detachnode(db, &node);
    914   1.6  christos 	}
    915   1.6  christos 	if (newnode != NULL) {
    916   1.1  christos 		dns_db_detachnode(db, &newnode);
    917   1.6  christos 	}
    918  1.14  christos 	return result;
    919   1.1  christos }
    920   1.1  christos 
    921   1.1  christos /*%
    922   1.1  christos  * Add NSEC3 records for "name", recording the change in "diff".
    923   1.1  christos  * The existing NSEC3 records are removed.
    924   1.1  christos  */
    925   1.1  christos isc_result_t
    926   1.1  christos dns_nsec3_addnsec3s(dns_db_t *db, dns_dbversion_t *version,
    927   1.6  christos 		    const dns_name_t *name, dns_ttl_t nsecttl, bool unsecure,
    928   1.6  christos 		    dns_diff_t *diff) {
    929   1.1  christos 	dns_dbnode_t *node = NULL;
    930   1.1  christos 	dns_rdata_nsec3param_t nsec3param;
    931   1.1  christos 	dns_rdataset_t rdataset;
    932   1.1  christos 	isc_result_t result;
    933   1.1  christos 
    934   1.1  christos 	dns_rdataset_init(&rdataset);
    935   1.1  christos 
    936   1.1  christos 	/*
    937   1.1  christos 	 * Find the NSEC3 parameters for this zone.
    938   1.1  christos 	 */
    939   1.1  christos 	result = dns_db_getoriginnode(db, &node);
    940   1.6  christos 	if (result != ISC_R_SUCCESS) {
    941  1.14  christos 		return result;
    942   1.6  christos 	}
    943   1.1  christos 
    944   1.1  christos 	result = dns_db_findrdataset(db, node, version,
    945   1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
    946   1.6  christos 				     NULL);
    947   1.1  christos 	dns_db_detachnode(db, &node);
    948   1.6  christos 	if (result == ISC_R_NOTFOUND) {
    949  1.14  christos 		return ISC_R_SUCCESS;
    950   1.6  christos 	}
    951   1.6  christos 	if (result != ISC_R_SUCCESS) {
    952  1.14  christos 		return result;
    953   1.6  christos 	}
    954   1.1  christos 
    955   1.1  christos 	/*
    956   1.1  christos 	 * Update each active NSEC3 chain.
    957   1.1  christos 	 */
    958   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
    959   1.6  christos 	     result = dns_rdataset_next(&rdataset))
    960   1.6  christos 	{
    961   1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    962   1.1  christos 
    963   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
    964   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
    965   1.1  christos 
    966   1.6  christos 		if (nsec3param.flags != 0) {
    967   1.1  christos 			continue;
    968   1.6  christos 		}
    969   1.1  christos 		/*
    970   1.1  christos 		 * We have a active chain.  Update it.
    971   1.1  christos 		 */
    972   1.1  christos 		CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
    973   1.1  christos 					 nsecttl, unsecure, diff));
    974   1.1  christos 	}
    975   1.6  christos 	if (result == ISC_R_NOMORE) {
    976   1.1  christos 		result = ISC_R_SUCCESS;
    977   1.6  christos 	}
    978   1.1  christos 
    979  1.17  christos cleanup:
    980   1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
    981   1.1  christos 		dns_rdataset_disassociate(&rdataset);
    982   1.6  christos 	}
    983   1.6  christos 	if (node != NULL) {
    984   1.1  christos 		dns_db_detachnode(db, &node);
    985   1.6  christos 	}
    986   1.1  christos 
    987  1.14  christos 	return result;
    988   1.1  christos }
    989   1.1  christos 
    990   1.3  christos bool
    991   1.1  christos dns_nsec3param_fromprivate(dns_rdata_t *src, dns_rdata_t *target,
    992   1.6  christos 			   unsigned char *buf, size_t buflen) {
    993   1.1  christos 	isc_result_t result;
    994   1.1  christos 	isc_buffer_t buf1;
    995   1.1  christos 	isc_buffer_t buf2;
    996   1.1  christos 
    997   1.1  christos 	/*
    998   1.1  christos 	 * Algorithm 0 (reserved by RFC 4034) is used to identify
    999   1.1  christos 	 * NSEC3PARAM records from DNSKEY pointers.
   1000   1.1  christos 	 */
   1001   1.6  christos 	if (src->length < 1 || src->data[0] != 0) {
   1002  1.14  christos 		return false;
   1003   1.6  christos 	}
   1004   1.1  christos 
   1005   1.1  christos 	isc_buffer_init(&buf1, src->data + 1, src->length - 1);
   1006   1.1  christos 	isc_buffer_add(&buf1, src->length - 1);
   1007   1.1  christos 	isc_buffer_setactive(&buf1, src->length - 1);
   1008   1.1  christos 	isc_buffer_init(&buf2, buf, (unsigned int)buflen);
   1009   1.1  christos 	result = dns_rdata_fromwire(target, src->rdclass,
   1010  1.14  christos 				    dns_rdatatype_nsec3param, &buf1,
   1011  1.14  christos 				    DNS_DECOMPRESS_NEVER, &buf2);
   1012   1.1  christos 
   1013  1.14  christos 	return result == ISC_R_SUCCESS;
   1014   1.1  christos }
   1015   1.1  christos 
   1016   1.1  christos void
   1017   1.1  christos dns_nsec3param_toprivate(dns_rdata_t *src, dns_rdata_t *target,
   1018   1.6  christos 			 dns_rdatatype_t privatetype, unsigned char *buf,
   1019   1.6  christos 			 size_t buflen) {
   1020  1.15  christos 	REQUIRE(buflen >= (unsigned int)src->length + 1);
   1021   1.1  christos 
   1022   1.1  christos 	REQUIRE(DNS_RDATA_INITIALIZED(target));
   1023   1.1  christos 
   1024   1.1  christos 	memmove(buf + 1, src->data, src->length);
   1025   1.1  christos 	buf[0] = 0;
   1026   1.1  christos 	target->data = buf;
   1027   1.1  christos 	target->length = src->length + 1;
   1028   1.1  christos 	target->type = privatetype;
   1029   1.1  christos 	target->rdclass = src->rdclass;
   1030   1.1  christos 	target->flags = 0;
   1031   1.1  christos 	ISC_LINK_INIT(target, link);
   1032   1.1  christos }
   1033   1.1  christos 
   1034   1.1  christos static isc_result_t
   1035   1.1  christos rr_exists(dns_db_t *db, dns_dbversion_t *ver, const dns_name_t *name,
   1036   1.6  christos 	  const dns_rdata_t *rdata, bool *flag) {
   1037   1.1  christos 	dns_rdataset_t rdataset;
   1038   1.1  christos 	dns_dbnode_t *node = NULL;
   1039   1.1  christos 	isc_result_t result;
   1040   1.1  christos 
   1041   1.1  christos 	dns_rdataset_init(&rdataset);
   1042   1.6  christos 	if (rdata->type == dns_rdatatype_nsec3) {
   1043   1.3  christos 		CHECK(dns_db_findnsec3node(db, name, false, &node));
   1044   1.6  christos 	} else {
   1045   1.3  christos 		CHECK(dns_db_findnode(db, name, false, &node));
   1046   1.6  christos 	}
   1047   1.1  christos 	result = dns_db_findrdataset(db, node, ver, rdata->type, 0,
   1048   1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1049   1.1  christos 	if (result == ISC_R_NOTFOUND) {
   1050   1.3  christos 		*flag = false;
   1051   1.1  christos 		result = ISC_R_SUCCESS;
   1052  1.17  christos 		goto cleanup;
   1053   1.1  christos 	}
   1054   1.1  christos 
   1055   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1056   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1057   1.6  christos 	{
   1058   1.1  christos 		dns_rdata_t myrdata = DNS_RDATA_INIT;
   1059   1.1  christos 		dns_rdataset_current(&rdataset, &myrdata);
   1060   1.6  christos 		if (!dns_rdata_casecompare(&myrdata, rdata)) {
   1061   1.1  christos 			break;
   1062   1.6  christos 		}
   1063   1.1  christos 	}
   1064   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1065   1.1  christos 	if (result == ISC_R_SUCCESS) {
   1066   1.3  christos 		*flag = true;
   1067   1.1  christos 	} else if (result == ISC_R_NOMORE) {
   1068   1.3  christos 		*flag = false;
   1069   1.1  christos 		result = ISC_R_SUCCESS;
   1070   1.1  christos 	}
   1071   1.1  christos 
   1072  1.17  christos cleanup:
   1073   1.6  christos 	if (node != NULL) {
   1074   1.1  christos 		dns_db_detachnode(db, &node);
   1075   1.6  christos 	}
   1076  1.14  christos 	return result;
   1077   1.1  christos }
   1078   1.1  christos 
   1079   1.1  christos isc_result_t
   1080   1.1  christos dns_nsec3param_salttotext(dns_rdata_nsec3param_t *nsec3param, char *dst,
   1081   1.6  christos 			  size_t dstlen) {
   1082   1.1  christos 	isc_result_t result;
   1083   1.1  christos 	isc_region_t r;
   1084   1.1  christos 	isc_buffer_t b;
