Home | History | Annotate | Line # | Download | only in dns
nsec3.c revision 1.7
      1  1.5  christos /*	$NetBSD: nsec3.c,v 1.7 2021/02/19 16:42:16 christos Exp $	*/
      2  1.1  christos 
      3  1.1  christos /*
      4  1.1  christos  * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
      5  1.1  christos  *
      6  1.1  christos  * This Source Code Form is subject to the terms of the Mozilla Public
      7  1.1  christos  * License, v. 2.0. If a copy of the MPL was not distributed with this
      8  1.7  christos  * file, you can obtain one at https://mozilla.org/MPL/2.0/.
      9  1.1  christos  *
     10  1.1  christos  * See the COPYRIGHT file distributed with this work for additional
     11  1.1  christos  * information regarding copyright ownership.
     12  1.1  christos  */
     13  1.1  christos 
     14  1.3  christos #include <inttypes.h>
     15  1.3  christos #include <stdbool.h>
     16  1.3  christos 
     17  1.1  christos #include <isc/base32.h>
     18  1.1  christos #include <isc/buffer.h>
     19  1.1  christos #include <isc/hex.h>
     20  1.1  christos #include <isc/iterated_hash.h>
     21  1.3  christos #include <isc/md.h>
     22  1.7  christos #include <isc/nonce.h>
     23  1.6  christos #include <isc/safe.h>
     24  1.1  christos #include <isc/string.h>
     25  1.1  christos #include <isc/util.h>
     26  1.1  christos 
     27  1.6  christos #include <dns/compress.h>
     28  1.1  christos #include <dns/db.h>
     29  1.1  christos #include <dns/dbiterator.h>
     30  1.1  christos #include <dns/diff.h>
     31  1.1  christos #include <dns/fixedname.h>
     32  1.1  christos #include <dns/nsec.h>
     33  1.1  christos #include <dns/nsec3.h>
     34  1.1  christos #include <dns/rdata.h>
     35  1.1  christos #include <dns/rdatalist.h>
     36  1.1  christos #include <dns/rdataset.h>
     37  1.1  christos #include <dns/rdatasetiter.h>
     38  1.1  christos #include <dns/rdatastruct.h>
     39  1.1  christos #include <dns/result.h>
     40  1.6  christos #include <dns/zone.h>
     41  1.6  christos 
     42  1.6  christos #include <dst/dst.h>
     43  1.1  christos 
     44  1.6  christos #define CHECK(x)                             \
     45  1.6  christos 	do {                                 \
     46  1.6  christos 		result = (x);                \
     47  1.6  christos 		if (result != ISC_R_SUCCESS) \
     48  1.6  christos 			goto failure;        \
     49  1.2  christos 	} while (/*CONSTCOND*/0)
     50  1.1  christos 
     51  1.6  christos #define OPTOUT(x)  (((x)&DNS_NSEC3FLAG_OPTOUT) != 0)
     52  1.6  christos #define CREATE(x)  (((x)&DNS_NSEC3FLAG_CREATE) != 0)
     53  1.6  christos #define INITIAL(x) (((x)&DNS_NSEC3FLAG_INITIAL) != 0)
     54  1.6  christos #define REMOVE(x)  (((x)&DNS_NSEC3FLAG_REMOVE) != 0)
     55  1.1  christos 
     56  1.1  christos isc_result_t
     57  1.6  christos dns_nsec3_buildrdata(dns_db_t *db, dns_dbversion_t *version, dns_dbnode_t *node,
     58  1.6  christos 		     unsigned int hashalg, unsigned int flags,
     59  1.6  christos 		     unsigned int iterations, const unsigned char *salt,
     60  1.6  christos 		     size_t salt_length, const unsigned char *nexthash,
     61  1.6  christos 		     size_t hash_length, unsigned char *buffer,
     62  1.6  christos 		     dns_rdata_t *rdata) {
     63  1.1  christos 	isc_result_t result;
     64  1.1  christos 	dns_rdataset_t rdataset;
     65  1.1  christos 	isc_region_t r;
     66  1.1  christos 	unsigned int i;
     67  1.3  christos 	bool found;
     68  1.3  christos 	bool found_ns;
     69  1.3  christos 	bool need_rrsig;
     70  1.1  christos 
     71  1.1  christos 	unsigned char *nsec_bits, *bm;
     72  1.1  christos 	unsigned int max_type;
     73  1.1  christos 	dns_rdatasetiter_t *rdsiter;
     74  1.1  christos 	unsigned char *p;
     75  1.1  christos 
     76  1.1  christos 	REQUIRE(salt_length < 256U);
     77  1.1  christos 	REQUIRE(hash_length < 256U);
     78  1.1  christos 	REQUIRE(flags <= 0xffU);
     79  1.1  christos 	REQUIRE(hashalg <= 0xffU);
     80  1.1  christos 	REQUIRE(iterations <= 0xffffU);
     81  1.1  christos 
     82  1.1  christos 	switch (hashalg) {
     83  1.1  christos 	case dns_hash_sha1:
     84  1.1  christos 		REQUIRE(hash_length == ISC_SHA1_DIGESTLENGTH);
     85  1.1  christos 		break;
     86  1.1  christos 	}
     87  1.1  christos 
     88  1.1  christos 	memset(buffer, 0, DNS_NSEC3_BUFFERSIZE);
     89  1.1  christos 
     90  1.1  christos 	p = buffer;
     91  1.1  christos 
     92  1.1  christos 	*p++ = hashalg;
     93  1.1  christos 	*p++ = flags;
     94  1.1  christos 
     95  1.1  christos 	*p++ = iterations >> 8;
     96  1.1  christos 	*p++ = iterations;
     97  1.1  christos 
     98  1.1  christos 	*p++ = (unsigned char)salt_length;
     99  1.1  christos 	memmove(p, salt, salt_length);
    100  1.1  christos 	p += salt_length;
    101  1.1  christos 
    102  1.1  christos 	*p++ = (unsigned char)hash_length;
    103  1.1  christos 	memmove(p, nexthash, hash_length);
    104  1.1  christos 	p += hash_length;
    105  1.1  christos 
    106  1.1  christos 	r.length = (unsigned int)(p - buffer);
    107  1.1  christos 	r.base = buffer;
    108  1.1  christos 
    109  1.1  christos 	/*
    110  1.1  christos 	 * Use the end of the space for a raw bitmap leaving enough
    111  1.1  christos 	 * space for the window identifiers and length octets.
    112  1.1  christos 	 */
    113  1.1  christos 	bm = r.base + r.length + 512;
    114  1.1  christos 	nsec_bits = r.base + r.length;
    115  1.1  christos 	max_type = 0;
    116  1.6  christos 	if (node == NULL) {
    117  1.1  christos 		goto collapse_bitmap;
    118  1.6  christos 	}
    119  1.1  christos 	dns_rdataset_init(&rdataset);
    120  1.1  christos 	rdsiter = NULL;
    121  1.1  christos 	result = dns_db_allrdatasets(db, node, version, 0, &rdsiter);
    122  1.6  christos 	if (result != ISC_R_SUCCESS) {
    123  1.1  christos 		return (result);
    124  1.6  christos 	}
    125  1.3  christos 	found = found_ns = need_rrsig = false;
    126  1.6  christos 	for (result = dns_rdatasetiter_first(rdsiter); result == ISC_R_SUCCESS;
    127  1.1  christos 	     result = dns_rdatasetiter_next(rdsiter))
    128  1.1  christos 	{
    129  1.1  christos 		dns_rdatasetiter_current(rdsiter, &rdataset);
    130  1.1  christos 		if (rdataset.type != dns_rdatatype_nsec &&
    131  1.1  christos 		    rdataset.type != dns_rdatatype_nsec3 &&
    132  1.6  christos 		    rdataset.type != dns_rdatatype_rrsig)
    133  1.6  christos 		{
    134  1.6  christos 			if (rdataset.type > max_type) {
    135  1.1  christos 				max_type = rdataset.type;
    136  1.6  christos 			}
    137  1.1  christos 			dns_nsec_setbit(bm, rdataset.type, 1);
    138  1.1  christos 			/*
    139  1.1  christos 			 * Work out if we need to set the RRSIG bit for
    140  1.1  christos 			 * this node.  We set the RRSIG bit if either of
    141  1.1  christos 			 * the following conditions are met:
    142  1.1  christos 			 * 1) We have a SOA or DS then we need to set
    143  1.1  christos 			 *    the RRSIG bit as both always will be signed.
    144  1.1  christos 			 * 2) We set the RRSIG bit if we don't have
    145  1.1  christos 			 *    a NS record but do have other data.
    146  1.1  christos 			 */
    147  1.1  christos 			if (rdataset.type == dns_rdatatype_soa ||
    148  1.6  christos 			    rdataset.type == dns_rdatatype_ds) {
    149  1.3  christos 				need_rrsig = true;
    150  1.6  christos 			} else if (rdataset.type == dns_rdatatype_ns) {
    151  1.3  christos 				found_ns = true;
    152  1.6  christos 			} else {
    153  1.3  christos 				found = true;
    154  1.6  christos 			}
    155  1.1  christos 		}
    156  1.1  christos 		dns_rdataset_disassociate(&rdataset);
    157  1.1  christos 	}
    158  1.1  christos 	if ((found && !found_ns) || need_rrsig) {
    159  1.6  christos 		if (dns_rdatatype_rrsig > max_type) {
    160  1.1  christos 			max_type = dns_rdatatype_rrsig;
    161  1.6  christos 		}
    162  1.1  christos 		dns_nsec_setbit(bm, dns_rdatatype_rrsig, 1);
    163  1.1  christos 	}
    164  1.1  christos 
    165  1.1  christos 	/*
    166  1.1  christos 	 * At zone cuts, deny the existence of glue in the parent zone.