   1085   1.1  christos 
   1086   1.1  christos 	REQUIRE(nsec3param != NULL);
   1087   1.1  christos 	REQUIRE(dst != NULL);
   1088   1.1  christos 
   1089   1.1  christos 	if (nsec3param->salt_length == 0) {
   1090   1.1  christos 		if (dstlen < 2U) {
   1091  1.14  christos 			return ISC_R_NOSPACE;
   1092   1.1  christos 		}
   1093   1.1  christos 		strlcpy(dst, "-", dstlen);
   1094  1.14  christos 		return ISC_R_SUCCESS;
   1095   1.1  christos 	}
   1096   1.1  christos 
   1097   1.1  christos 	r.base = nsec3param->salt;
   1098   1.1  christos 	r.length = nsec3param->salt_length;
   1099   1.1  christos 	isc_buffer_init(&b, dst, (unsigned int)dstlen);
   1100   1.1  christos 
   1101   1.1  christos 	result = isc_hex_totext(&r, 2, "", &b);
   1102   1.1  christos 	if (result != ISC_R_SUCCESS) {
   1103  1.14  christos 		return result;
   1104   1.1  christos 	}
   1105   1.1  christos 
   1106   1.1  christos 	if (isc_buffer_availablelength(&b) < 1) {
   1107  1.14  christos 		return ISC_R_NOSPACE;
   1108   1.1  christos 	}
   1109   1.1  christos 	isc_buffer_putuint8(&b, 0);
   1110   1.1  christos 
   1111  1.14  christos 	return ISC_R_SUCCESS;
   1112   1.1  christos }
   1113   1.1  christos 
   1114   1.1  christos isc_result_t
   1115   1.1  christos dns_nsec3param_deletechains(dns_db_t *db, dns_dbversion_t *ver,
   1116   1.6  christos 			    dns_zone_t *zone, bool nonsec, dns_diff_t *diff) {
   1117   1.1  christos 	dns_dbnode_t *node = NULL;
   1118   1.1  christos 	dns_difftuple_t *tuple = NULL;
   1119   1.1  christos 	dns_name_t next;
   1120   1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
   1121   1.1  christos 	dns_rdataset_t rdataset;
   1122   1.3  christos 	bool flag;
   1123   1.1  christos 	isc_result_t result = ISC_R_SUCCESS;
   1124   1.1  christos 	unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE + 1];
   1125   1.1  christos 	dns_name_t *origin = dns_zone_getorigin(zone);
   1126   1.1  christos 	dns_rdatatype_t privatetype = dns_zone_getprivatetype(zone);
   1127   1.1  christos 
   1128   1.1  christos 	dns_name_init(&next, NULL);
   1129   1.1  christos 	dns_rdataset_init(&rdataset);
   1130   1.1  christos 
   1131   1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1132   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1133  1.14  christos 		return result;
   1134   1.6  christos 	}
   1135   1.1  christos 
   1136   1.1  christos 	/*
   1137   1.1  christos 	 * Cause all NSEC3 chains to be deleted.
   1138   1.1  christos 	 */
   1139   1.6  christos 	result = dns_db_findrdataset(db, node, ver, dns_rdatatype_nsec3param, 0,
   1140   1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1141   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1142   1.1  christos 		goto try_private;
   1143   1.6  christos 	}
   1144  1.17  christos 	CHECK(result);
   1145   1.1  christos 
   1146   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1147   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1148   1.6  christos 	{
   1149   1.1  christos 		dns_rdata_t private = DNS_RDATA_INIT;
   1150   1.1  christos 
   1151   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1152   1.6  christos 		dns_nsec3param_toprivate(&rdata, &private, privatetype, buf,
   1153   1.6  christos 					 sizeof(buf));
   1154   1.1  christos 		buf[2] = DNS_NSEC3FLAG_REMOVE;
   1155   1.6  christos 		if (nonsec) {
   1156   1.1  christos 			buf[2] |= DNS_NSEC3FLAG_NONSEC;
   1157   1.6  christos 		}
   1158   1.1  christos 
   1159   1.1  christos 		CHECK(rr_exists(db, ver, origin, &private, &flag));
   1160   1.1  christos 
   1161   1.1  christos 		if (!flag) {
   1162   1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
   1163   1.1  christos 						   origin, 0, &private,
   1164   1.1  christos 						   &tuple));
   1165   1.1  christos 			CHECK(do_one_tuple(&tuple, db, ver, diff));
   1166   1.1  christos 			INSIST(tuple == NULL);
   1167   1.1  christos 		}
   1168   1.1  christos 		dns_rdata_reset(&rdata);
   1169   1.1  christos 	}
   1170   1.6  christos 	if (result != ISC_R_NOMORE) {
   1171  1.17  christos 		goto cleanup;
   1172   1.6  christos 	}
   1173   1.1  christos 
   1174   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1175   1.1  christos 
   1176   1.6  christos try_private:
   1177   1.6  christos 	if (privatetype == 0) {
   1178  1.17  christos 		result = ISC_R_SUCCESS;
   1179  1.17  christos 		goto cleanup;
   1180   1.6  christos 	}
   1181   1.1  christos 	result = dns_db_findrdataset(db, node, ver, privatetype, 0,
   1182   1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1183   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1184  1.17  christos 		result = ISC_R_SUCCESS;
   1185  1.17  christos 		goto cleanup;
   1186   1.6  christos 	}
   1187  1.17  christos 	CHECK(result);
   1188   1.1  christos 
   1189   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1190   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1191   1.6  christos 	{
   1192   1.1  christos 		dns_rdata_reset(&rdata);
   1193   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1194   1.1  christos 		INSIST(rdata.length <= sizeof(buf));
   1195   1.1  christos 		memmove(buf, rdata.data, rdata.length);
   1196   1.1  christos 
   1197   1.1  christos 		/*
   1198   1.1  christos 		 * Private NSEC3 record length >= 6.
   1199   1.1  christos 		 * <0(1), hash(1), flags(1), iterations(2), saltlen(1)>
   1200   1.1  christos 		 */
   1201   1.1  christos 		if (rdata.length < 6 || buf[0] != 0 ||
   1202   1.1  christos 		    (buf[2] & DNS_NSEC3FLAG_REMOVE) != 0 ||
   1203   1.1  christos 		    (nonsec && (buf[2] & DNS_NSEC3FLAG_NONSEC) != 0))
   1204   1.6  christos 		{
   1205   1.1  christos 			continue;
   1206   1.6  christos 		}
   1207   1.1  christos 
   1208   1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, origin,
   1209   1.1  christos 					   0, &rdata, &tuple));
   1210   1.1  christos 		CHECK(do_one_tuple(&tuple, db, ver, diff));
   1211   1.1  christos 		INSIST(tuple == NULL);
   1212   1.1  christos 
   1213   1.1  christos 		rdata.data = buf;
   1214   1.1  christos 		buf[2] = DNS_NSEC3FLAG_REMOVE;
   1215   1.6  christos 		if (nonsec) {
   1216   1.1  christos 			buf[2] |= DNS_NSEC3FLAG_NONSEC;
   1217   1.6  christos 		}
   1218   1.1  christos 
   1219   1.1  christos 		CHECK(rr_exists(db, ver, origin, &rdata, &flag));
   1220   1.1  christos 
   1221   1.1  christos 		if (!flag) {
   1222   1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
   1223   1.1  christos 						   origin, 0, &rdata, &tuple));
   1224   1.1  christos 			CHECK(do_one_tuple(&tuple, db, ver, diff));
   1225   1.1  christos 			INSIST(tuple == NULL);
   1226   1.1  christos 		}
   1227   1.1  christos 	}
   1228   1.6  christos 	if (result != ISC_R_NOMORE) {
   1229  1.17  christos 		goto cleanup;
   1230   1.6  christos 	}
   1231  1.17  christos 
   1232   1.1  christos 	result = ISC_R_SUCCESS;
   1233   1.1  christos 
   1234  1.17  christos cleanup:
   1235   1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1236   1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1237   1.6  christos 	}
   1238   1.1  christos 	dns_db_detachnode(db, &node);
   1239  1.14  christos 	return result;
   1240   1.1  christos }
   1241   1.1  christos 
   1242   1.1  christos isc_result_t
   1243   1.1  christos dns_nsec3_addnsec3sx(dns_db_t *db, dns_dbversion_t *version,
   1244   1.6  christos 		     const dns_name_t *name, dns_ttl_t nsecttl, bool unsecure,
   1245   1.6  christos 		     dns_rdatatype_t type, dns_diff_t *diff) {
   1246   1.1  christos 	dns_dbnode_t *node = NULL;
   1247   1.1  christos 	dns_rdata_nsec3param_t nsec3param;
   1248   1.1  christos 	dns_rdataset_t rdataset;
   1249   1.1  christos 	dns_rdataset_t prdataset;
   1250   1.1  christos 	isc_result_t result;
   1251   1.1  christos 
   1252   1.1  christos 	dns_rdataset_init(&rdataset);
   1253   1.1  christos 	dns_rdataset_init(&prdataset);
   1254   1.1  christos 
   1255   1.1  christos 	/*
   1256   1.1  christos 	 * Find the NSEC3 parameters for this zone.
   1257   1.1  christos 	 */
   1258   1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1259   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1260  1.14  christos 		return result;
   1261   1.6  christos 	}
   1262   1.1  christos 
   1263   1.6  christos 	result = dns_db_findrdataset(db, node, version, type, 0, 0, &prdataset,
   1264   1.6  christos 				     NULL);
   1265   1.6  christos 	if (result != ISC_R_SUCCESS && result != ISC_R_NOTFOUND) {
   1266  1.17  christos 		CHECK(result);
   1267   1.6  christos 	}
   1268   1.1  christos 
   1269   1.1  christos 	result = dns_db_findrdataset(db, node, version,
   1270   1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
   1271   1.6  christos 				     NULL);
   1272   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1273   1.1  christos 		goto try_private;
   1274   1.6  christos 	}
   1275  1.17  christos 	CHECK(result);
   1276   1.1  christos 
   1277   1.1  christos 	/*
   1278   1.1  christos 	 * Update each active NSEC3 chain.
   1279   1.1  christos 	 */
   1280   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1281   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1282   1.6  christos 	{
   1283   1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1284   1.1  christos 
   1285   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1286   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
   1287   1.1  christos 
   1288   1.6  christos 		if (nsec3param.flags != 0) {
   1289   1.1  christos 			continue;
   1290   1.6  christos 		}
   1291   1.1  christos 
   1292   1.1  christos 		/*
   1293   1.1  christos 		 * We have a active chain.  Update it.
   1294   1.1  christos 		 */
   1295   1.1  christos 		CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
   1296   1.1  christos 					 nsecttl, unsecure, diff));
   1297   1.1  christos 	}
   1298   1.6  christos 	if (result != ISC_R_NOMORE) {
   1299  1.17  christos 		goto cleanup;
   1300   1.6  christos 	}
   1301   1.1  christos 
   1302   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1303   1.1  christos 
   1304   1.6  christos try_private:
   1305   1.6  christos 	if (!dns_rdataset_isassociated(&prdataset)) {
   1306  1.17  christos 		result = ISC_R_SUCCESS;
   1307  1.17  christos 		goto cleanup;
   1308   1.6  christos 	}
   1309  1.17  christos 
   1310   1.1  christos 	/*
   1311   1.1  christos 	 * Update each active NSEC3 chain.
   1312   1.1  christos 	 */
   1313   1.6  christos 	for (result = dns_rdataset_first(&prdataset); result == ISC_R_SUCCESS;
   1314   1.6  christos 	     result = dns_rdataset_next(&prdataset))
   1315   1.6  christos 	{
   1316   1.1  christos 		dns_rdata_t rdata1 = DNS_RDATA_INIT;
   1317   1.1  christos 		dns_rdata_t rdata2 = DNS_RDATA_INIT;
   1318   1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
   1319   1.1  christos 
   1320   1.1  christos 		dns_rdataset_current(&prdataset, &rdata1);
   1321   1.6  christos 		if (!dns_nsec3param_fromprivate(&rdata1, &rdata2, buf,
   1322  1.11  christos 						sizeof(buf)))
   1323  1.11  christos 		{
   1324   1.1  christos 			continue;
   1325   1.6  christos 		}
   1326   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata2, &nsec3param, NULL));
   1327   1.1  christos 
   1328   1.6  christos 		if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0) {
   1329   1.1  christos 			continue;
   1330   1.6  christos 		}
   1331   1.6  christos 		if (better_param(&prdataset, &rdata2)) {
   1332   1.1  christos 			continue;
   1333   1.6  christos 		}
   1334   1.1  christos 
   1335   1.1  christos 		/*
   1336   1.1  christos 		 * We have a active chain.  Update it.
   1337   1.1  christos 		 */
   1338   1.1  christos 		CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
   1339   1.1  christos 					 nsecttl, unsecure, diff));
   1340   1.1  christos 	}
   1341   1.6  christos 	if (result == ISC_R_NOMORE) {
   1342   1.1  christos 		result = ISC_R_SUCCESS;
   1343   1.6  christos 	}
   1344  1.17  christos 
   1345  1.17  christos cleanup:
   1346   1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1347   1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1348   1.6  christos 	}
   1349   1.6  christos 	if (dns_rdataset_isassociated(&prdataset)) {
   1350   1.1  christos 		dns_rdataset_disassociate(&prdataset);
   1351   1.6  christos 	}
   1352   1.6  christos 	if (node != NULL) {
   1353   1.1  christos 		dns_db_detachnode(db, &node);
   1354   1.6  christos 	}
   1355   1.1  christos 
   1356  1.14  christos 	return result;
   1357   1.1  christos }
   1358   1.1  christos 
   1359   1.1  christos /*%
   1360   1.1  christos  * Determine whether any NSEC3 records that were associated with
   1361   1.1  christos  * 'name' should be deleted or if they should continue to exist.
   1362   1.3  christos  * true indicates they should be deleted.
   1363   1.3  christos  * false indicates they should be retained.
   1364   1.1  christos  */
   1365   1.1  christos static isc_result_t
   1366   1.1  christos deleteit(dns_db_t *db, dns_dbversion_t *ver, const dns_name_t *name,
   1367   1.6  christos 	 bool *yesno) {
   1368   1.1  christos 	isc_result_t result;
   1369   1.1  christos 	dns_fixedname_t foundname;
   1370   1.1  christos 	dns_fixedname_init(&foundname);
   1371   1.1  christos 
   1372   1.1  christos 	result = dns_db_find(db, name, ver, dns_rdatatype_any,
   1373   1.1  christos 			     DNS_DBFIND_GLUEOK | DNS_DBFIND_NOWILD,
   1374   1.6  christos 			     (isc_stdtime_t)0, NULL,
   1375   1.6  christos 			     dns_fixedname_name(&foundname), NULL, NULL);
   1376   1.1  christos 	if (result == DNS_R_EMPTYNAME || result == ISC_R_SUCCESS ||
   1377   1.6  christos 	    result == DNS_R_ZONECUT)
   1378   1.6  christos 	{
   1379   1.3  christos 		*yesno = false;
   1380  1.14  christos 		return ISC_R_SUCCESS;
   1381   1.1  christos 	}
   1382   1.1  christos 	if (result == DNS_R_GLUE || result == DNS_R_DNAME ||
   1383   1.6  christos 	    result == DNS_R_DELEGATION || result == DNS_R_NXDOMAIN)
   1384   1.6  christos 	{
   1385   1.3  christos 		*yesno = true;
   1386  1.14  christos 		return ISC_R_SUCCESS;
   1387   1.1  christos 	}
   1388   1.1  christos 	/*
   1389   1.1  christos 	 * Silence compiler.