    167  1.1  christos 	 */
    168  1.1  christos 	if (dns_nsec_isset(bm, dns_rdatatype_ns) &&
    169  1.6  christos 	    !dns_nsec_isset(bm, dns_rdatatype_soa))
    170  1.6  christos 	{
    171  1.1  christos 		for (i = 0; i <= max_type; i++) {
    172  1.1  christos 			if (dns_nsec_isset(bm, i) &&
    173  1.6  christos 			    !dns_rdatatype_iszonecutauth((dns_rdatatype_t)i)) {
    174  1.1  christos 				dns_nsec_setbit(bm, i, 0);
    175  1.6  christos 			}
    176  1.1  christos 		}
    177  1.1  christos 	}
    178  1.1  christos 
    179  1.1  christos 	dns_rdatasetiter_destroy(&rdsiter);
    180  1.6  christos 	if (result != ISC_R_NOMORE) {
    181  1.1  christos 		return (result);
    182  1.6  christos 	}
    183  1.1  christos 
    184  1.6  christos collapse_bitmap:
    185  1.1  christos 	nsec_bits += dns_nsec_compressbitmap(nsec_bits, bm, max_type);
    186  1.1  christos 	r.length = (unsigned int)(nsec_bits - r.base);
    187  1.1  christos 	INSIST(r.length <= DNS_NSEC3_BUFFERSIZE);
    188  1.1  christos 	dns_rdata_fromregion(rdata, dns_db_class(db), dns_rdatatype_nsec3, &r);
    189  1.1  christos 
    190  1.1  christos 	return (ISC_R_SUCCESS);
    191  1.1  christos }
    192  1.1  christos 
    193  1.3  christos bool
    194  1.1  christos dns_nsec3_typepresent(dns_rdata_t *rdata, dns_rdatatype_t type) {
    195  1.1  christos 	dns_rdata_nsec3_t nsec3;
    196  1.1  christos 	isc_result_t result;
    197  1.3  christos 	bool present;
    198  1.1  christos 	unsigned int i, len, window;
    199  1.1  christos 
    200  1.1  christos 	REQUIRE(rdata != NULL);
    201  1.1  christos 	REQUIRE(rdata->type == dns_rdatatype_nsec3);
    202  1.1  christos 
    203  1.1  christos 	/* This should never fail */
    204  1.1  christos 	result = dns_rdata_tostruct(rdata, &nsec3, NULL);
    205  1.1  christos 	INSIST(result == ISC_R_SUCCESS);
    206  1.1  christos 
    207  1.3  christos 	present = false;
    208  1.1  christos 	for (i = 0; i < nsec3.len; i += len) {
    209  1.1  christos 		INSIST(i + 2 <= nsec3.len);
    210  1.1  christos 		window = nsec3.typebits[i];
    211  1.1  christos 		len = nsec3.typebits[i + 1];
    212  1.1  christos 		INSIST(len > 0 && len <= 32);
    213  1.1  christos 		i += 2;
    214  1.1  christos 		INSIST(i + len <= nsec3.len);
    215  1.6  christos 		if (window * 256 > type) {
    216  1.1  christos 			break;
    217  1.6  christos 		}
    218  1.6  christos 		if ((window + 1) * 256 <= type) {
    219  1.1  christos 			continue;
    220  1.6  christos 		}
    221  1.3  christos 		if (type < (window * 256) + len * 8) {
    222  1.3  christos 			present = dns_nsec_isset(&nsec3.typebits[i],
    223  1.3  christos 						 type % 256);
    224  1.3  christos 		}
    225  1.1  christos 		break;
    226  1.1  christos 	}
    227  1.1  christos 	dns_rdata_freestruct(&nsec3);
    228  1.1  christos 	return (present);
    229  1.1  christos }
    230  1.1  christos 
    231  1.1  christos isc_result_t
    232  1.7  christos dns_nsec3_generate_salt(unsigned char *salt, size_t saltlen) {
    233  1.7  christos 	if (saltlen > 255U) {
    234  1.7  christos 		return (ISC_R_RANGE);
    235  1.7  christos 	}
    236  1.7  christos 	isc_nonce_buf(salt, saltlen);
    237  1.7  christos 	return (ISC_R_SUCCESS);
    238  1.7  christos }
    239  1.7  christos 
    240  1.7  christos isc_result_t
    241  1.1  christos dns_nsec3_hashname(dns_fixedname_t *result,
    242  1.1  christos 		   unsigned char rethash[NSEC3_MAX_HASH_LENGTH],
    243  1.1  christos 		   size_t *hash_length, const dns_name_t *name,
    244  1.6  christos 		   const dns_name_t *origin, dns_hash_t hashalg,
    245  1.6  christos 		   unsigned int iterations, const unsigned char *salt,
    246  1.6  christos 		   size_t saltlength) {
    247  1.1  christos 	unsigned char hash[NSEC3_MAX_HASH_LENGTH];
    248  1.1  christos 	unsigned char nametext[DNS_NAME_FORMATSIZE];
    249  1.1  christos 	dns_fixedname_t fixed;
    250  1.1  christos 	dns_name_t *downcased;
    251  1.1  christos 	isc_buffer_t namebuffer;
    252  1.1  christos 	isc_region_t region;
    253  1.1  christos 	size_t len;
    254  1.1  christos 
    255  1.6  christos 	if (rethash == NULL) {
    256  1.1  christos 		rethash = hash;
    257  1.6  christos 	}
    258  1.1  christos 
    259  1.1  christos 	memset(rethash, 0, NSEC3_MAX_HASH_LENGTH);
    260  1.1  christos 
    261  1.1  christos 	downcased = dns_fixedname_initname(&fixed);
    262  1.1  christos 	dns_name_downcase(name, downcased, NULL);
    263  1.1  christos 
    264  1.1  christos 	/* hash the node name */
    265  1.6  christos 	len = isc_iterated_hash(rethash, hashalg, iterations, salt,
    266  1.6  christos 				(int)saltlength, downcased->ndata,
    267  1.6  christos 				downcased->length);
    268  1.6  christos 	if (len == 0U) {
    269  1.1  christos 		return (DNS_R_BADALG);
    270  1.6  christos 	}
    271  1.1  christos 
    272  1.6  christos 	if (hash_length != NULL) {
    273  1.1  christos 		*hash_length = len;
    274  1.6  christos 	}
    275  1.1  christos 
    276  1.1  christos 	/* convert the hash to base32hex non-padded */
    277  1.1  christos 	region.base = rethash;
    278  1.1  christos 	region.length = (unsigned int)len;
    279  1.1  christos 	isc_buffer_init(&namebuffer, nametext, sizeof nametext);
    280  1.1  christos 	isc_base32hexnp_totext(&region, 1, "", &namebuffer);
    281  1.1  christos 
    282  1.1  christos 	/* convert the hex to a domain name */
    283  1.1  christos 	dns_fixedname_init(result);
    284  1.1  christos 	return (dns_name_fromtext(dns_fixedname_name(result), &namebuffer,
    285  1.1  christos 				  origin, 0, NULL));
    286  1.1  christos }
    287  1.1  christos 
    288  1.1  christos unsigned int
    289  1.1  christos dns_nsec3_hashlength(dns_hash_t hash) {
    290  1.1  christos 	switch (hash) {
    291  1.1  christos 	case dns_hash_sha1:
    292  1.6  christos 		return (ISC_SHA1_DIGESTLENGTH);
    293  1.1  christos 	}
    294  1.1  christos 	return (0);
    295  1.1  christos }
    296  1.1  christos 
    297  1.3  christos bool
    298  1.1  christos dns_nsec3_supportedhash(dns_hash_t hash) {
    299  1.1  christos 	switch (hash) {
    300  1.1  christos 	case dns_hash_sha1:
    301  1.3  christos 		return (true);
    302  1.1  christos 	}
    303  1.3  christos 	return (false);
    304  1.1  christos }
    305  1.1  christos 
    306  1.1  christos /*%
    307  1.1  christos  * Update a single RR in version 'ver' of 'db' and log the
    308  1.1  christos  * update in 'diff'.
    309  1.1  christos  *
    310  1.1  christos  * Ensures:
    311  1.1  christos  * \li  '*tuple' == NULL.  Either the tuple is freed, or its
    312  1.1  christos  *      ownership has been transferred to the diff.
    313  1.1  christos  */
    314  1.1  christos static isc_result_t
    315  1.1  christos do_one_tuple(dns_difftuple_t **tuple, dns_db_t *db, dns_dbversion_t *ver,
    316  1.6  christos 	     dns_diff_t *diff) {
    317  1.1  christos 	dns_diff_t temp_diff;
    318  1.1  christos 	isc_result_t result;
    319  1.1  christos 
    320  1.1  christos 	/*
    321  1.1  christos 	 * Create a singleton diff.
    322  1.1  christos 	 */
    323  1.1  christos 	dns_diff_init(diff->mctx, &temp_diff);
    324  1.1  christos 	ISC_LIST_APPEND(temp_diff.tuples, *tuple, link);
    325  1.1  christos 
    326  1.1  christos 	/*
    327  1.1  christos 	 * Apply it to the database.
    328  1.1  christos 	 */
    329  1.1  christos 	result = dns_diff_apply(&temp_diff, db, ver);
    330  1.1  christos 	ISC_LIST_UNLINK(temp_diff.tuples, *tuple, link);
    331  1.1  christos 	if (result != ISC_R_SUCCESS) {
    332  1.1  christos 		dns_difftuple_free(tuple);
    333  1.1  christos 		return (result);
    334  1.1  christos 	}
    335  1.1  christos 
    336  1.1  christos 	/*
    337  1.1  christos 	 * Merge it into the current pending journal entry.
    338  1.1  christos 	 */
    339  1.1  christos 	dns_diff_appendminimal(diff, tuple);
    340  1.1  christos 
    341  1.1  christos 	/*
    342  1.1  christos 	 * Do not clear temp_diff.
    343  1.1  christos 	 */
    344  1.1  christos 	return (ISC_R_SUCCESS);
    345  1.1  christos }
    346  1.1  christos 
    347  1.1  christos /*%
    348  1.1  christos  * Set '*exists' to true iff the given name exists, to false otherwise.
    349  1.1  christos  */
    350  1.1  christos static isc_result_t
    351  1.1  christos name_exists(dns_db_t *db, dns_dbversion_t *version, const dns_name_t *name,
    352  1.6  christos 	    bool *exists) {
    353  1.1  christos 	isc_result_t result;
    354  1.1  christos 	dns_dbnode_t *node = NULL;
    355  1.1  christos 	dns_rdatasetiter_t *iter = NULL;
    356  1.1  christos 
    357  1.3  christos 	result = dns_db_findnode(db, name, false, &node);
    358  1.1  christos 	if (result == ISC_R_NOTFOUND) {
    359  1.3  christos 		*exists = false;
    360  1.1  christos 		return (ISC_R_SUCCESS);
    361  1.1  christos 	}
    362  1.6  christos 	if (result != ISC_R_SUCCESS) {
    363  1.1  christos 		return (result);
    364  1.6  christos 	}
    365  1.1  christos 
    366  1.6  christos 	result = dns_db_allrdatasets(db, node, version, (isc_stdtime_t)0,
    367  1.6  christos 				     &iter);
    368  1.6  christos 	if (result != ISC_R_SUCCESS) {
    369  1.1  christos 		goto cleanup_node;
    370  1.6  christos 	}
    371  1.1  christos 
    372  1.1  christos 	result = dns_rdatasetiter_first(iter);
    373  1.1  christos 	if (result == ISC_R_SUCCESS) {
    374  1.3  christos 		*exists = true;
    375  1.1  christos 	} else if (result == ISC_R_NOMORE) {
    376  1.3  christos 		*exists = false;
    377  1.1  christos 		result = ISC_R_SUCCESS;
    378  1.6  christos 	} else {
    379  1.3  christos 		*exists = false;
    380  1.6  christos 	}
    381  1.1  christos 	dns_rdatasetiter_destroy(&iter);
    382  1.1  christos 
    383  1.6  christos cleanup_node:
    384  1.1  christos 	dns_db_detachnode(db, &node);
    385  1.1  christos 	return (result);
    386  1.1  christos }
    387  1.1  christos 
    388  1.3  christos static bool
    389  1.1  christos match_nsec3param(const dns_rdata_nsec3_t *nsec3,
    390  1.6  christos 		 const dns_rdata_nsec3param_t *nsec3param) {
    391  1.1  christos 	if (nsec3->hash == nsec3param->hash &&
    392  1.1  christos 	    nsec3->iterations == nsec3param->iterations &&
    393  1.1  christos 	    nsec3->salt_length == nsec3param->salt_length &&
    394  1.1  christos 	    !memcmp(nsec3->salt, nsec3param->salt, nsec3->salt_length))
    395  1.6  christos 	{
    396  1.3  christos 		return (true);
    397  1.6  christos 	}
    398  1.3  christos 	return (false);
    399  1.1  christos }
    400  1.1  christos 
    401  1.1  christos /*%
    402  1.1  christos  * Delete NSEC3 records at "name" which match "param", recording the
    403  1.1  christos  * change in "diff".