   1390   1.1  christos 	 */
   1391   1.3  christos 	*yesno = true;
   1392  1.14  christos 	return result;
   1393   1.1  christos }
   1394   1.1  christos 
   1395   1.1  christos isc_result_t
   1396   1.1  christos dns_nsec3_delnsec3(dns_db_t *db, dns_dbversion_t *version,
   1397   1.1  christos 		   const dns_name_t *name,
   1398   1.6  christos 		   const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff) {
   1399   1.1  christos 	dns_dbiterator_t *dbit = NULL;
   1400   1.1  christos 	dns_dbnode_t *node = NULL;
   1401   1.1  christos 	dns_difftuple_t *tuple = NULL;
   1402   1.1  christos 	dns_fixedname_t fixed;
   1403   1.1  christos 	dns_fixedname_t fprev;
   1404   1.1  christos 	dns_hash_t hash;
   1405   1.1  christos 	dns_name_t *hashname;
   1406   1.1  christos 	dns_name_t *origin;
   1407   1.1  christos 	dns_name_t *prev;
   1408   1.1  christos 	dns_name_t empty;
   1409   1.1  christos 	dns_rdata_nsec3_t nsec3;
   1410   1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
   1411   1.1  christos 	dns_rdataset_t rdataset;
   1412   1.1  christos 	int pass;
   1413   1.3  christos 	bool yesno;
   1414   1.1  christos 	isc_buffer_t buffer;
   1415   1.1  christos 	isc_result_t result;
   1416   1.1  christos 	unsigned char *salt;
   1417   1.1  christos 	unsigned char nexthash[NSEC3_MAX_HASH_LENGTH];
   1418   1.1  christos 	unsigned char nsec3buf[DNS_NSEC3_BUFFERSIZE];
   1419   1.1  christos 	unsigned int iterations;
   1420   1.1  christos 	unsigned int labels;
   1421   1.1  christos 	size_t next_length;
   1422   1.1  christos 	unsigned int salt_length;
   1423   1.1  christos 
   1424   1.1  christos 	hashname = dns_fixedname_initname(&fixed);
   1425   1.1  christos 	prev = dns_fixedname_initname(&fprev);
   1426   1.1  christos 
   1427   1.1  christos 	dns_rdataset_init(&rdataset);
   1428   1.1  christos 
   1429   1.1  christos 	origin = dns_db_origin(db);
   1430   1.1  christos 
   1431   1.1  christos 	/*
   1432   1.1  christos 	 * Chain parameters.
   1433   1.1  christos 	 */
   1434   1.1  christos 	hash = nsec3param->hash;
   1435   1.1  christos 	iterations = nsec3param->iterations;
   1436   1.1  christos 	salt_length = nsec3param->salt_length;
   1437   1.1  christos 	salt = nsec3param->salt;
   1438   1.1  christos 
   1439   1.1  christos 	/*
   1440   1.1  christos 	 * If this is the first NSEC3 in the chain nexthash will
   1441   1.1  christos 	 * remain pointing to itself.
   1442   1.1  christos 	 */
   1443   1.1  christos 	next_length = sizeof(nexthash);
   1444   1.6  christos 	CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, name, origin,
   1445   1.6  christos 				 hash, iterations, salt, salt_length));
   1446   1.1  christos 
   1447   1.1  christos 	CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
   1448   1.1  christos 
   1449   1.1  christos 	result = dns_dbiterator_seek(dbit, hashname);
   1450   1.6  christos 	if (result == ISC_R_NOTFOUND || result == DNS_R_PARTIALMATCH) {
   1451  1.12  christos 		goto cleanup_orphaned_ents;
   1452   1.6  christos 	}
   1453  1.17  christos 	CHECK(result);
   1454   1.1  christos 
   1455   1.1  christos 	CHECK(dns_dbiterator_current(dbit, &node, NULL));
   1456   1.1  christos 	CHECK(dns_dbiterator_pause(dbit));
   1457   1.6  christos 	result = dns_db_findrdataset(db, node, version, dns_rdatatype_nsec3, 0,
   1458   1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1459   1.1  christos 	dns_db_detachnode(db, &node);
   1460   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1461  1.12  christos 		goto cleanup_orphaned_ents;
   1462   1.6  christos 	}
   1463  1.17  christos 	CHECK(result);
   1464   1.1  christos 
   1465   1.1  christos 	/*
   1466   1.1  christos 	 * If we find a existing NSEC3 for this chain then save the
   1467   1.1  christos 	 * next field.
   1468   1.1  christos 	 */
   1469   1.1  christos 	result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1470   1.1  christos 	if (result == ISC_R_SUCCESS) {
   1471   1.1  christos 		next_length = nsec3.next_length;
   1472   1.1  christos 		INSIST(next_length <= sizeof(nexthash));
   1473   1.1  christos 		memmove(nexthash, nsec3.next, next_length);
   1474   1.1  christos 	}
   1475   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1476   1.6  christos 	if (result == ISC_R_NOMORE) {
   1477  1.17  christos 		result = ISC_R_SUCCESS;
   1478   1.6  christos 	}
   1479  1.17  christos 	CHECK(result);
   1480   1.1  christos 
   1481   1.1  christos 	/*
   1482   1.1  christos 	 * Find the previous NSEC3 and update it.
   1483   1.1  christos 	 */
   1484   1.1  christos 	pass = 0;
   1485   1.1  christos 	do {
   1486   1.1  christos 		result = dns_dbiterator_prev(dbit);
   1487   1.1  christos 		if (result == ISC_R_NOMORE) {
   1488   1.1  christos 			pass++;
   1489   1.1  christos 			CHECK(dns_dbiterator_last(dbit));
   1490   1.1  christos 		}
   1491   1.1  christos 		CHECK(dns_dbiterator_current(dbit, &node, prev));
   1492   1.1  christos 		CHECK(dns_dbiterator_pause(dbit));
   1493   1.1  christos 		result = dns_db_findrdataset(db, node, version,
   1494   1.1  christos 					     dns_rdatatype_nsec3, 0,
   1495   1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
   1496   1.1  christos 		dns_db_detachnode(db, &node);
   1497   1.6  christos 		if (result != ISC_R_SUCCESS) {
   1498   1.1  christos 			continue;
   1499   1.6  christos 		}
   1500   1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1501   1.1  christos 		if (result == ISC_R_NOMORE) {
   1502   1.1  christos 			dns_rdataset_disassociate(&rdataset);
   1503   1.1  christos 			continue;
   1504   1.1  christos 		}
   1505  1.17  christos 		CHECK(result);
   1506   1.1  christos 
   1507   1.1  christos 		/*
   1508   1.1  christos 		 * Delete the old previous NSEC3.
   1509   1.1  christos 		 */
   1510   1.1  christos 		CHECK(delnsec3(db, version, prev, nsec3param, diff));
   1511   1.1  christos 
   1512   1.1  christos 		/*
   1513   1.1  christos 		 * Fixup the previous NSEC3.
   1514   1.1  christos 		 */
   1515   1.1  christos 		nsec3.next = nexthash;
   1516   1.1  christos 		nsec3.next_length = (unsigned char)next_length;
   1517   1.6  christos 		if (CREATE(nsec3param->flags)) {
   1518   1.1  christos 			nsec3.flags = nsec3param->flags & DNS_NSEC3FLAG_OPTOUT;
   1519   1.6  christos 		}
   1520   1.1  christos 		isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
   1521   1.1  christos 		CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
   1522   1.1  christos 					   dns_rdatatype_nsec3, &nsec3,
   1523   1.1  christos 					   &buffer));
   1524   1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, prev,
   1525   1.1  christos 					   rdataset.ttl, &rdata, &tuple));
   1526   1.1  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
   1527   1.1  christos 		dns_rdata_reset(&rdata);
   1528   1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1529   1.1  christos 		break;
   1530   1.1  christos 	} while (pass < 2);
   1531   1.1  christos 
   1532   1.1  christos 	/*
   1533   1.1  christos 	 * Delete the old NSEC3 and record the change.
   1534   1.1  christos 	 */
   1535   1.1  christos 	CHECK(delnsec3(db, version, hashname, nsec3param, diff));
   1536   1.1  christos 
   1537   1.1  christos 	/*
   1538   1.1  christos 	 *  Delete NSEC3 records for now non active nodes.