    404  1.1  christos  */
    405  1.1  christos static isc_result_t
    406  1.1  christos delnsec3(dns_db_t *db, dns_dbversion_t *version, const dns_name_t *name,
    407  1.6  christos 	 const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff) {
    408  1.6  christos 	dns_dbnode_t *node = NULL;
    409  1.1  christos 	dns_difftuple_t *tuple = NULL;
    410  1.1  christos 	dns_rdata_nsec3_t nsec3;
    411  1.1  christos 	dns_rdataset_t rdataset;
    412  1.1  christos 	isc_result_t result;
    413  1.1  christos 
    414  1.3  christos 	result = dns_db_findnsec3node(db, name, false, &node);
    415  1.6  christos 	if (result == ISC_R_NOTFOUND) {
    416  1.1  christos 		return (ISC_R_SUCCESS);
    417  1.6  christos 	}
    418  1.6  christos 	if (result != ISC_R_SUCCESS) {
    419  1.1  christos 		return (result);
    420  1.6  christos 	}
    421  1.1  christos 
    422  1.1  christos 	dns_rdataset_init(&rdataset);
    423  1.1  christos 	result = dns_db_findrdataset(db, node, version, dns_rdatatype_nsec3, 0,
    424  1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
    425  1.1  christos 
    426  1.1  christos 	if (result == ISC_R_NOTFOUND) {
    427  1.1  christos 		result = ISC_R_SUCCESS;
    428  1.1  christos 		goto cleanup_node;
    429  1.1  christos 	}
    430  1.6  christos 	if (result != ISC_R_SUCCESS) {
    431  1.1  christos 		goto cleanup_node;
    432  1.6  christos 	}
    433  1.1  christos 
    434  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
    435  1.1  christos 	     result = dns_rdataset_next(&rdataset))
    436  1.1  christos 	{
    437  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    438  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
    439  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3, NULL));
    440  1.1  christos 
    441  1.6  christos 		if (!match_nsec3param(&nsec3, nsec3param)) {
    442  1.1  christos 			continue;
    443  1.6  christos 		}
    444  1.1  christos 
    445  1.1  christos 		result = dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, name,
    446  1.1  christos 					      rdataset.ttl, &rdata, &tuple);
    447  1.6  christos 		if (result != ISC_R_SUCCESS) {
    448  1.1  christos 			goto failure;
    449  1.6  christos 		}
    450  1.1  christos 		result = do_one_tuple(&tuple, db, version, diff);
    451  1.6  christos 		if (result != ISC_R_SUCCESS) {
    452  1.1  christos 			goto failure;
    453  1.6  christos 		}
    454  1.1  christos 	}
    455  1.6  christos 	if (result != ISC_R_NOMORE) {
    456  1.1  christos 		goto failure;
    457  1.6  christos 	}
    458  1.1  christos 	result = ISC_R_SUCCESS;
    459  1.1  christos 
    460  1.6  christos failure:
    461  1.1  christos 	dns_rdataset_disassociate(&rdataset);
    462  1.6  christos cleanup_node:
    463  1.1  christos 	dns_db_detachnode(db, &node);
    464  1.1  christos 
    465  1.1  christos 	return (result);
    466  1.1  christos }
    467  1.1  christos 
    468  1.3  christos static bool
    469  1.1  christos better_param(dns_rdataset_t *nsec3paramset, dns_rdata_t *param) {
    470  1.1  christos 	dns_rdataset_t rdataset;
    471  1.1  christos 	isc_result_t result;
    472  1.1  christos 
    473  1.6  christos 	if (REMOVE(param->data[1])) {
    474  1.3  christos 		return (true);
    475  1.6  christos 	}
    476  1.1  christos 
    477  1.1  christos 	dns_rdataset_init(&rdataset);
    478  1.1  christos 	dns_rdataset_clone(nsec3paramset, &rdataset);
    479  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
    480  1.6  christos 	     result = dns_rdataset_next(&rdataset))
    481  1.6  christos 	{
    482  1.6  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    483  1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
    484  1.1  christos 
    485  1.1  christos 		if (rdataset.type != dns_rdatatype_nsec3param) {
    486  1.6  christos 			dns_rdata_t tmprdata = DNS_RDATA_INIT;
    487  1.1  christos 			dns_rdataset_current(&rdataset, &tmprdata);
    488  1.6  christos 			if (!dns_nsec3param_fromprivate(&tmprdata, &rdata, buf,
    489  1.6  christos 							sizeof(buf))) {
    490  1.1  christos 				continue;
    491  1.6  christos 			}
    492  1.6  christos 		} else {
    493  1.1  christos 			dns_rdataset_current(&rdataset, &rdata);
    494  1.6  christos 		}
    495  1.1  christos 
    496  1.6  christos 		if (rdata.length != param->length) {
    497  1.1  christos 			continue;
    498  1.6  christos 		}
    499  1.6  christos 		if (rdata.data[0] != param->data[0] || REMOVE(rdata.data[1]) ||
    500  1.1  christos 		    rdata.data[2] != param->data[2] ||
    501  1.1  christos 		    rdata.data[3] != param->data[3] ||
    502  1.1  christos 		    rdata.data[4] != param->data[4] ||
    503  1.1  christos 		    memcmp(&rdata.data[5], &param->data[5], param->data[4]))
    504  1.6  christos 		{
    505  1.1  christos 			continue;
    506  1.6  christos 		}
    507  1.1  christos 		if (CREATE(rdata.data[1]) && !CREATE(param->data[1])) {
    508  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    509  1.3  christos 			return (true);
    510  1.1  christos 		}
    511  1.1  christos 	}
    512  1.1  christos 	dns_rdataset_disassociate(&rdataset);
    513  1.3  christos 	return (false);
    514  1.1  christos }
    515  1.1  christos 
    516  1.1  christos static isc_result_t
    517  1.1  christos find_nsec3(dns_rdata_nsec3_t *nsec3, dns_rdataset_t *rdataset,
    518  1.6  christos 	   const dns_rdata_nsec3param_t *nsec3param) {
    519  1.1  christos 	isc_result_t result;
    520  1.6  christos 	for (result = dns_rdataset_first(rdataset); result == ISC_R_SUCCESS;
    521  1.6  christos 	     result = dns_rdataset_next(rdataset))
    522  1.6  christos 	{
    523  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    524  1.1  christos 
    525  1.1  christos 		dns_rdataset_current(rdataset, &rdata);
    526  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, nsec3, NULL));
    527  1.1  christos 		dns_rdata_reset(&rdata);
    528  1.6  christos 		if (match_nsec3param(nsec3, nsec3param)) {
    529  1.1  christos 			break;
    530  1.6  christos 		}
    531  1.1  christos 	}
    532  1.6  christos failure:
    533  1.1  christos 	return (result);
    534  1.1  christos }
    535  1.1  christos 
    536  1.1  christos isc_result_t
    537  1.1  christos dns_nsec3_addnsec3(dns_db_t *db, dns_dbversion_t *version,
    538  1.1  christos 		   const dns_name_t *name,
    539  1.6  christos 		   const dns_rdata_nsec3param_t *nsec3param, dns_ttl_t nsecttl,
    540  1.6  christos 		   bool unsecure, dns_diff_t *diff) {
    541  1.1  christos 	dns_dbiterator_t *dbit = NULL;
    542  1.1  christos 	dns_dbnode_t *node = NULL;
    543  1.1  christos 	dns_dbnode_t *newnode = NULL;
    544  1.1  christos 	dns_difftuple_t *tuple = NULL;
    545  1.1  christos 	dns_fixedname_t fixed;
    546  1.1  christos 	dns_fixedname_t fprev;
    547  1.1  christos 	dns_hash_t hash;
    548  1.1  christos 	dns_name_t *hashname;
    549  1.1  christos 	dns_name_t *origin;
    550  1.1  christos 	dns_name_t *prev;
    551  1.1  christos 	dns_name_t empty;
    552  1.1  christos 	dns_rdata_nsec3_t nsec3;
    553  1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
    554  1.1  christos 	dns_rdataset_t rdataset;
    555  1.1  christos 	int pass;
    556  1.3  christos 	bool exists = false;
    557  1.3  christos 	bool maybe_remove_unsecure = false;
    558  1.3  christos 	uint8_t flags;
    559  1.1  christos 	isc_buffer_t buffer;
    560  1.1  christos 	isc_result_t result;
    561  1.1  christos 	unsigned char *old_next;
    562  1.1  christos 	unsigned char *salt;
    563  1.1  christos 	unsigned char nexthash[NSEC3_MAX_HASH_LENGTH];
    564  1.1  christos 	unsigned char nsec3buf[DNS_NSEC3_BUFFERSIZE];
    565  1.1  christos 	unsigned int iterations;
    566  1.1  christos 	unsigned int labels;
    567  1.1  christos 	size_t next_length;
    568  1.1  christos 	unsigned int old_length;
    569  1.1  christos 	unsigned int salt_length;
    570  1.1  christos 
    571  1.1  christos 	hashname = dns_fixedname_initname(&fixed);
    572  1.1  christos 	prev = dns_fixedname_initname(&fprev);
    573  1.1  christos 
    574  1.1  christos 	dns_rdataset_init(&rdataset);
    575  1.1  christos 
    576  1.1  christos 	origin = dns_db_origin(db);
    577  1.1  christos 
    578  1.1  christos 	/*
    579  1.1  christos 	 * Chain parameters.
    580  1.1  christos 	 */
    581  1.1  christos 	hash = nsec3param->hash;
    582  1.1  christos 	iterations = nsec3param->iterations;
    583  1.1  christos 	salt_length = nsec3param->salt_length;
    584  1.1  christos 	salt = nsec3param->salt;
    585  1.1  christos 
    586  1.1  christos 	/*
    587  1.1  christos 	 * Default flags for a new chain.
    588  1.1  christos 	 */
    589  1.1  christos 	flags = nsec3param->flags & DNS_NSEC3FLAG_OPTOUT;
    590  1.1  christos 
    591  1.1  christos 	/*
    592  1.1  christos 	 * If this is the first NSEC3 in the chain nexthash will
    593  1.1  christos 	 * remain pointing to itself.
    594  1.1  christos 	 */
    595  1.1  christos 	next_length = sizeof(nexthash);
    596  1.6  christos 	CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, name, origin,
    597  1.6  christos 				 hash, iterations, salt, salt_length));
    598  1.1  christos 	INSIST(next_length <= sizeof(nexthash));
    599  1.1  christos 
    600  1.1  christos 	/*
    601  1.1  christos 	 * Create the node if it doesn't exist and hold
    602  1.1  christos 	 * a reference to it until we have added the NSEC3.
    603  1.1  christos 	 */
    604  1.3  christos 	CHECK(dns_db_findnsec3node(db, hashname, true, &newnode));
    605  1.1  christos 
    606  1.1  christos 	/*
    607  1.1  christos 	 * Seek the iterator to the 'newnode'.
    608  1.1  christos 	 */
    609  1.1  christos 	CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
    610  1.1  christos 	CHECK(dns_dbiterator_seek(dbit, hashname));
    611  1.1  christos 	CHECK(dns_dbiterator_pause(dbit));
    612  1.1  christos 	result = dns_db_findrdataset(db, newnode, version, dns_rdatatype_nsec3,
    613  1.6  christos 				     0, (isc_stdtime_t)0, &rdataset, NULL);
    614  1.1  christos 	/*
    615  1.1  christos 	 * If we updating a existing NSEC3 then find its
    616  1.1  christos 	 * next field.
    617  1.1  christos 	 */
    618  1.1  christos 	if (result == ISC_R_SUCCESS) {
    619  1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
    620  1.1  christos 		if (result == ISC_R_SUCCESS) {
    621  1.6  christos 			if (!CREATE(nsec3param->flags)) {
    622  1.1  christos 				flags = nsec3.flags;
    623  1.6  christos 			}
    624  1.1  christos 			next_length = nsec3.next_length;
    625  1.1  christos 			INSIST(next_length <= sizeof(nexthash));
    626  1.1  christos 			memmove(nexthash, nsec3.next, next_length);
    627  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    628  1.1  christos 			/*
    629  1.1  christos 			 * If the NSEC3 is not for a unsecure delegation then
    630  1.1  christos 			 * we are just updating it.  If it is for a unsecure
    631  1.1  christos 			 * delegation then we need find out if we need to
    632  1.1  christos 			 * remove the NSEC3 record or not by examining the
    633  1.1  christos 			 * previous NSEC3 record.
    634  1.1  christos 			 */
    635  1.6  christos 			if (!unsecure) {
    636  1.1  christos 				goto addnsec3;
    637  1.6  christos 			} else if (CREATE(nsec3param->flags) && OPTOUT(flags)) {
    638  1.1  christos 				result = dns_nsec3_delnsec3(db, version, name,
    639  1.1  christos 							    nsec3param, diff);
    640  1.1  christos 				goto failure;
    641  1.6  christos 			} else {
    642  1.3  christos 				maybe_remove_unsecure = true;
    643  1.6  christos 			}
    644  1.1  christos 		} else {
    645  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    646  1.6  christos 			if (result != ISC_R_NOMORE) {
    647  1.1  christos 				goto failure;
    648  1.6  christos 			}
    649  1.1  christos 		}
    650  1.1  christos 	}
    651  1.1  christos 
    652  1.1  christos 	/*
    653  1.1  christos 	 * Find the previous NSEC3 (if any) and update it if required.
    654  1.1  christos 	 */
    655  1.1  christos 	pass = 0;
    656  1.1  christos 	do {
    657  1.1  christos 		result = dns_dbiterator_prev(dbit);
    658  1.1  christos 		if (result == ISC_R_NOMORE) {
    659  1.1  christos 			pass++;
    660  1.1  christos 			CHECK(dns_dbiterator_last(dbit));
    661  1.1  christos 		}
    662  1.1  christos 		CHECK(dns_dbiterator_current(dbit, &node, prev));
    663  1.1  christos 		CHECK(dns_dbiterator_pause(dbit));
    664  1.1  christos 		result = dns_db_findrdataset(db, node, version,
    665  1.1  christos 					     dns_rdatatype_nsec3, 0,
    666  1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
    667  1.1  christos 		dns_db_detachnode(db, &node);
    668  1.6  christos 		if (result != ISC_R_SUCCESS) {
    669  1.1  christos 			continue;
    670  1.6  christos 		}
    671  1.1  christos 
    672  1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
    673  1.1  christos 		if (result == ISC_R_NOMORE) {
    674  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    675  1.1  christos 			continue;
    676  1.1  christos 		}
    677  1.6  christos 		if (result != ISC_R_SUCCESS) {
    678  1.1  christos 			goto failure;
    679  1.6  christos 		}
    680  1.1  christos 
    681  1.1  christos 		if (maybe_remove_unsecure) {
    682  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    683  1.1  christos 			/*
    684  1.1  christos 			 * If we have OPTOUT set in the previous NSEC3 record
    685  1.1  christos 			 * we actually need to delete the NSEC3 record.
    686  1.1  christos 			 * Otherwise we just need to replace the NSEC3 record.
    687  1.1  christos 			 */
    688  1.1  christos 			if (OPTOUT(nsec3.flags)) {
    689  1.1  christos 				result = dns_nsec3_delnsec3(db, version, name,
    690  1.1  christos 							    nsec3param, diff);
    691  1.1  christos 				goto failure;
    692  1.1  christos 			}
    693  1.1  christos 			goto addnsec3;
    694  1.1  christos 		} else {
    695  1.1  christos 			/*
    696  1.1  christos 			 * Is this is a unsecure delegation we are adding?
    697  1.1  christos 			 * If so no change is required.
    698  1.1  christos 			 */
    699  1.1  christos 			if (OPTOUT(nsec3.flags) && unsecure) {
    700  1.1  christos 				dns_rdataset_disassociate(&rdataset);
    701  1.1  christos 				goto failure;
    702  1.1  christos 			}
    703  1.1  christos 		}
    704  1.1  christos 
    705  1.1  christos 		old_next = nsec3.next;
    706  1.1  christos 		old_length = nsec3.next_length;
    707  1.1  christos 
    708  1.1  christos 		/*
    709  1.1  christos 		 * Delete the old previous NSEC3.
    710  1.1  christos 		 */
    711  1.1  christos 		CHECK(delnsec3(db, version, prev, nsec3param, diff));
    712  1.1  christos 
    713  1.1  christos 		/*
    714  1.1  christos 		 * Fixup the previous NSEC3.
    715  1.1  christos 		 */
    716  1.1  christos 		nsec3.next = nexthash;
    717  1.1  christos 		nsec3.next_length = (unsigned char)next_length;
    718  1.1  christos 		isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
    719  1.1  christos 		CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
    720  1.1  christos 					   dns_rdatatype_nsec3, &nsec3,
    721  1.1  christos 					   &buffer));
    722  1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, prev,
    723  1.1  christos 					   rdataset.ttl, &rdata, &tuple));
    724  1.1  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
    725  1.1  christos 		INSIST(old_length <= sizeof(nexthash));
    726  1.1  christos 		memmove(nexthash, old_next, old_length);
    727  1.6  christos 		if (!CREATE(nsec3param->flags)) {
    728  1.1  christos 			flags = nsec3.flags;
    729  1.6  christos 		}
    730  1.1  christos 		dns_rdata_reset(&rdata);
    731  1.1  christos 		dns_rdataset_disassociate(&rdataset);
    732  1.1  christos 		break;
    733  1.1  christos 	} while (pass < 2);
    734  1.1  christos 
    735  1.6  christos addnsec3:
    736  1.1  christos 	/*
    737  1.1  christos 	 * Create the NSEC3 RDATA.
    738  1.1  christos 	 */
    739  1.3  christos 	CHECK(dns_db_findnode(db, name, false, &node));
    740  1.1  christos 	CHECK(dns_nsec3_buildrdata(db, version, node, hash, flags, iterations,
    741  1.1  christos 				   salt, salt_length, nexthash, next_length,
    742  1.1  christos 				   nsec3buf, &rdata));
    743  1.1  christos 	dns_db_detachnode(db, &node);
    744  1.1  christos 
    745  1.1  christos 	/*
    746  1.1  christos 	 * Delete the old NSEC3 and record the change.
    747  1.1  christos 	 */
    748  1.1  christos 	CHECK(delnsec3(db, version, hashname, nsec3param, diff));
    749  1.1  christos 	/*
    750  1.1  christos 	 * Add the new NSEC3 and record the change.
    751  1.1  christos 	 */
    752  1.6  christos 	CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, hashname,
    753  1.6  christos 				   nsecttl, &rdata, &tuple));
    754  1.1  christos 	CHECK(do_one_tuple(&tuple, db, version, diff));
    755  1.1  christos 	INSIST(tuple == NULL);
    756  1.1  christos 	dns_rdata_reset(&rdata);
    757  1.1  christos 	dns_db_detachnode(db, &newnode);
    758  1.1  christos 
    759  1.1  christos 	/*
    760  1.1  christos 	 * Add missing NSEC3 records for empty nodes
    761  1.1  christos 	 */
    762  1.1  christos 	dns_name_init(&empty, NULL);
    763  1.1  christos 	dns_name_clone(name, &empty);
    764  1.1  christos 	do {
    765  1.1  christos 		labels = dns_name_countlabels(&empty) - 1;
    766  1.6  christos 		if (labels <= dns_name_countlabels(origin)) {
    767  1.1  christos 			break;
    768  1.6  christos 		}
    769  1.1  christos 		dns_name_getlabelsequence(&empty, 1, labels, &empty);
    770  1.1  christos 		CHECK(name_exists(db, version, &empty, &exists));
    771  1.6  christos 		if (exists) {
    772  1.1  christos 			break;
    773  1.6  christos 		}
    774  1.6  christos 		CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, &empty,
    775  1.6  christos 					 origin, hash, iterations, salt,
    776  1.6  christos 					 salt_length));
    777  1.1  christos 
    778  1.1  christos 		/*
    779  1.1  christos 		 * Create the node if it doesn't exist and hold
    780  1.1  christos 		 * a reference to it until we have added the NSEC3
    781  1.1  christos 		 * or we discover we don't need to add make a change.
    782  1.1  christos 		 */
    783  1.3  christos 		CHECK(dns_db_findnsec3node(db, hashname, true, &newnode));
    784  1.1  christos 		result = dns_db_findrdataset(db, newnode, version,
    785  1.1  christos 					     dns_rdatatype_nsec3, 0,
    786  1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
    787  1.1  christos 		if (result == ISC_R_SUCCESS) {
    788  1.1  christos 			result = find_nsec3(&nsec3, &rdataset, nsec3param);
    789  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    790  1.1  christos 			if (result == ISC_R_SUCCESS) {
    791  1.1  christos 				dns_db_detachnode(db, &newnode);
    792  1.1  christos 				break;
    793  1.1  christos 			}
    794  1.6  christos 			if (result != ISC_R_NOMORE) {
    795  1.1  christos 				goto failure;
    796  1.6  christos 			}
    797  1.1  christos 		}
    798  1.1  christos 
    799  1.1  christos 		/*
    800  1.1  christos 		 * Find the previous NSEC3 and update it.
    801  1.1  christos 		 */
    802  1.1  christos 		CHECK(dns_dbiterator_seek(dbit, hashname));
    803  1.1  christos 		pass = 0;
    804  1.1  christos 		do {
    805  1.1  christos 			result = dns_dbiterator_prev(dbit);
    806  1.1  christos 			if (result == ISC_R_NOMORE) {
    807  1.1  christos 				pass++;
    808  1.1  christos 				CHECK(dns_dbiterator_last(dbit));
    809  1.1  christos 			}
    810  1.1  christos 			CHECK(dns_dbiterator_current(dbit, &node, prev));
    811  1.1  christos 			CHECK(dns_dbiterator_pause(dbit));
    812  1.6  christos 			result = dns_db_findrdataset(
    813  1.6  christos 				db, node, version, dns_rdatatype_nsec3, 0,
    814  1.6  christos 				(isc_stdtime_t)0, &rdataset, NULL);
    815  1.1  christos 			dns_db_detachnode(db, &node);
    816  1.6  christos 			if (result != ISC_R_SUCCESS) {
    817  1.1  christos 				continue;
    818  1.6  christos 			}
    819  1.1  christos 			result = find_nsec3(&nsec3, &rdataset, nsec3param);
    820  1.1  christos 			if (result == ISC_R_NOMORE) {
    821  1.1  christos 				dns_rdataset_disassociate(&rdataset);
    822  1.1  christos 				continue;
    823  1.1  christos 			}
    824  1.6  christos 			if (result != ISC_R_SUCCESS) {
    825  1.1  christos 				goto failure;
    826  1.6  christos 			}
    827  1.1  christos 
    828  1.1  christos 			old_next = nsec3.next;
    829  1.1  christos 			old_length = nsec3.next_length;
    830  1.1  christos 
    831  1.1  christos 			/*
    832  1.1  christos 			 * Delete the old previous NSEC3.
    833  1.1  christos 			 */
    834  1.1  christos 			CHECK(delnsec3(db, version, prev, nsec3param, diff));
    835  1.1  christos 
    836  1.1  christos 			/*
    837  1.1  christos 			 * Fixup the previous NSEC3.
    838  1.1  christos 			 */
    839  1.1  christos 			nsec3.next = nexthash;
    840  1.1  christos 			nsec3.next_length = (unsigned char)next_length;
    841  1.6  christos 			isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
    842  1.1  christos 			CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
    843  1.1  christos 						   dns_rdatatype_nsec3, &nsec3,
    844  1.1  christos 						   &buffer));
    845  1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
    846  1.1  christos 						   prev, rdataset.ttl, &rdata,
    847  1.1  christos 						   &tuple));
    848  1.1  christos 			CHECK(do_one_tuple(&tuple, db, version, diff));
    849  1.1  christos 			INSIST(old_length <= sizeof(nexthash));
    850  1.1  christos 			memmove(nexthash, old_next, old_length);
    851  1.6  christos 			if (!CREATE(nsec3param->flags)) {
    852  1.1  christos 				flags = nsec3.flags;
    853  1.6  christos 			}
    854  1.1  christos 			dns_rdata_reset(&rdata);
    855  1.1  christos 			dns_rdataset_disassociate(&rdataset);
    856  1.1  christos 			break;
    857  1.1  christos 		} while (pass < 2);
    858  1.1  christos 
    859  1.1  christos 		INSIST(pass < 2);
    860  1.1  christos 
    861  1.1  christos 		/*
    862  1.1  christos 		 * Create the NSEC3 RDATA for the empty node.
    863  1.1  christos 		 */
    864  1.6  christos 		CHECK(dns_nsec3_buildrdata(
    865  1.6  christos 			db, version, NULL, hash, flags, iterations, salt,
    866  1.6  christos 			salt_length, nexthash, next_length, nsec3buf, &rdata));
    867  1.1  christos 		/*
    868  1.1  christos 		 * Delete the old NSEC3 and record the change.
    869  1.1  christos 		 */
    870  1.1  christos 		CHECK(delnsec3(db, version, hashname, nsec3param, diff));
    871  1.1  christos 
    872  1.1  christos 		/*
    873  1.1  christos 		 * Add the new NSEC3 and record the change.
    874  1.1  christos 		 */
    875  1.6  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, hashname,
    876  1.6  christos 					   nsecttl, &rdata, &tuple));
    877  1.1  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
    878  1.1  christos 		INSIST(tuple == NULL);
    879  1.1  christos 		dns_rdata_reset(&rdata);
    880  1.1  christos 		dns_db_detachnode(db, &newnode);
    881  1.1  christos 	} while (1);
    882  1.1  christos 
    883  1.1  christos 	/* result cannot be ISC_R_NOMORE here */
    884  1.1  christos 	INSIST(result != ISC_R_NOMORE);
    885  1.1  christos 
    886  1.6  christos failure:
    887  1.6  christos 	if (dbit != NULL) {
    888  1.1  christos 		dns_dbiterator_destroy(&dbit);
    889  1.6  christos 	}
    890  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
    891  1.1  christos 		dns_rdataset_disassociate(&rdataset);
    892  1.6  christos 	}
    893  1.6  christos 	if (node != NULL) {
    894  1.1  christos 		dns_db_detachnode(db, &node);
    895  1.6  christos 	}
    896  1.6  christos 	if (newnode != NULL) {
    897  1.1  christos 		dns_db_detachnode(db, &newnode);
    898  1.6  christos 	}
    899  1.1  christos 	return (result);
    900  1.1  christos }
    901  1.1  christos 
    902  1.1  christos /*%
    903  1.1  christos  * Add NSEC3 records for "name", recording the change in "diff".
    904  1.1  christos  * The existing NSEC3 records are removed.
    905  1.1  christos  */
    906  1.1  christos isc_result_t
    907  1.1  christos dns_nsec3_addnsec3s(dns_db_t *db, dns_dbversion_t *version,
    908  1.6  christos 		    const dns_name_t *name, dns_ttl_t nsecttl, bool unsecure,
    909  1.6  christos 		    dns_diff_t *diff) {
    910  1.1  christos 	dns_dbnode_t *node = NULL;
    911  1.1  christos 	dns_rdata_nsec3param_t nsec3param;
    912  1.1  christos 	dns_rdataset_t rdataset;
    913  1.1  christos 	isc_result_t result;
    914  1.1  christos 
    915  1.1  christos 	dns_rdataset_init(&rdataset);
    916  1.1  christos 
    917  1.1  christos 	/*
    918  1.1  christos 	 * Find the NSEC3 parameters for this zone.
    919  1.1  christos 	 */
    920  1.1  christos 	result = dns_db_getoriginnode(db, &node);
    921  1.6  christos 	if (result != ISC_R_SUCCESS) {
    922  1.1  christos 		return (result);
    923  1.6  christos 	}
    924  1.1  christos 
    925  1.1  christos 	result = dns_db_findrdataset(db, node, version,
    926  1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
    927  1.6  christos 				     NULL);
    928  1.1  christos 	dns_db_detachnode(db, &node);
    929  1.6  christos 	if (result == ISC_R_NOTFOUND) {
    930  1.1  christos 		return (ISC_R_SUCCESS);
    931  1.6  christos 	}
    932  1.6  christos 	if (result != ISC_R_SUCCESS) {
    933  1.1  christos 		return (result);
    934  1.6  christos 	}
    935  1.1  christos 
    936  1.1  christos 	/*
    937  1.1  christos 	 * Update each active NSEC3 chain.