   1539   1.1  christos 	 */
   1540  1.12  christos cleanup_orphaned_ents:
   1541   1.1  christos 	dns_name_init(&empty, NULL);
   1542   1.1  christos 	dns_name_clone(name, &empty);
   1543   1.1  christos 	do {
   1544   1.1  christos 		labels = dns_name_countlabels(&empty) - 1;
   1545   1.6  christos 		if (labels <= dns_name_countlabels(origin)) {
   1546   1.1  christos 			break;
   1547   1.6  christos 		}
   1548   1.1  christos 		dns_name_getlabelsequence(&empty, 1, labels, &empty);
   1549   1.1  christos 		CHECK(deleteit(db, version, &empty, &yesno));
   1550   1.6  christos 		if (!yesno) {
   1551   1.1  christos 			break;
   1552   1.6  christos 		}
   1553   1.1  christos 
   1554   1.6  christos 		CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, &empty,
   1555   1.6  christos 					 origin, hash, iterations, salt,
   1556   1.6  christos 					 salt_length));
   1557   1.1  christos 		result = dns_dbiterator_seek(dbit, hashname);
   1558   1.6  christos 		if (result == ISC_R_NOTFOUND || result == DNS_R_PARTIALMATCH) {
   1559  1.17  christos 			result = ISC_R_SUCCESS;
   1560  1.17  christos 			goto cleanup;
   1561   1.6  christos 		}
   1562  1.17  christos 		CHECK(result);
   1563   1.1  christos 
   1564   1.1  christos 		CHECK(dns_dbiterator_current(dbit, &node, NULL));
   1565   1.1  christos 		CHECK(dns_dbiterator_pause(dbit));
   1566   1.1  christos 		result = dns_db_findrdataset(db, node, version,
   1567   1.1  christos 					     dns_rdatatype_nsec3, 0,
   1568   1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
   1569   1.1  christos 		dns_db_detachnode(db, &node);
   1570   1.6  christos 		if (result == ISC_R_NOTFOUND) {
   1571  1.17  christos 			result = ISC_R_SUCCESS;
   1572  1.17  christos 			goto cleanup;
   1573   1.6  christos 		}
   1574  1.17  christos 		CHECK(result);
   1575   1.1  christos 
   1576   1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1577   1.1  christos 		if (result == ISC_R_SUCCESS) {
   1578   1.1  christos 			next_length = nsec3.next_length;
   1579   1.1  christos 			INSIST(next_length <= sizeof(nexthash));
   1580   1.1  christos 			memmove(nexthash, nsec3.next, next_length);
   1581   1.1  christos 		}
   1582   1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1583   1.6  christos 		if (result == ISC_R_NOMORE) {
   1584  1.17  christos 			result = ISC_R_SUCCESS;
   1585   1.6  christos 		}
   1586  1.17  christos 		CHECK(result);
   1587   1.1  christos 
   1588   1.1  christos 		pass = 0;
   1589   1.1  christos 		do {
   1590   1.1  christos 			result = dns_dbiterator_prev(dbit);
   1591   1.1  christos 			if (result == ISC_R_NOMORE) {
   1592   1.1  christos 				pass++;
   1593   1.1  christos 				CHECK(dns_dbiterator_last(dbit));
   1594   1.1  christos 			}
   1595   1.1  christos 			CHECK(dns_dbiterator_current(dbit, &node, prev));
   1596   1.1  christos 			CHECK(dns_dbiterator_pause(dbit));
   1597   1.6  christos 			result = dns_db_findrdataset(
   1598   1.6  christos 				db, node, version, dns_rdatatype_nsec3, 0,
   1599   1.6  christos 				(isc_stdtime_t)0, &rdataset, NULL);
   1600   1.1  christos 			dns_db_detachnode(db, &node);
   1601   1.6  christos 			if (result != ISC_R_SUCCESS) {
   1602   1.1  christos 				continue;
   1603   1.6  christos 			}
   1604   1.1  christos 			result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1605   1.1  christos 			if (result == ISC_R_NOMORE) {
   1606   1.1  christos 				dns_rdataset_disassociate(&rdataset);
   1607   1.1  christos 				continue;
   1608   1.1  christos 			}
   1609  1.17  christos 			CHECK(result);
   1610   1.1  christos 
   1611   1.1  christos 			/*
   1612   1.1  christos 			 * Delete the old previous NSEC3.
   1613   1.1  christos 			 */
   1614   1.1  christos 			CHECK(delnsec3(db, version, prev, nsec3param, diff));
   1615   1.1  christos 
   1616   1.1  christos 			/*
   1617   1.1  christos 			 * Fixup the previous NSEC3.
   1618   1.1  christos 			 */
   1619   1.1  christos 			nsec3.next = nexthash;
   1620   1.1  christos 			nsec3.next_length = (unsigned char)next_length;
   1621   1.6  christos 			isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
   1622   1.1  christos 			CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
   1623   1.1  christos 						   dns_rdatatype_nsec3, &nsec3,
   1624   1.1  christos 						   &buffer));
   1625   1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
   1626   1.1  christos 						   prev, rdataset.ttl, &rdata,
   1627   1.1  christos 						   &tuple));
   1628   1.1  christos 			CHECK(do_one_tuple(&tuple, db, version, diff));
   1629   1.1  christos 			dns_rdata_reset(&rdata);
   1630   1.1  christos 			dns_rdataset_disassociate(&rdataset);
   1631   1.1  christos 			break;
   1632   1.1  christos 		} while (pass < 2);
   1633   1.1  christos 
   1634   1.1  christos 		INSIST(pass < 2);
   1635   1.1  christos 
   1636   1.1  christos 		/*
   1637   1.1  christos 		 * Delete the old NSEC3 and record the change.
   1638   1.1  christos 		 */
   1639   1.1  christos 		CHECK(delnsec3(db, version, hashname, nsec3param, diff));
   1640   1.1  christos 	} while (1);
   1641   1.1  christos 
   1642   1.1  christos 	result = ISC_R_SUCCESS;
   1643   1.1  christos 
   1644  1.17  christos cleanup:
   1645   1.6  christos 	if (dbit != NULL) {
   1646   1.1  christos 		dns_dbiterator_destroy(&dbit);
   1647   1.6  christos 	}
   1648   1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1649   1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1650   1.6  christos 	}
   1651   1.6  christos 	if (node != NULL) {
   1652   1.1  christos 		dns_db_detachnode(db, &node);
   1653   1.6  christos 	}
   1654  1.14  christos 	return result;
   1655   1.1  christos }
   1656   1.1  christos 
   1657   1.1  christos isc_result_t
   1658   1.1  christos dns_nsec3_delnsec3s(dns_db_t *db, dns_dbversion_t *version,
   1659   1.6  christos 		    const dns_name_t *name, dns_diff_t *diff) {
   1660  1.14  christos 	return dns_nsec3_delnsec3sx(db, version, name, 0, diff);
   1661   1.1  christos }
   1662   1.1  christos 
   1663   1.1  christos isc_result_t
   1664   1.1  christos dns_nsec3_delnsec3sx(dns_db_t *db, dns_dbversion_t *version,
   1665   1.6  christos 		     const dns_name_t *name, dns_rdatatype_t privatetype,
   1666   1.6  christos 		     dns_diff_t *diff) {
   1667   1.1  christos 	dns_dbnode_t *node = NULL;
   1668   1.1  christos 	dns_rdata_nsec3param_t nsec3param;
   1669   1.1  christos 	dns_rdataset_t rdataset;
   1670   1.1  christos 	isc_result_t result;
   1671   1.1  christos 
   1672   1.1  christos 	dns_rdataset_init(&rdataset);
   1673   1.1  christos 
   1674   1.1  christos 	/*
   1675   1.1  christos 	 * Find the NSEC3 parameters for this zone.
   1676   1.1  christos 	 */
   1677   1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1678   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1679  1.14  christos 		return result;
   1680   1.6  christos 	}
   1681   1.1  christos 
   1682   1.1  christos 	result = dns_db_findrdataset(db, node, version,
   1683   1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
   1684   1.6  christos 				     NULL);
   1685   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1686   1.1  christos 		goto try_private;
   1687   1.6  christos 	}
   1688  1.17  christos 	CHECK(result);
   1689   1.1  christos 
   1690   1.1  christos 	/*
   1691   1.1  christos 	 * Update each active NSEC3 chain.
   1692   1.1  christos 	 */
   1693   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1694   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1695   1.6  christos 	{
   1696   1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1697   1.1  christos 
   1698   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1699   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
   1700   1.1  christos 
   1701   1.6  christos 		if (nsec3param.flags != 0) {
   1702   1.1  christos 			continue;
   1703   1.6  christos 		}
   1704   1.1  christos 		/*
   1705   1.1  christos 		 * We have a active chain.  Update it.
   1706   1.1  christos 		 */
   1707   1.1  christos 		CHECK(dns_nsec3_delnsec3(db, version, name, &nsec3param, diff));
   1708   1.1  christos 	}
   1709   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1710   1.1  christos 
   1711   1.6  christos try_private:
   1712   1.6  christos 	if (privatetype == 0) {
   1713  1.17  christos 		result = ISC_R_SUCCESS;
   1714  1.17  christos 		goto cleanup;
   1715   1.6  christos 	}
   1716   1.1  christos 	result = dns_db_findrdataset(db, node, version, privatetype, 0, 0,
   1717   1.1  christos 				     &rdataset, NULL);
   1718   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1719  1.17  christos 		result = ISC_R_SUCCESS;
   1720  1.17  christos 		goto cleanup;
   1721   1.6  christos 	}
   1722  1.17  christos 	CHECK(result);
   1723   1.1  christos 
   1724   1.1  christos 	/*
   1725   1.1  christos 	 * Update each NSEC3 chain being built.
   1726   1.1  christos 	 */
   1727   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1728   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1729   1.6  christos 	{
   1730   1.1  christos 		dns_rdata_t rdata1 = DNS_RDATA_INIT;
   1731   1.1  christos 		dns_rdata_t rdata2 = DNS_RDATA_INIT;
   1732   1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
   1733   1.1  christos 
   1734   1.1  christos 		dns_rdataset_current(&rdataset, &rdata1);
   1735   1.6  christos 		if (!dns_nsec3param_fromprivate(&rdata1, &rdata2, buf,
   1736  1.11  christos 						sizeof(buf)))
   1737  1.11  christos 		{
   1738   1.1  christos 			continue;
   1739   1.6  christos 		}
   1740   1.1  christos 		CHECK(dns_rdata_tostruct(&rdata2, &nsec3param, NULL));
   1741   1.1  christos 
   1742   1.6  christos 		if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0) {
   1743   1.1  christos 			continue;
   1744   1.6  christos 		}
   1745   1.6  christos 		if (better_param(&rdataset, &rdata2)) {
   1746   1.1  christos 			continue;
   1747   1.6  christos 		}
   1748   1.1  christos 
   1749   1.1  christos 		/*
   1750   1.1  christos 		 * We have a active chain.  Update it.
   1751   1.1  christos 		 */
   1752   1.1  christos 		CHECK(dns_nsec3_delnsec3(db, version, name, &nsec3param, diff));
   1753   1.1  christos 	}
   1754   1.6  christos 	if (result == ISC_R_NOMORE) {
   1755   1.1  christos 		result = ISC_R_SUCCESS;
   1756   1.6  christos 	}
   1757   1.1  christos 
   1758  1.17  christos cleanup:
   1759   1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1760   1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1761   1.6  christos 	}
   1762   1.6  christos 	if (node != NULL) {
   1763   1.1  christos 		dns_db_detachnode(db, &node);
   1764   1.6  christos 	}
   1765   1.1  christos 
   1766  1.14  christos 	return result;
   1767   1.1  christos }
   1768   1.1  christos 
   1769   1.1  christos isc_result_t
   1770   1.6  christos dns_nsec3_active(dns_db_t *db, dns_dbversion_t *version, bool complete,
   1771   1.6  christos 		 bool *answer) {
   1772  1.14  christos 	return dns_nsec3_activex(db, version, complete, 0, answer);
   1773   1.1  christos }
   1774   1.1  christos 
   1775   1.1  christos isc_result_t
   1776   1.6  christos dns_nsec3_activex(dns_db_t *db, dns_dbversion_t *version, bool complete,
   1777   1.6  christos 		  dns_rdatatype_t privatetype, bool *answer) {
   1778   1.1  christos 	dns_dbnode_t *node = NULL;
   1779   1.1  christos 	dns_rdataset_t rdataset;
   1780   1.1  christos 	dns_rdata_nsec3param_t nsec3param;
   1781   1.1  christos 	isc_result_t result;
   1782   1.1  christos 
   1783   1.1  christos 	REQUIRE(answer != NULL);
   1784   1.1  christos 
   1785   1.1  christos 	dns_rdataset_init(&rdataset);
   1786   1.1  christos 
   1787   1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1788   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1789  1.14  christos 		return result;
   1790   1.6  christos 	}
   1791   1.1  christos 
   1792   1.1  christos 	result = dns_db_findrdataset(db, node, version,
   1793   1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
   1794   1.6  christos 				     NULL);
   1795   1.1  christos 
   1796   1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1797   1.1  christos 		goto try_private;
   1798   1.6  christos 	}
   1799   1.1  christos 
   1800   1.1  christos 	if (result != ISC_R_SUCCESS) {
   1801   1.1  christos 		dns_db_detachnode(db, &node);
   1802  1.14  christos 		return result;
   1803   1.1  christos 	}
   1804   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1805   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1806   1.6  christos 	{
   1807   1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1808   1.1  christos 
   1809   1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1810   1.1  christos 		result = dns_rdata_tostruct(&rdata, &nsec3param, NULL);
   1811   1.1  christos 		RUNTIME_CHECK(result == ISC_R_SUCCESS);
   1812   1.1  christos 
   1813   1.6  christos 		if (nsec3param.flags == 0) {
   1814   1.1  christos 			break;
   1815   1.6  christos 		}
   1816   1.1  christos 	}
   1817   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1818   1.1  christos 	if (result == ISC_R_SUCCESS) {
   1819   1.1  christos 		dns_db_detachnode(db, &node);
   1820   1.3  christos 		*answer = true;
   1821  1.14  christos 		return ISC_R_SUCCESS;
   1822   1.1  christos 	}
   1823   1.6  christos 	if (result == ISC_R_NOMORE) {
   1824   1.3  christos 		*answer = false;
   1825   1.6  christos 	}
   1826   1.1  christos 
   1827   1.6  christos try_private:
   1828   1.1  christos 	if (privatetype == 0 || complete) {
   1829  1.10  christos 		dns_db_detachnode(db, &node);
   1830   1.3  christos 		*answer = false;
   1831  1.14  christos 		return ISC_R_SUCCESS;
   1832   1.1  christos 	}
   1833   1.1  christos 	result = dns_db_findrdataset(db, node, version, privatetype, 0, 0,
   1834   1.1  christos 				     &rdataset, NULL);
   1835   1.1  christos 
   1836   1.1  christos 	dns_db_detachnode(db, &node);
   1837   1.1  christos 	if (result == ISC_R_NOTFOUND) {
   1838   1.3  christos 		*answer = false;
   1839  1.14  christos 		return ISC_R_SUCCESS;
   1840   1.1  christos 	}
   1841   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1842  1.14  christos 		return result;
   1843   1.6  christos 	}
   1844   1.1  christos 
   1845   1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1846   1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1847   1.6  christos 	{
   1848   1.1  christos 		dns_rdata_t rdata1 = DNS_RDATA_INIT;
   1849   1.1  christos 		dns_rdata_t rdata2 = DNS_RDATA_INIT;
   1850   1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
   1851   1.1  christos 
   1852   1.1  christos 		dns_rdataset_current(&rdataset, &rdata1);
   1853   1.6  christos 		if (!dns_nsec3param_fromprivate(&rdata1, &rdata2, buf,
   1854  1.11  christos 						sizeof(buf)))
   1855  1.11  christos 		{
   1856   1.1  christos 			continue;
   1857   1.6  christos 		}
   1858   1.1  christos 		result = dns_rdata_tostruct(&rdata2, &nsec3param, NULL);
   1859   1.1  christos 		RUNTIME_CHECK(result == ISC_R_SUCCESS);
   1860   1.1  christos 
   1861   1.6  christos 		if (!complete && CREATE(nsec3param.flags)) {
   1862   1.1  christos 			break;
   1863   1.6  christos 		}
   1864   1.1  christos 	}
   1865   1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1866   1.1  christos 	if (result == ISC_R_SUCCESS) {
   1867   1.3  christos 		*answer = true;
   1868   1.1  christos 		result = ISC_R_SUCCESS;
   1869   1.1  christos 	}
   1870   1.1  christos 	if (result == ISC_R_NOMORE) {
   1871   1.3  christos 		*answer = false;
   1872   1.1  christos 		result = ISC_R_SUCCESS;
   1873   1.1  christos 	}
   1874   1.1  christos 
   1875  1.14  christos 	return result;
   1876   1.1  christos }
   1877   1.1  christos 
   1878   1.9  christos unsigned int
   1879   1.9  christos dns_nsec3_maxiterations(void) {
   1880  1.14  christos 	return DNS_NSEC3_MAXITERATIONS;
   1881   1.1  christos }
   1882   1.1  christos 
   1883   1.1  christos isc_result_t
   1884   1.1  christos dns_nsec3_noexistnodata(dns_rdatatype_t type, const dns_name_t *name,