    938  1.1  christos 	 */
    939  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
    940  1.6  christos 	     result = dns_rdataset_next(&rdataset))
    941  1.6  christos 	{
    942  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
    943  1.1  christos 
    944  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
    945  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
    946  1.1  christos 
    947  1.6  christos 		if (nsec3param.flags != 0) {
    948  1.1  christos 			continue;
    949  1.6  christos 		}
    950  1.1  christos 		/*
    951  1.1  christos 		 * We have a active chain.  Update it.
    952  1.1  christos 		 */
    953  1.1  christos 		CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
    954  1.1  christos 					 nsecttl, unsecure, diff));
    955  1.1  christos 	}
    956  1.6  christos 	if (result == ISC_R_NOMORE) {
    957  1.1  christos 		result = ISC_R_SUCCESS;
    958  1.6  christos 	}
    959  1.1  christos 
    960  1.6  christos failure:
    961  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
    962  1.1  christos 		dns_rdataset_disassociate(&rdataset);
    963  1.6  christos 	}
    964  1.6  christos 	if (node != NULL) {
    965  1.1  christos 		dns_db_detachnode(db, &node);
    966  1.6  christos 	}
    967  1.1  christos 
    968  1.1  christos 	return (result);
    969  1.1  christos }
    970  1.1  christos 
    971  1.3  christos bool
    972  1.1  christos dns_nsec3param_fromprivate(dns_rdata_t *src, dns_rdata_t *target,
    973  1.6  christos 			   unsigned char *buf, size_t buflen) {
    974  1.1  christos 	dns_decompress_t dctx;
    975  1.1  christos 	isc_result_t result;
    976  1.1  christos 	isc_buffer_t buf1;
    977  1.1  christos 	isc_buffer_t buf2;
    978  1.1  christos 
    979  1.1  christos 	/*
    980  1.1  christos 	 * Algorithm 0 (reserved by RFC 4034) is used to identify
    981  1.1  christos 	 * NSEC3PARAM records from DNSKEY pointers.
    982  1.1  christos 	 */
    983  1.6  christos 	if (src->length < 1 || src->data[0] != 0) {
    984  1.3  christos 		return (false);
    985  1.6  christos 	}
    986  1.1  christos 
    987  1.1  christos 	isc_buffer_init(&buf1, src->data + 1, src->length - 1);
    988  1.1  christos 	isc_buffer_add(&buf1, src->length - 1);
    989  1.1  christos 	isc_buffer_setactive(&buf1, src->length - 1);
    990  1.1  christos 	isc_buffer_init(&buf2, buf, (unsigned int)buflen);
    991  1.1  christos 	dns_decompress_init(&dctx, -1, DNS_DECOMPRESS_NONE);
    992  1.1  christos 	result = dns_rdata_fromwire(target, src->rdclass,
    993  1.6  christos 				    dns_rdatatype_nsec3param, &buf1, &dctx, 0,
    994  1.6  christos 				    &buf2);
    995  1.1  christos 	dns_decompress_invalidate(&dctx);
    996  1.1  christos 
    997  1.3  christos 	return (result == ISC_R_SUCCESS);
    998  1.1  christos }
    999  1.1  christos 
   1000  1.1  christos void
   1001  1.1  christos dns_nsec3param_toprivate(dns_rdata_t *src, dns_rdata_t *target,
   1002  1.6  christos 			 dns_rdatatype_t privatetype, unsigned char *buf,
   1003  1.6  christos 			 size_t buflen) {
   1004  1.1  christos 	REQUIRE(buflen >= src->length + 1);
   1005  1.1  christos 
   1006  1.1  christos 	REQUIRE(DNS_RDATA_INITIALIZED(target));
   1007  1.1  christos 
   1008  1.1  christos 	memmove(buf + 1, src->data, src->length);
   1009  1.1  christos 	buf[0] = 0;
   1010  1.1  christos 	target->data = buf;
   1011  1.1  christos 	target->length = src->length + 1;
   1012  1.1  christos 	target->type = privatetype;
   1013  1.1  christos 	target->rdclass = src->rdclass;
   1014  1.1  christos 	target->flags = 0;
   1015  1.1  christos 	ISC_LINK_INIT(target, link);
   1016  1.1  christos }
   1017  1.1  christos 
   1018  1.1  christos static isc_result_t
   1019  1.1  christos rr_exists(dns_db_t *db, dns_dbversion_t *ver, const dns_name_t *name,
   1020  1.6  christos 	  const dns_rdata_t *rdata, bool *flag) {
   1021  1.1  christos 	dns_rdataset_t rdataset;
   1022  1.1  christos 	dns_dbnode_t *node = NULL;
   1023  1.1  christos 	isc_result_t result;
   1024  1.1  christos 
   1025  1.1  christos 	dns_rdataset_init(&rdataset);
   1026  1.6  christos 	if (rdata->type == dns_rdatatype_nsec3) {
   1027  1.3  christos 		CHECK(dns_db_findnsec3node(db, name, false, &node));
   1028  1.6  christos 	} else {
   1029  1.3  christos 		CHECK(dns_db_findnode(db, name, false, &node));
   1030  1.6  christos 	}
   1031  1.1  christos 	result = dns_db_findrdataset(db, node, ver, rdata->type, 0,
   1032  1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1033  1.1  christos 	if (result == ISC_R_NOTFOUND) {
   1034  1.3  christos 		*flag = false;
   1035  1.1  christos 		result = ISC_R_SUCCESS;
   1036  1.1  christos 		goto failure;
   1037  1.1  christos 	}
   1038  1.1  christos 
   1039  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1040  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1041  1.6  christos 	{
   1042  1.1  christos 		dns_rdata_t myrdata = DNS_RDATA_INIT;
   1043  1.1  christos 		dns_rdataset_current(&rdataset, &myrdata);
   1044  1.6  christos 		if (!dns_rdata_casecompare(&myrdata, rdata)) {
   1045  1.1  christos 			break;
   1046  1.6  christos 		}
   1047  1.1  christos 	}
   1048  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1049  1.1  christos 	if (result == ISC_R_SUCCESS) {
   1050  1.3  christos 		*flag = true;
   1051  1.1  christos 	} else if (result == ISC_R_NOMORE) {
   1052  1.3  christos 		*flag = false;
   1053  1.1  christos 		result = ISC_R_SUCCESS;
   1054  1.1  christos 	}
   1055  1.1  christos 
   1056  1.6  christos failure:
   1057  1.6  christos 	if (node != NULL) {
   1058  1.1  christos 		dns_db_detachnode(db, &node);
   1059  1.6  christos 	}
   1060  1.1  christos 	return (result);
   1061  1.1  christos }
   1062  1.1  christos 
   1063  1.1  christos isc_result_t
   1064  1.1  christos dns_nsec3param_salttotext(dns_rdata_nsec3param_t *nsec3param, char *dst,
   1065  1.6  christos 			  size_t dstlen) {
   1066  1.1  christos 	isc_result_t result;
   1067  1.1  christos 	isc_region_t r;
   1068  1.1  christos 	isc_buffer_t b;
   1069  1.1  christos 
   1070  1.1  christos 	REQUIRE(nsec3param != NULL);
   1071  1.1  christos 	REQUIRE(dst != NULL);
   1072  1.1  christos 
   1073  1.1  christos 	if (nsec3param->salt_length == 0) {
   1074  1.1  christos 		if (dstlen < 2U) {
   1075  1.1  christos 			return (ISC_R_NOSPACE);
   1076  1.1  christos 		}
   1077  1.1  christos 		strlcpy(dst, "-", dstlen);
   1078  1.1  christos 		return (ISC_R_SUCCESS);
   1079  1.1  christos 	}
   1080  1.1  christos 
   1081  1.1  christos 	r.base = nsec3param->salt;
   1082  1.1  christos 	r.length = nsec3param->salt_length;
   1083  1.1  christos 	isc_buffer_init(&b, dst, (unsigned int)dstlen);
   1084  1.1  christos 
   1085  1.1  christos 	result = isc_hex_totext(&r, 2, "", &b);
   1086  1.1  christos 	if (result != ISC_R_SUCCESS) {
   1087  1.1  christos 		return (result);
   1088  1.1  christos 	}
   1089  1.1  christos 
   1090  1.1  christos 	if (isc_buffer_availablelength(&b) < 1) {
   1091  1.1  christos 		return (ISC_R_NOSPACE);
   1092  1.1  christos 	}
   1093  1.1  christos 	isc_buffer_putuint8(&b, 0);
   1094  1.1  christos 
   1095  1.1  christos 	return (ISC_R_SUCCESS);
   1096  1.1  christos }
   1097  1.1  christos 
   1098  1.1  christos isc_result_t
   1099  1.1  christos dns_nsec3param_deletechains(dns_db_t *db, dns_dbversion_t *ver,
   1100  1.6  christos 			    dns_zone_t *zone, bool nonsec, dns_diff_t *diff) {
   1101  1.1  christos 	dns_dbnode_t *node = NULL;
   1102  1.1  christos 	dns_difftuple_t *tuple = NULL;
   1103  1.1  christos 	dns_name_t next;
   1104  1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
   1105  1.1  christos 	dns_rdataset_t rdataset;
   1106  1.3  christos 	bool flag;
   1107  1.1  christos 	isc_result_t result = ISC_R_SUCCESS;
   1108  1.1  christos 	unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE + 1];
   1109  1.1  christos 	dns_name_t *origin = dns_zone_getorigin(zone);
   1110  1.1  christos 	dns_rdatatype_t privatetype = dns_zone_getprivatetype(zone);
   1111  1.1  christos 
   1112  1.1  christos 	dns_name_init(&next, NULL);
   1113  1.1  christos 	dns_rdataset_init(&rdataset);
   1114  1.1  christos 
   1115  1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1116  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1117  1.1  christos 		return (result);
   1118  1.6  christos 	}
   1119  1.1  christos 
   1120  1.1  christos 	/*
   1121  1.1  christos 	 * Cause all NSEC3 chains to be deleted.
   1122  1.1  christos 	 */
   1123  1.6  christos 	result = dns_db_findrdataset(db, node, ver, dns_rdatatype_nsec3param, 0,
   1124  1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1125  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1126  1.1  christos 		goto try_private;
   1127  1.6  christos 	}
   1128  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1129  1.1  christos 		goto failure;
   1130  1.6  christos 	}
   1131  1.1  christos 
   1132  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1133  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1134  1.6  christos 	{
   1135  1.1  christos 		dns_rdata_t private = DNS_RDATA_INIT;
   1136  1.1  christos 
   1137  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1138  1.1  christos 
   1139  1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, origin,
   1140  1.1  christos 					   rdataset.ttl, &rdata, &tuple));
   1141  1.1  christos 		CHECK(do_one_tuple(&tuple, db, ver, diff));
   1142  1.1  christos 		INSIST(tuple == NULL);
   1143  1.1  christos 
   1144  1.6  christos 		dns_nsec3param_toprivate(&rdata, &private, privatetype, buf,
   1145  1.6  christos 					 sizeof(buf));
   1146  1.1  christos 		buf[2] = DNS_NSEC3FLAG_REMOVE;
   1147  1.6  christos 		if (nonsec) {
   1148  1.1  christos 			buf[2] |= DNS_NSEC3FLAG_NONSEC;
   1149  1.6  christos 		}
   1150  1.1  christos 
   1151  1.1  christos 		CHECK(rr_exists(db, ver, origin, &private, &flag));
   1152  1.1  christos 
   1153  1.1  christos 		if (!flag) {
   1154  1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
   1155  1.1  christos 						   origin, 0, &private,
   1156  1.1  christos 						   &tuple));
   1157  1.1  christos 			CHECK(do_one_tuple(&tuple, db, ver, diff));
   1158  1.1  christos 			INSIST(tuple == NULL);
   1159  1.1  christos 		}
   1160  1.1  christos 		dns_rdata_reset(&rdata);
   1161  1.1  christos 	}
   1162  1.6  christos 	if (result != ISC_R_NOMORE) {
   1163  1.1  christos 		goto failure;
   1164  1.6  christos 	}
   1165  1.1  christos 
   1166  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1167  1.1  christos 
   1168  1.6  christos try_private:
   1169  1.6  christos 	if (privatetype == 0) {
   1170  1.1  christos 		goto success;
   1171  1.6  christos 	}
   1172  1.1  christos 	result = dns_db_findrdataset(db, node, ver, privatetype, 0,
   1173  1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1174  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1175  1.1  christos 		goto success;
   1176  1.6  christos 	}
   1177  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1178  1.1  christos 		goto failure;
   1179  1.6  christos 	}
   1180  1.1  christos 
   1181  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1182  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1183  1.6  christos 	{
   1184  1.1  christos 		dns_rdata_reset(&rdata);
   1185  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1186  1.1  christos 		INSIST(rdata.length <= sizeof(buf));
   1187  1.1  christos 		memmove(buf, rdata.data, rdata.length);
   1188  1.1  christos 
   1189  1.1  christos 		/*
   1190  1.1  christos 		 * Private NSEC3 record length >= 6.
   1191  1.1  christos 		 * <0(1), hash(1), flags(1), iterations(2), saltlen(1)>
   1192  1.1  christos 		 */
   1193  1.1  christos 		if (rdata.length < 6 || buf[0] != 0 ||
   1194  1.1  christos 		    (buf[2] & DNS_NSEC3FLAG_REMOVE) != 0 ||
   1195  1.1  christos 		    (nonsec && (buf[2] & DNS_NSEC3FLAG_NONSEC) != 0))
   1196  1.6  christos 		{
   1197  1.1  christos 			continue;
   1198  1.6  christos 		}
   1199  1.1  christos 
   1200  1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_DEL, origin,
   1201  1.1  christos 					   0, &rdata, &tuple));
   1202  1.1  christos 		CHECK(do_one_tuple(&tuple, db, ver, diff));
   1203  1.1  christos 		INSIST(tuple == NULL);
   1204  1.1  christos 
   1205  1.1  christos 		rdata.data = buf;
   1206  1.1  christos 		buf[2] = DNS_NSEC3FLAG_REMOVE;
   1207  1.6  christos 		if (nonsec) {
   1208  1.1  christos 			buf[2] |= DNS_NSEC3FLAG_NONSEC;
   1209  1.6  christos 		}
   1210  1.1  christos 
   1211  1.1  christos 		CHECK(rr_exists(db, ver, origin, &rdata, &flag));
   1212  1.1  christos 
   1213  1.1  christos 		if (!flag) {
   1214  1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
   1215  1.1  christos 						   origin, 0, &rdata, &tuple));
   1216  1.1  christos 			CHECK(do_one_tuple(&tuple, db, ver, diff));
   1217  1.1  christos 			INSIST(tuple == NULL);
   1218  1.1  christos 		}
   1219  1.1  christos 	}
   1220  1.6  christos 	if (result != ISC_R_NOMORE) {
   1221  1.1  christos 		goto failure;
   1222  1.6  christos 	}
   1223  1.6  christos success:
   1224  1.1  christos 	result = ISC_R_SUCCESS;
   1225  1.1  christos 
   1226  1.6  christos failure:
   1227  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1228  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1229  1.6  christos 	}
   1230  1.1  christos 	dns_db_detachnode(db, &node);
   1231  1.1  christos 	return (result);
   1232  1.1  christos }
   1233  1.1  christos 
   1234  1.1  christos isc_result_t
   1235  1.1  christos dns_nsec3_addnsec3sx(dns_db_t *db, dns_dbversion_t *version,
   1236  1.6  christos 		     const dns_name_t *name, dns_ttl_t nsecttl, bool unsecure,
   1237  1.6  christos 		     dns_rdatatype_t type, dns_diff_t *diff) {
   1238  1.1  christos 	dns_dbnode_t *node = NULL;
   1239  1.1  christos 	dns_rdata_nsec3param_t nsec3param;
   1240  1.1  christos 	dns_rdataset_t rdataset;
   1241  1.1  christos 	dns_rdataset_t prdataset;
   1242  1.1  christos 	isc_result_t result;
   1243  1.1  christos 
   1244  1.1  christos 	dns_rdataset_init(&rdataset);
   1245  1.1  christos 	dns_rdataset_init(&prdataset);
   1246  1.1  christos 
   1247  1.1  christos 	/*
   1248  1.1  christos 	 * Find the NSEC3 parameters for this zone.
   1249  1.1  christos 	 */
   1250  1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1251  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1252  1.1  christos 		return (result);
   1253  1.6  christos 	}
   1254  1.1  christos 
   1255  1.6  christos 	result = dns_db_findrdataset(db, node, version, type, 0, 0, &prdataset,
   1256  1.6  christos 				     NULL);
   1257  1.6  christos 	if (result != ISC_R_SUCCESS && result != ISC_R_NOTFOUND) {
   1258  1.1  christos 		goto failure;
   1259  1.6  christos 	}
   1260  1.1  christos 
   1261  1.1  christos 	result = dns_db_findrdataset(db, node, version,
   1262  1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
   1263  1.6  christos 				     NULL);
   1264  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1265  1.1  christos 		goto try_private;
   1266  1.6  christos 	}
   1267  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1268  1.1  christos 		goto failure;
   1269  1.6  christos 	}
   1270  1.1  christos 
   1271  1.1  christos 	/*
   1272  1.1  christos 	 * Update each active NSEC3 chain.
   1273  1.1  christos 	 */
   1274  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1275  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1276  1.6  christos 	{
   1277  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1278  1.1  christos 
   1279  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1280  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
   1281  1.1  christos 
   1282  1.6  christos 		if (nsec3param.flags != 0) {
   1283  1.1  christos 			continue;
   1284  1.6  christos 		}
   1285  1.1  christos 
   1286  1.1  christos 		/*
   1287  1.1  christos 		 * We have a active chain.  Update it.
   1288  1.1  christos 		 */
   1289  1.1  christos 		CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
   1290  1.1  christos 					 nsecttl, unsecure, diff));
   1291  1.1  christos 	}
   1292  1.6  christos 	if (result != ISC_R_NOMORE) {
   1293  1.1  christos 		goto failure;
   1294  1.6  christos 	}
   1295  1.1  christos 
   1296  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1297  1.1  christos 
   1298  1.6  christos try_private:
   1299  1.6  christos 	if (!dns_rdataset_isassociated(&prdataset)) {
   1300  1.1  christos 		goto success;
   1301  1.6  christos 	}
   1302  1.1  christos 	/*
   1303  1.1  christos 	 * Update each active NSEC3 chain.
   1304  1.1  christos 	 */
   1305  1.6  christos 	for (result = dns_rdataset_first(&prdataset); result == ISC_R_SUCCESS;
   1306  1.6  christos 	     result = dns_rdataset_next(&prdataset))
   1307  1.6  christos 	{
   1308  1.1  christos 		dns_rdata_t rdata1 = DNS_RDATA_INIT;
   1309  1.1  christos 		dns_rdata_t rdata2 = DNS_RDATA_INIT;
   1310  1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
   1311  1.1  christos 
   1312  1.1  christos 		dns_rdataset_current(&prdataset, &rdata1);
   1313  1.6  christos 		if (!dns_nsec3param_fromprivate(&rdata1, &rdata2, buf,
   1314  1.6  christos 						sizeof(buf))) {
   1315  1.1  christos 			continue;
   1316  1.6  christos 		}
   1317  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata2, &nsec3param, NULL));
   1318  1.1  christos 
   1319  1.6  christos 		if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0) {
   1320  1.1  christos 			continue;
   1321  1.6  christos 		}
   1322  1.6  christos 		if (better_param(&prdataset, &rdata2)) {
   1323  1.1  christos 			continue;
   1324  1.6  christos 		}
   1325  1.1  christos 
   1326  1.1  christos 		/*
   1327  1.1  christos 		 * We have a active chain.  Update it.
   1328  1.1  christos 		 */
   1329  1.1  christos 		CHECK(dns_nsec3_addnsec3(db, version, name, &nsec3param,
   1330  1.1  christos 					 nsecttl, unsecure, diff));
   1331  1.1  christos 	}
   1332  1.6  christos 	if (result == ISC_R_NOMORE) {
   1333  1.6  christos 	success:
   1334  1.1  christos 		result = ISC_R_SUCCESS;
   1335  1.6  christos 	}
   1336  1.6  christos failure:
   1337  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1338  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1339  1.6  christos 	}
   1340  1.6  christos 	if (dns_rdataset_isassociated(&prdataset)) {
   1341  1.1  christos 		dns_rdataset_disassociate(&prdataset);
   1342  1.6  christos 	}
   1343  1.6  christos 	if (node != NULL) {
   1344  1.1  christos 		dns_db_detachnode(db, &node);
   1345  1.6  christos 	}
   1346  1.1  christos 
   1347  1.1  christos 	return (result);
   1348  1.1  christos }
   1349  1.1  christos 
   1350  1.1  christos /*%
   1351  1.1  christos  * Determine whether any NSEC3 records that were associated with
   1352  1.1  christos  * 'name' should be deleted or if they should continue to exist.
   1353  1.3  christos  * true indicates they should be deleted.
   1354  1.3  christos  * false indicates they should be retained.
   1355  1.1  christos  */
   1356  1.1  christos static isc_result_t
   1357  1.1  christos deleteit(dns_db_t *db, dns_dbversion_t *ver, const dns_name_t *name,
   1358  1.6  christos 	 bool *yesno) {
   1359  1.1  christos 	isc_result_t result;
   1360  1.1  christos 	dns_fixedname_t foundname;
   1361  1.1  christos 	dns_fixedname_init(&foundname);
   1362  1.1  christos 
   1363  1.1  christos 	result = dns_db_find(db, name, ver, dns_rdatatype_any,
   1364  1.1  christos 			     DNS_DBFIND_GLUEOK | DNS_DBFIND_NOWILD,
   1365  1.6  christos 			     (isc_stdtime_t)0, NULL,
   1366  1.6  christos 			     dns_fixedname_name(&foundname), NULL, NULL);
   1367  1.1  christos 	if (result == DNS_R_EMPTYNAME || result == ISC_R_SUCCESS ||
   1368  1.6  christos 	    result == DNS_R_ZONECUT)
   1369  1.6  christos 	{
   1370  1.3  christos 		*yesno = false;
   1371  1.1  christos 		return (ISC_R_SUCCESS);
   1372  1.1  christos 	}
   1373  1.1  christos 	if (result == DNS_R_GLUE || result == DNS_R_DNAME ||
   1374  1.6  christos 	    result == DNS_R_DELEGATION || result == DNS_R_NXDOMAIN)
   1375  1.6  christos 	{
   1376  1.3  christos 		*yesno = true;
   1377  1.1  christos 		return (ISC_R_SUCCESS);
   1378  1.1  christos 	}
   1379  1.1  christos 	/*
   1380  1.1  christos 	 * Silence compiler.
   1381  1.1  christos 	 */
   1382  1.3  christos 	*yesno = true;
   1383  1.1  christos 	return (result);
   1384  1.1  christos }
   1385  1.1  christos 
   1386  1.1  christos isc_result_t
   1387  1.1  christos dns_nsec3_delnsec3(dns_db_t *db, dns_dbversion_t *version,
   1388  1.1  christos 		   const dns_name_t *name,
   1389  1.6  christos 		   const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff) {
   1390  1.1  christos 	dns_dbiterator_t *dbit = NULL;
   1391  1.1  christos 	dns_dbnode_t *node = NULL;
   1392  1.1  christos 	dns_difftuple_t *tuple = NULL;
   1393  1.1  christos 	dns_fixedname_t fixed;
   1394  1.1  christos 	dns_fixedname_t fprev;
   1395  1.1  christos 	dns_hash_t hash;
   1396  1.1  christos 	dns_name_t *hashname;
   1397  1.1  christos 	dns_name_t *origin;
   1398  1.1  christos 	dns_name_t *prev;
   1399  1.1  christos 	dns_name_t empty;
   1400  1.1  christos 	dns_rdata_nsec3_t nsec3;
   1401  1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
   1402  1.1  christos 	dns_rdataset_t rdataset;
   1403  1.1  christos 	int pass;
   1404  1.3  christos 	bool yesno;
   1405  1.1  christos 	isc_buffer_t buffer;
   1406  1.1  christos 	isc_result_t result;
   1407  1.1  christos 	unsigned char *salt;
   1408  1.1  christos 	unsigned char nexthash[NSEC3_MAX_HASH_LENGTH];
   1409  1.1  christos 	unsigned char nsec3buf[DNS_NSEC3_BUFFERSIZE];
   1410  1.1  christos 	unsigned int iterations;
   1411  1.1  christos 	unsigned int labels;
   1412  1.1  christos 	size_t next_length;
   1413  1.1  christos 	unsigned int salt_length;
   1414  1.1  christos 
   1415  1.1  christos 	hashname = dns_fixedname_initname(&fixed);
   1416  1.1  christos 	prev = dns_fixedname_initname(&fprev);
   1417  1.1  christos 
   1418  1.1  christos 	dns_rdataset_init(&rdataset);
   1419  1.1  christos 
   1420  1.1  christos 	origin = dns_db_origin(db);
   1421  1.1  christos 
   1422  1.1  christos 	/*
   1423  1.1  christos 	 * Chain parameters.
   1424  1.1  christos 	 */
   1425  1.1  christos 	hash = nsec3param->hash;
   1426  1.1  christos 	iterations = nsec3param->iterations;
   1427  1.1  christos 	salt_length = nsec3param->salt_length;
   1428  1.1  christos 	salt = nsec3param->salt;
   1429  1.1  christos 
   1430  1.1  christos 	/*
   1431  1.1  christos 	 * If this is the first NSEC3 in the chain nexthash will
   1432  1.1  christos 	 * remain pointing to itself.