   1885   1.1  christos 			const dns_name_t *nsec3name, dns_rdataset_t *nsec3set,
   1886   1.6  christos 			dns_name_t *zonename, bool *exists, bool *data,
   1887   1.6  christos 			bool *optout, bool *unknown, bool *setclosest,
   1888   1.3  christos 			bool *setnearest, dns_name_t *closest,
   1889   1.6  christos 			dns_name_t *nearest, dns_nseclog_t logit, void *arg) {
   1890   1.1  christos 	char namebuf[DNS_NAME_FORMATSIZE];
   1891   1.1  christos 	dns_fixedname_t fzone;
   1892   1.1  christos 	dns_fixedname_t qfixed;
   1893   1.1  christos 	dns_label_t hashlabel;
   1894   1.1  christos 	dns_name_t *qname;
   1895   1.1  christos 	dns_name_t *zone;
   1896   1.1  christos 	dns_rdata_nsec3_t nsec3;
   1897   1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
   1898   1.1  christos 	int order;
   1899   1.1  christos 	int scope;
   1900   1.3  christos 	bool atparent;
   1901   1.3  christos 	bool first;
   1902   1.3  christos 	bool ns;
   1903   1.3  christos 	bool soa;
   1904   1.1  christos 	isc_buffer_t buffer;
   1905   1.1  christos 	isc_result_t answer = ISC_R_IGNORE;
   1906   1.1  christos 	isc_result_t result;
   1907   1.1  christos 	unsigned char hash[NSEC3_MAX_HASH_LENGTH];
   1908   1.1  christos 	unsigned char owner[NSEC3_MAX_HASH_LENGTH];
   1909   1.1  christos 	unsigned int length;
   1910   1.1  christos 	unsigned int qlabels;
   1911   1.1  christos 	unsigned int zlabels;
   1912   1.1  christos 
   1913   1.1  christos 	REQUIRE((exists == NULL && data == NULL) ||
   1914   1.1  christos 		(exists != NULL && data != NULL));
   1915   1.1  christos 	REQUIRE(nsec3set != NULL && nsec3set->type == dns_rdatatype_nsec3);
   1916   1.1  christos 	REQUIRE((setclosest == NULL && closest == NULL) ||
   1917   1.1  christos 		(setclosest != NULL && closest != NULL));
   1918   1.1  christos 	REQUIRE((setnearest == NULL && nearest == NULL) ||
   1919   1.1  christos 		(setnearest != NULL && nearest != NULL));
   1920   1.1  christos 
   1921   1.1  christos 	result = dns_rdataset_first(nsec3set);
   1922   1.1  christos 	if (result != ISC_R_SUCCESS) {
   1923   1.1  christos 		(*logit)(arg, ISC_LOG_DEBUG(3), "failure processing NSEC3 set");
   1924  1.14  christos 		return result;
   1925   1.1  christos 	}
   1926   1.1  christos 
   1927   1.1  christos 	dns_rdataset_current(nsec3set, &rdata);
   1928   1.1  christos 
   1929   1.1  christos 	result = dns_rdata_tostruct(&rdata, &nsec3, NULL);
   1930   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1931  1.14  christos 		return result;
   1932   1.6  christos 	}
   1933   1.1  christos 
   1934   1.1  christos 	(*logit)(arg, ISC_LOG_DEBUG(3), "looking for relevant NSEC3");
   1935   1.1  christos 
   1936   1.1  christos 	zone = dns_fixedname_initname(&fzone);
   1937   1.1  christos 	zlabels = dns_name_countlabels(nsec3name);
   1938   1.1  christos 
   1939   1.1  christos 	/*
   1940   1.1  christos 	 * NSEC3 records must have two or more labels to be valid.
   1941   1.1  christos 	 */
   1942   1.6  christos 	if (zlabels < 2) {
   1943  1.14  christos 		return ISC_R_IGNORE;
   1944   1.6  christos 	}
   1945   1.1  christos 
   1946   1.1  christos 	/*
   1947   1.1  christos 	 * Strip off the NSEC3 hash to get the zone.
   1948   1.1  christos 	 */
   1949   1.1  christos 	zlabels--;
   1950   1.1  christos 	dns_name_split(nsec3name, zlabels, NULL, zone);
   1951   1.1  christos 
   1952   1.1  christos 	/*
   1953   1.1  christos 	 * If not below the zone name we can ignore this record.
   1954   1.1  christos 	 */
   1955   1.6  christos 	if (!dns_name_issubdomain(name, zone)) {
   1956  1.14  christos 		return ISC_R_IGNORE;
   1957   1.6  christos 	}
   1958   1.1  christos 
   1959   1.1  christos 	/*
   1960   1.1  christos 	 * Is this zone the same or deeper than the current zone?
   1961   1.1  christos 	 */
   1962   1.1  christos 	if (dns_name_countlabels(zonename) == 0 ||
   1963  1.11  christos 	    dns_name_issubdomain(zone, zonename))
   1964  1.11  christos 	{
   1965  1.13  christos 		dns_name_copy(zone, zonename);
   1966   1.6  christos 	}
   1967   1.1  christos 
   1968   1.6  christos 	if (!dns_name_equal(zone, zonename)) {
   1969  1.14  christos 		return ISC_R_IGNORE;
   1970   1.6  christos 	}
   1971   1.1  christos 
   1972   1.1  christos 	/*
   1973   1.1  christos 	 * Are we only looking for the most enclosing zone?
   1974   1.1  christos 	 */
   1975   1.6  christos 	if (exists == NULL || data == NULL) {
   1976  1.14  christos 		return ISC_R_SUCCESS;
   1977   1.6  christos 	}
   1978   1.1  christos 
   1979   1.1  christos 	/*
   1980   1.1  christos 	 * Only set unknown once we are sure that this NSEC3 is from
   1981   1.1  christos 	 * the deepest covering zone.
   1982   1.1  christos 	 */
   1983   1.1  christos 	if (!dns_nsec3_supportedhash(nsec3.hash)) {
   1984   1.6  christos 		if (unknown != NULL) {
   1985   1.3  christos 			*unknown = true;
   1986   1.6  christos 		}
   1987  1.14  christos 		return ISC_R_IGNORE;
   1988   1.1  christos 	}
   1989   1.1  christos 
   1990   1.1  christos 	/*
   1991   1.1  christos 	 * Recover the hash from the first label.
   1992   1.1  christos 	 */
   1993   1.1  christos 	dns_name_getlabel(nsec3name, 0, &hashlabel);
   1994   1.1  christos 	isc_region_consume(&hashlabel, 1);
   1995   1.1  christos 	isc_buffer_init(&buffer, owner, sizeof(owner));
   1996   1.1  christos 	result = isc_base32hex_decoderegion(&hashlabel, &buffer);
   1997   1.6  christos 	if (result != ISC_R_SUCCESS) {
   1998  1.14  christos 		return result;
   1999   1.6  christos 	}
   2000   1.1  christos 
   2001   1.1  christos 	/*
   2002   1.1  christos 	 * The hash lengths should match.  If not ignore the record.
   2003   1.1  christos 	 */
   2004   1.6  christos 	if (isc_buffer_usedlength(&buffer) != nsec3.next_length) {
   2005  1.14  christos 		return ISC_R_IGNORE;
   2006   1.6  christos 	}
   2007   1.1  christos 
   2008   1.1  christos 	/*
   2009   1.1  christos 	 * Work out what this NSEC3 covers.
   2010   1.1  christos 	 * Inside (<0) or outside (>=0).
   2011   1.1  christos 	 */
   2012   1.3  christos 	scope = memcmp(owner, nsec3.next, nsec3.next_length);
   2013   1.1  christos 
   2014   1.1  christos 	/*
   2015   1.1  christos 	 * Prepare to compute all the hashes.
   2016   1.1  christos 	 */
   2017   1.1  christos 	qname = dns_fixedname_initname(&qfixed);
   2018   1.1  christos 	dns_name_downcase(name, qname, NULL);
   2019   1.1  christos 	qlabels = dns_name_countlabels(qname);
   2020   1.3  christos 	first = true;
   2021   1.1  christos 
   2022   1.1  christos 	while (qlabels >= zlabels) {
   2023   1.9  christos 		/*
   2024   1.9  christos 		 * If there are too many iterations reject the NSEC3 record.
   2025   1.9  christos 		 */
   2026   1.9  christos 		if (nsec3.iterations > DNS_NSEC3_MAXITERATIONS) {
   2027  1.14  christos 			return DNS_R_NSEC3ITERRANGE;
   2028   1.9  christos 		}
   2029   1.9  christos 
   2030   1.1  christos 		length = isc_iterated_hash(hash, nsec3.hash, nsec3.iterations,
   2031   1.1  christos 					   nsec3.salt, nsec3.salt_length,
   2032   1.1  christos 					   qname->ndata, qname->length);
   2033   1.1  christos 		/*
   2034   1.1  christos 		 * The computed hash length should match.