   1433  1.1  christos 	 */
   1434  1.1  christos 	next_length = sizeof(nexthash);
   1435  1.6  christos 	CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, name, origin,
   1436  1.6  christos 				 hash, iterations, salt, salt_length));
   1437  1.1  christos 
   1438  1.1  christos 	CHECK(dns_db_createiterator(db, DNS_DB_NSEC3ONLY, &dbit));
   1439  1.1  christos 
   1440  1.1  christos 	result = dns_dbiterator_seek(dbit, hashname);
   1441  1.6  christos 	if (result == ISC_R_NOTFOUND || result == DNS_R_PARTIALMATCH) {
   1442  1.1  christos 		goto success;
   1443  1.6  christos 	}
   1444  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1445  1.1  christos 		goto failure;
   1446  1.6  christos 	}
   1447  1.1  christos 
   1448  1.1  christos 	CHECK(dns_dbiterator_current(dbit, &node, NULL));
   1449  1.1  christos 	CHECK(dns_dbiterator_pause(dbit));
   1450  1.6  christos 	result = dns_db_findrdataset(db, node, version, dns_rdatatype_nsec3, 0,
   1451  1.6  christos 				     (isc_stdtime_t)0, &rdataset, NULL);
   1452  1.1  christos 	dns_db_detachnode(db, &node);
   1453  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1454  1.1  christos 		goto success;
   1455  1.6  christos 	}
   1456  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1457  1.1  christos 		goto failure;
   1458  1.6  christos 	}
   1459  1.1  christos 
   1460  1.1  christos 	/*
   1461  1.1  christos 	 * If we find a existing NSEC3 for this chain then save the
   1462  1.1  christos 	 * next field.
   1463  1.1  christos 	 */
   1464  1.1  christos 	result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1465  1.1  christos 	if (result == ISC_R_SUCCESS) {
   1466  1.1  christos 		next_length = nsec3.next_length;
   1467  1.1  christos 		INSIST(next_length <= sizeof(nexthash));
   1468  1.1  christos 		memmove(nexthash, nsec3.next, next_length);
   1469  1.1  christos 	}
   1470  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1471  1.6  christos 	if (result == ISC_R_NOMORE) {
   1472  1.1  christos 		goto success;
   1473  1.6  christos 	}
   1474  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1475  1.1  christos 		goto failure;
   1476  1.6  christos 	}
   1477  1.1  christos 
   1478  1.1  christos 	/*
   1479  1.1  christos 	 * Find the previous NSEC3 and update it.
   1480  1.1  christos 	 */
   1481  1.1  christos 	pass = 0;
   1482  1.1  christos 	do {
   1483  1.1  christos 		result = dns_dbiterator_prev(dbit);
   1484  1.1  christos 		if (result == ISC_R_NOMORE) {
   1485  1.1  christos 			pass++;
   1486  1.1  christos 			CHECK(dns_dbiterator_last(dbit));
   1487  1.1  christos 		}
   1488  1.1  christos 		CHECK(dns_dbiterator_current(dbit, &node, prev));
   1489  1.1  christos 		CHECK(dns_dbiterator_pause(dbit));
   1490  1.1  christos 		result = dns_db_findrdataset(db, node, version,
   1491  1.1  christos 					     dns_rdatatype_nsec3, 0,
   1492  1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
   1493  1.1  christos 		dns_db_detachnode(db, &node);
   1494  1.6  christos 		if (result != ISC_R_SUCCESS) {
   1495  1.1  christos 			continue;
   1496  1.6  christos 		}
   1497  1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1498  1.1  christos 		if (result == ISC_R_NOMORE) {
   1499  1.1  christos 			dns_rdataset_disassociate(&rdataset);
   1500  1.1  christos 			continue;
   1501  1.1  christos 		}
   1502  1.6  christos 		if (result != ISC_R_SUCCESS) {
   1503  1.1  christos 			goto failure;
   1504  1.6  christos 		}
   1505  1.1  christos 
   1506  1.1  christos 		/*
   1507  1.1  christos 		 * Delete the old previous NSEC3.
   1508  1.1  christos 		 */
   1509  1.1  christos 		CHECK(delnsec3(db, version, prev, nsec3param, diff));
   1510  1.1  christos 
   1511  1.1  christos 		/*
   1512  1.1  christos 		 * Fixup the previous NSEC3.
   1513  1.1  christos 		 */
   1514  1.1  christos 		nsec3.next = nexthash;
   1515  1.1  christos 		nsec3.next_length = (unsigned char)next_length;
   1516  1.6  christos 		if (CREATE(nsec3param->flags)) {
   1517  1.1  christos 			nsec3.flags = nsec3param->flags & DNS_NSEC3FLAG_OPTOUT;
   1518  1.6  christos 		}
   1519  1.1  christos 		isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
   1520  1.1  christos 		CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
   1521  1.1  christos 					   dns_rdatatype_nsec3, &nsec3,
   1522  1.1  christos 					   &buffer));
   1523  1.1  christos 		CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD, prev,
   1524  1.1  christos 					   rdataset.ttl, &rdata, &tuple));
   1525  1.1  christos 		CHECK(do_one_tuple(&tuple, db, version, diff));
   1526  1.1  christos 		dns_rdata_reset(&rdata);
   1527  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1528  1.1  christos 		break;
   1529  1.1  christos 	} while (pass < 2);
   1530  1.1  christos 
   1531  1.1  christos 	/*
   1532  1.1  christos 	 * Delete the old NSEC3 and record the change.
   1533  1.1  christos 	 */
   1534  1.1  christos 	CHECK(delnsec3(db, version, hashname, nsec3param, diff));
   1535  1.1  christos 
   1536  1.1  christos 	/*
   1537  1.1  christos 	 *  Delete NSEC3 records for now non active nodes.
   1538  1.1  christos 	 */
   1539  1.1  christos 	dns_name_init(&empty, NULL);
   1540  1.1  christos 	dns_name_clone(name, &empty);
   1541  1.1  christos 	do {
   1542  1.1  christos 		labels = dns_name_countlabels(&empty) - 1;
   1543  1.6  christos 		if (labels <= dns_name_countlabels(origin)) {
   1544  1.1  christos 			break;
   1545  1.6  christos 		}
   1546  1.1  christos 		dns_name_getlabelsequence(&empty, 1, labels, &empty);
   1547  1.1  christos 		CHECK(deleteit(db, version, &empty, &yesno));
   1548  1.6  christos 		if (!yesno) {
   1549  1.1  christos 			break;
   1550  1.6  christos 		}
   1551  1.1  christos 
   1552  1.6  christos 		CHECK(dns_nsec3_hashname(&fixed, nexthash, &next_length, &empty,
   1553  1.6  christos 					 origin, hash, iterations, salt,
   1554  1.6  christos 					 salt_length));
   1555  1.1  christos 		result = dns_dbiterator_seek(dbit, hashname);
   1556  1.6  christos 		if (result == ISC_R_NOTFOUND || result == DNS_R_PARTIALMATCH) {
   1557  1.1  christos 			goto success;
   1558  1.6  christos 		}
   1559  1.6  christos 		if (result != ISC_R_SUCCESS) {
   1560  1.1  christos 			goto failure;
   1561  1.6  christos 		}
   1562  1.1  christos 
   1563  1.1  christos 		CHECK(dns_dbiterator_current(dbit, &node, NULL));
   1564  1.1  christos 		CHECK(dns_dbiterator_pause(dbit));
   1565  1.1  christos 		result = dns_db_findrdataset(db, node, version,
   1566  1.1  christos 					     dns_rdatatype_nsec3, 0,
   1567  1.6  christos 					     (isc_stdtime_t)0, &rdataset, NULL);
   1568  1.1  christos 		dns_db_detachnode(db, &node);
   1569  1.6  christos 		if (result == ISC_R_NOTFOUND) {
   1570  1.1  christos 			goto success;
   1571  1.6  christos 		}
   1572  1.6  christos 		if (result != ISC_R_SUCCESS) {
   1573  1.1  christos 			goto failure;
   1574  1.6  christos 		}
   1575  1.1  christos 
   1576  1.1  christos 		result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1577  1.1  christos 		if (result == ISC_R_SUCCESS) {
   1578  1.1  christos 			next_length = nsec3.next_length;
   1579  1.1  christos 			INSIST(next_length <= sizeof(nexthash));
   1580  1.1  christos 			memmove(nexthash, nsec3.next, next_length);
   1581  1.1  christos 		}
   1582  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1583  1.6  christos 		if (result == ISC_R_NOMORE) {
   1584  1.1  christos 			goto success;
   1585  1.6  christos 		}
   1586  1.6  christos 		if (result != ISC_R_SUCCESS) {
   1587  1.1  christos 			goto failure;
   1588  1.6  christos 		}
   1589  1.1  christos 
   1590  1.1  christos 		pass = 0;
   1591  1.1  christos 		do {
   1592  1.1  christos 			result = dns_dbiterator_prev(dbit);
   1593  1.1  christos 			if (result == ISC_R_NOMORE) {
   1594  1.1  christos 				pass++;
   1595  1.1  christos 				CHECK(dns_dbiterator_last(dbit));
   1596  1.1  christos 			}
   1597  1.1  christos 			CHECK(dns_dbiterator_current(dbit, &node, prev));
   1598  1.1  christos 			CHECK(dns_dbiterator_pause(dbit));
   1599  1.6  christos 			result = dns_db_findrdataset(
   1600  1.6  christos 				db, node, version, dns_rdatatype_nsec3, 0,
   1601  1.6  christos 				(isc_stdtime_t)0, &rdataset, NULL);
   1602  1.1  christos 			dns_db_detachnode(db, &node);
   1603  1.6  christos 			if (result != ISC_R_SUCCESS) {
   1604  1.1  christos 				continue;
   1605  1.6  christos 			}
   1606  1.1  christos 			result = find_nsec3(&nsec3, &rdataset, nsec3param);
   1607  1.1  christos 			if (result == ISC_R_NOMORE) {
   1608  1.1  christos 				dns_rdataset_disassociate(&rdataset);
   1609  1.1  christos 				continue;
   1610  1.1  christos 			}
   1611  1.6  christos 			if (result != ISC_R_SUCCESS) {
   1612  1.1  christos 				goto failure;
   1613  1.6  christos 			}
   1614  1.1  christos 
   1615  1.1  christos 			/*
   1616  1.1  christos 			 * Delete the old previous NSEC3.
   1617  1.1  christos 			 */
   1618  1.1  christos 			CHECK(delnsec3(db, version, prev, nsec3param, diff));
   1619  1.1  christos 
   1620  1.1  christos 			/*
   1621  1.1  christos 			 * Fixup the previous NSEC3.
   1622  1.1  christos 			 */
   1623  1.1  christos 			nsec3.next = nexthash;
   1624  1.1  christos 			nsec3.next_length = (unsigned char)next_length;
   1625  1.6  christos 			isc_buffer_init(&buffer, nsec3buf, sizeof(nsec3buf));
   1626  1.1  christos 			CHECK(dns_rdata_fromstruct(&rdata, rdataset.rdclass,
   1627  1.1  christos 						   dns_rdatatype_nsec3, &nsec3,
   1628  1.1  christos 						   &buffer));
   1629  1.1  christos 			CHECK(dns_difftuple_create(diff->mctx, DNS_DIFFOP_ADD,
   1630  1.1  christos 						   prev, rdataset.ttl, &rdata,
   1631  1.1  christos 						   &tuple));
   1632  1.1  christos 			CHECK(do_one_tuple(&tuple, db, version, diff));
   1633  1.1  christos 			dns_rdata_reset(&rdata);
   1634  1.1  christos 			dns_rdataset_disassociate(&rdataset);
   1635  1.1  christos 			break;
   1636  1.1  christos 		} while (pass < 2);
   1637  1.1  christos 
   1638  1.1  christos 		INSIST(pass < 2);
   1639  1.1  christos 
   1640  1.1  christos 		/*
   1641  1.1  christos 		 * Delete the old NSEC3 and record the change.