   2035   1.1  christos 		 */
   2036   1.1  christos 		if (length != nsec3.next_length) {
   2037   1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2038   1.6  christos 				 "ignoring NSEC bad length %u vs %u", length,
   2039   1.6  christos 				 nsec3.next_length);
   2040  1.14  christos 			return ISC_R_IGNORE;
   2041   1.1  christos 		}
   2042   1.1  christos 
   2043   1.3  christos 		order = memcmp(hash, owner, length);
   2044   1.1  christos 		if (first && order == 0) {
   2045   1.1  christos 			/*
   2046   1.1  christos 			 * The hashes are the same.
   2047   1.1  christos 			 */
   2048   1.1  christos 			atparent = dns_rdatatype_atparent(type);
   2049   1.1  christos 			ns = dns_nsec3_typepresent(&rdata, dns_rdatatype_ns);
   2050   1.1  christos 			soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa);
   2051   1.1  christos 			if (ns && !soa) {
   2052   1.1  christos 				if (!atparent) {
   2053   1.1  christos 					/*
   2054   1.1  christos 					 * This NSEC3 record is from somewhere
   2055   1.1  christos 					 * higher in the DNS, and at the
   2056   1.1  christos 					 * parent of a delegation. It can not
   2057   1.1  christos 					 * be legitimately used here.
   2058   1.1  christos 					 */
   2059   1.1  christos 					(*logit)(arg, ISC_LOG_DEBUG(3),
   2060   1.1  christos 						 "ignoring parent NSEC3");
   2061  1.14  christos 					return ISC_R_IGNORE;
   2062   1.1  christos 				}
   2063   1.1  christos 			} else if (atparent && ns && soa) {
   2064   1.1  christos 				/*
   2065   1.1  christos 				 * This NSEC3 record is from the child.
   2066   1.1  christos 				 * It can not be legitimately used here.
   2067   1.1  christos 				 */
   2068   1.1  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2069   1.1  christos 					 "ignoring child NSEC3");
   2070  1.14  christos 				return ISC_R_IGNORE;
   2071   1.1  christos 			}
   2072   1.1  christos 			if (type == dns_rdatatype_cname ||
   2073   1.1  christos 			    type == dns_rdatatype_nxt ||
   2074   1.1  christos 			    type == dns_rdatatype_nsec ||
   2075   1.1  christos 			    type == dns_rdatatype_key ||
   2076   1.6  christos 			    !dns_nsec3_typepresent(&rdata, dns_rdatatype_cname))
   2077   1.6  christos 			{
   2078   1.3  christos 				*exists = true;
   2079   1.1  christos 				*data = dns_nsec3_typepresent(&rdata, type);
   2080   1.1  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2081   1.1  christos 					 "NSEC3 proves name exists (owner) "
   2082   1.6  christos 					 "data=%d",
   2083   1.6  christos 					 *data);
   2084  1.14  christos 				return ISC_R_SUCCESS;
   2085   1.1  christos 			}
   2086   1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2087   1.1  christos 				 "NSEC3 proves CNAME exists");
   2088  1.14  christos 			return ISC_R_IGNORE;
   2089   1.1  christos 		}
   2090   1.1  christos 
   2091   1.1  christos 		if (order == 0 &&
   2092   1.1  christos 		    dns_nsec3_typepresent(&rdata, dns_rdatatype_ns) &&
   2093   1.1  christos 		    !dns_nsec3_typepresent(&rdata, dns_rdatatype_soa))
   2094   1.1  christos 		{
   2095   1.1  christos 			/*
   2096   1.1  christos 			 * This NSEC3 record is from somewhere higher in
   2097   1.1  christos 			 * the DNS, and at the parent of a delegation.
   2098   1.1  christos 			 * It can not be legitimately used here.
   2099   1.1  christos 			 */
   2100   1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2101   1.1  christos 				 "ignoring parent NSEC3");
   2102  1.14  christos 			return ISC_R_IGNORE;
   2103   1.1  christos 		}
   2104   1.1  christos 
   2105   1.1  christos 		/*
   2106   1.1  christos 		 * Potential closest encloser.
   2107   1.1  christos 		 */
   2108   1.1  christos 		if (order == 0) {
   2109   1.1  christos 			if (closest != NULL &&
   2110   1.1  christos 			    (dns_name_countlabels(closest) == 0 ||
   2111   1.1  christos 			     dns_name_issubdomain(qname, closest)) &&
   2112   1.1  christos 			    !dns_nsec3_typepresent(&rdata, dns_rdatatype_ds) &&
   2113   1.6  christos 			    !dns_nsec3_typepresent(&rdata,
   2114   1.6  christos 						   dns_rdatatype_dname) &&
   2115   1.1  christos 			    (dns_nsec3_typepresent(&rdata, dns_rdatatype_soa) ||
   2116   1.1  christos 			     !dns_nsec3_typepresent(&rdata, dns_rdatatype_ns)))
   2117   1.1  christos 			{
   2118   1.1  christos 				dns_name_format(qname, namebuf,
   2119   1.1  christos 						sizeof(namebuf));
   2120   1.1  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2121   1.1  christos 					 "NSEC3 indicates potential closest "
   2122   1.6  christos 					 "encloser: '%s'",
   2123   1.6  christos 					 namebuf);
   2124  1.13  christos 				dns_name_copy(qname, closest);
   2125   1.3  christos 				*setclosest = true;
   2126   1.1  christos 			}
   2127   1.1  christos 			dns_name_format(qname, namebuf, sizeof(namebuf));
   2128   1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2129   1.1  christos 				 "NSEC3 at super-domain %s", namebuf);
   2130  1.14  christos 			return answer;
   2131   1.1  christos 		}
   2132   1.1  christos 
   2133   1.1  christos 		/*
   2134   1.1  christos 		 * Find if the name does not exist.
   2135   1.1  christos 		 *
   2136   1.1  christos 		 * We continue as we need to find the name closest to the
   2137   1.1  christos 		 * closest encloser that doesn't exist.
   2138   1.1  christos 		 *
   2139   1.1  christos 		 * We also need to continue to ensure that we are not
   2140   1.1  christos 		 * proving the non-existence of a record in a sub-zone.
   2141   1.1  christos 		 * If that would be the case we will return ISC_R_IGNORE
   2142   1.1  christos 		 * above.
   2143   1.1  christos 		 */
   2144   1.1  christos 		if ((scope < 0 && order > 0 &&
   2145   1.1  christos 		     memcmp(hash, nsec3.next, length) < 0) ||
   2146   1.6  christos 		    (scope >= 0 &&
   2147   1.6  christos 		     (order > 0 || memcmp(hash, nsec3.next, length) < 0)))
   2148   1.1  christos 		{
   2149   1.1  christos 			dns_name_format(qname, namebuf, sizeof(namebuf));
   2150   1.6  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2151   1.6  christos 				 "NSEC3 proves "
   2152   1.6  christos 				 "name does not exist: '%s'",
   2153   1.6  christos 				 namebuf);
   2154   1.1  christos 			if (nearest != NULL &&
   2155   1.1  christos 			    (dns_name_countlabels(nearest) == 0 ||
   2156   1.6  christos 			     dns_name_issubdomain(nearest, qname)))
   2157   1.6  christos 			{
   2158  1.13  christos 				dns_name_copy(qname, nearest);
   2159   1.3  christos 				*setnearest = true;
   2160   1.1  christos 			}
   2161   1.1  christos 
   2162   1.3  christos 			*exists = false;
   2163   1.3  christos 			*data = false;
   2164   1.1  christos 			if (optout != NULL) {
   2165   1.6  christos 				*optout = ((nsec3.flags &
   2166   1.6  christos 					    DNS_NSEC3FLAG_OPTOUT) != 0);
   2167   1.3  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2168  1.16  christos 					 *optout ? "NSEC3 indicates optout"
   2169  1.16  christos 						 : "NSEC3 indicates secure "
   2170  1.16  christos 						   "range");
   2171   1.1  christos 			}
   2172   1.1  christos 			answer = ISC_R_SUCCESS;
   2173   1.1  christos 		}
   2174   1.1  christos 
   2175   1.1  christos 		qlabels--;
   2176   1.6  christos 		if (qlabels > 0) {
   2177   1.1  christos 			dns_name_split(qname, qlabels, NULL, qname);
   2178   1.6  christos 		}
   2179   1.3  christos 		first = false;
   2180   1.1  christos 	}
   2181  1.14  christos 	return answer;
   2182   1.1  christos }
   2183