   1642  1.1  christos 		 */
   1643  1.1  christos 		CHECK(delnsec3(db, version, hashname, nsec3param, diff));
   1644  1.1  christos 	} while (1);
   1645  1.1  christos 
   1646  1.6  christos success:
   1647  1.1  christos 	result = ISC_R_SUCCESS;
   1648  1.1  christos 
   1649  1.6  christos failure:
   1650  1.6  christos 	if (dbit != NULL) {
   1651  1.1  christos 		dns_dbiterator_destroy(&dbit);
   1652  1.6  christos 	}
   1653  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1654  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1655  1.6  christos 	}
   1656  1.6  christos 	if (node != NULL) {
   1657  1.1  christos 		dns_db_detachnode(db, &node);
   1658  1.6  christos 	}
   1659  1.1  christos 	return (result);
   1660  1.1  christos }
   1661  1.1  christos 
   1662  1.1  christos isc_result_t
   1663  1.1  christos dns_nsec3_delnsec3s(dns_db_t *db, dns_dbversion_t *version,
   1664  1.6  christos 		    const dns_name_t *name, dns_diff_t *diff) {
   1665  1.1  christos 	return (dns_nsec3_delnsec3sx(db, version, name, 0, diff));
   1666  1.1  christos }
   1667  1.1  christos 
   1668  1.1  christos isc_result_t
   1669  1.1  christos dns_nsec3_delnsec3sx(dns_db_t *db, dns_dbversion_t *version,
   1670  1.6  christos 		     const dns_name_t *name, dns_rdatatype_t privatetype,
   1671  1.6  christos 		     dns_diff_t *diff) {
   1672  1.1  christos 	dns_dbnode_t *node = NULL;
   1673  1.1  christos 	dns_rdata_nsec3param_t nsec3param;
   1674  1.1  christos 	dns_rdataset_t rdataset;
   1675  1.1  christos 	isc_result_t result;
   1676  1.1  christos 
   1677  1.1  christos 	dns_rdataset_init(&rdataset);
   1678  1.1  christos 
   1679  1.1  christos 	/*
   1680  1.1  christos 	 * Find the NSEC3 parameters for this zone.
   1681  1.1  christos 	 */
   1682  1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1683  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1684  1.1  christos 		return (result);
   1685  1.6  christos 	}
   1686  1.1  christos 
   1687  1.1  christos 	result = dns_db_findrdataset(db, node, version,
   1688  1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
   1689  1.6  christos 				     NULL);
   1690  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1691  1.1  christos 		goto try_private;
   1692  1.6  christos 	}
   1693  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1694  1.1  christos 		goto failure;
   1695  1.6  christos 	}
   1696  1.1  christos 
   1697  1.1  christos 	/*
   1698  1.1  christos 	 * Update each active NSEC3 chain.
   1699  1.1  christos 	 */
   1700  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1701  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1702  1.6  christos 	{
   1703  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1704  1.1  christos 
   1705  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1706  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
   1707  1.1  christos 
   1708  1.6  christos 		if (nsec3param.flags != 0) {
   1709  1.1  christos 			continue;
   1710  1.6  christos 		}
   1711  1.1  christos 		/*
   1712  1.1  christos 		 * We have a active chain.  Update it.
   1713  1.1  christos 		 */
   1714  1.1  christos 		CHECK(dns_nsec3_delnsec3(db, version, name, &nsec3param, diff));
   1715  1.1  christos 	}
   1716  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1717  1.1  christos 
   1718  1.6  christos try_private:
   1719  1.6  christos 	if (privatetype == 0) {
   1720  1.1  christos 		goto success;
   1721  1.6  christos 	}
   1722  1.1  christos 	result = dns_db_findrdataset(db, node, version, privatetype, 0, 0,
   1723  1.1  christos 				     &rdataset, NULL);
   1724  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1725  1.1  christos 		goto success;
   1726  1.6  christos 	}
   1727  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1728  1.1  christos 		goto failure;
   1729  1.6  christos 	}
   1730  1.1  christos 
   1731  1.1  christos 	/*
   1732  1.1  christos 	 * Update each NSEC3 chain being built.
   1733  1.1  christos 	 */
   1734  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1735  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1736  1.6  christos 	{
   1737  1.1  christos 		dns_rdata_t rdata1 = DNS_RDATA_INIT;
   1738  1.1  christos 		dns_rdata_t rdata2 = DNS_RDATA_INIT;
   1739  1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
   1740  1.1  christos 
   1741  1.1  christos 		dns_rdataset_current(&rdataset, &rdata1);
   1742  1.6  christos 		if (!dns_nsec3param_fromprivate(&rdata1, &rdata2, buf,
   1743  1.6  christos 						sizeof(buf))) {
   1744  1.1  christos 			continue;
   1745  1.6  christos 		}
   1746  1.1  christos 		CHECK(dns_rdata_tostruct(&rdata2, &nsec3param, NULL));
   1747  1.1  christos 
   1748  1.6  christos 		if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0) {
   1749  1.1  christos 			continue;
   1750  1.6  christos 		}
   1751  1.6  christos 		if (better_param(&rdataset, &rdata2)) {
   1752  1.1  christos 			continue;
   1753  1.6  christos 		}
   1754  1.1  christos 
   1755  1.1  christos 		/*
   1756  1.1  christos 		 * We have a active chain.  Update it.
   1757  1.1  christos 		 */
   1758  1.1  christos 		CHECK(dns_nsec3_delnsec3(db, version, name, &nsec3param, diff));
   1759  1.1  christos 	}
   1760  1.6  christos 	if (result == ISC_R_NOMORE) {
   1761  1.6  christos 	success:
   1762  1.1  christos 		result = ISC_R_SUCCESS;
   1763  1.6  christos 	}
   1764  1.1  christos 
   1765  1.6  christos failure:
   1766  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1767  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1768  1.6  christos 	}
   1769  1.6  christos 	if (node != NULL) {
   1770  1.1  christos 		dns_db_detachnode(db, &node);
   1771  1.6  christos 	}
   1772  1.1  christos 
   1773  1.1  christos 	return (result);
   1774  1.1  christos }
   1775  1.1  christos 
   1776  1.1  christos isc_result_t
   1777  1.6  christos dns_nsec3_active(dns_db_t *db, dns_dbversion_t *version, bool complete,
   1778  1.6  christos 		 bool *answer) {
   1779  1.1  christos 	return (dns_nsec3_activex(db, version, complete, 0, answer));
   1780  1.1  christos }
   1781  1.1  christos 
   1782  1.1  christos isc_result_t
   1783  1.6  christos dns_nsec3_activex(dns_db_t *db, dns_dbversion_t *version, bool complete,
   1784  1.6  christos 		  dns_rdatatype_t privatetype, bool *answer) {
   1785  1.1  christos 	dns_dbnode_t *node = NULL;
   1786  1.1  christos 	dns_rdataset_t rdataset;
   1787  1.1  christos 	dns_rdata_nsec3param_t nsec3param;
   1788  1.1  christos 	isc_result_t result;
   1789  1.1  christos 
   1790  1.1  christos 	REQUIRE(answer != NULL);
   1791  1.1  christos 
   1792  1.1  christos 	dns_rdataset_init(&rdataset);
   1793  1.1  christos 
   1794  1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1795  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1796  1.1  christos 		return (result);
   1797  1.6  christos 	}
   1798  1.1  christos 
   1799  1.1  christos 	result = dns_db_findrdataset(db, node, version,
   1800  1.6  christos 				     dns_rdatatype_nsec3param, 0, 0, &rdataset,
   1801  1.6  christos 				     NULL);
   1802  1.1  christos 
   1803  1.6  christos 	if (result == ISC_R_NOTFOUND) {
   1804  1.1  christos 		goto try_private;
   1805  1.6  christos 	}
   1806  1.1  christos 
   1807  1.1  christos 	if (result != ISC_R_SUCCESS) {
   1808  1.1  christos 		dns_db_detachnode(db, &node);
   1809  1.1  christos 		return (result);
   1810  1.1  christos 	}
   1811  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1812  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1813  1.6  christos 	{
   1814  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1815  1.1  christos 
   1816  1.1  christos 		dns_rdataset_current(&rdataset, &rdata);
   1817  1.1  christos 		result = dns_rdata_tostruct(&rdata, &nsec3param, NULL);
   1818  1.1  christos 		RUNTIME_CHECK(result == ISC_R_SUCCESS);
   1819  1.1  christos 
   1820  1.6  christos 		if (nsec3param.flags == 0) {
   1821  1.1  christos 			break;
   1822  1.6  christos 		}
   1823  1.1  christos 	}
   1824  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1825  1.1  christos 	if (result == ISC_R_SUCCESS) {
   1826  1.1  christos 		dns_db_detachnode(db, &node);
   1827  1.3  christos 		*answer = true;
   1828  1.1  christos 		return (ISC_R_SUCCESS);
   1829  1.1  christos 	}
   1830  1.6  christos 	if (result == ISC_R_NOMORE) {
   1831  1.3  christos 		*answer = false;
   1832  1.6  christos 	}
   1833  1.1  christos 
   1834  1.6  christos try_private:
   1835  1.1  christos 	if (privatetype == 0 || complete) {
   1836  1.3  christos 		*answer = false;
   1837  1.1  christos 		return (ISC_R_SUCCESS);
   1838  1.1  christos 	}
   1839  1.1  christos 	result = dns_db_findrdataset(db, node, version, privatetype, 0, 0,
   1840  1.1  christos 				     &rdataset, NULL);
   1841  1.1  christos 
   1842  1.1  christos 	dns_db_detachnode(db, &node);
   1843  1.1  christos 	if (result == ISC_R_NOTFOUND) {
   1844  1.3  christos 		*answer = false;
   1845  1.1  christos 		return (ISC_R_SUCCESS);
   1846  1.1  christos 	}
   1847  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1848  1.1  christos 		return (result);
   1849  1.6  christos 	}
   1850  1.1  christos 
   1851  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1852  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1853  1.6  christos 	{
   1854  1.1  christos 		dns_rdata_t rdata1 = DNS_RDATA_INIT;
   1855  1.1  christos 		dns_rdata_t rdata2 = DNS_RDATA_INIT;
   1856  1.1  christos 		unsigned char buf[DNS_NSEC3PARAM_BUFFERSIZE];
   1857  1.1  christos 
   1858  1.1  christos 		dns_rdataset_current(&rdataset, &rdata1);
   1859  1.6  christos 		if (!dns_nsec3param_fromprivate(&rdata1, &rdata2, buf,
   1860  1.6  christos 						sizeof(buf))) {
   1861  1.1  christos 			continue;
   1862  1.6  christos 		}
   1863  1.1  christos 		result = dns_rdata_tostruct(&rdata2, &nsec3param, NULL);
   1864  1.1  christos 		RUNTIME_CHECK(result == ISC_R_SUCCESS);
   1865  1.1  christos 
   1866  1.6  christos 		if (!complete && CREATE(nsec3param.flags)) {
   1867  1.1  christos 			break;
   1868  1.6  christos 		}
   1869  1.1  christos 	}
   1870  1.1  christos 	dns_rdataset_disassociate(&rdataset);
   1871  1.1  christos 	if (result == ISC_R_SUCCESS) {
   1872  1.3  christos 		*answer = true;
   1873  1.1  christos 		result = ISC_R_SUCCESS;
   1874  1.1  christos 	}
   1875  1.1  christos 	if (result == ISC_R_NOMORE) {
   1876  1.3  christos 		*answer = false;
   1877  1.1  christos 		result = ISC_R_SUCCESS;
   1878  1.1  christos 	}
   1879  1.1  christos 
   1880  1.1  christos 	return (result);
   1881  1.1  christos }
   1882  1.1  christos 
   1883  1.1  christos isc_result_t
   1884  1.6  christos dns_nsec3_maxiterations(dns_db_t *db, dns_dbversion_t *version, isc_mem_t *mctx,
   1885  1.6  christos 			unsigned int *iterationsp) {
   1886  1.1  christos 	dns_dbnode_t *node = NULL;
   1887  1.1  christos 	dns_rdataset_t rdataset;
   1888  1.1  christos 	dst_key_t *key = NULL;
   1889  1.1  christos 	isc_buffer_t buffer;
   1890  1.1  christos 	isc_result_t result;
   1891  1.1  christos 	unsigned int bits, minbits = 4096;
   1892  1.1  christos 
   1893  1.1  christos 	result = dns_db_getoriginnode(db, &node);
   1894  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1895  1.1  christos 		return (result);
   1896  1.6  christos 	}
   1897  1.1  christos 
   1898  1.1  christos 	dns_rdataset_init(&rdataset);
   1899  1.6  christos 	result = dns_db_findrdataset(db, node, version, dns_rdatatype_dnskey, 0,
   1900  1.6  christos 				     0, &rdataset, NULL);
   1901  1.1  christos 	dns_db_detachnode(db, &node);
   1902  1.1  christos 	if (result == ISC_R_NOTFOUND) {
   1903  1.1  christos 		*iterationsp = 0;
   1904  1.1  christos 		return (ISC_R_SUCCESS);
   1905  1.1  christos 	}
   1906  1.6  christos 	if (result != ISC_R_SUCCESS) {
   1907  1.1  christos 		goto failure;
   1908  1.6  christos 	}
   1909  1.1  christos 
   1910  1.6  christos 	for (result = dns_rdataset_first(&rdataset); result == ISC_R_SUCCESS;
   1911  1.6  christos 	     result = dns_rdataset_next(&rdataset))
   1912  1.6  christos 	{
   1913  1.1  christos 		dns_rdata_t rdata = DNS_RDATA_INIT;
   1914  1.4  christos 		dns_rdataset_current(&rdataset, &rdata);
   1915  1.4  christos 
   1916  1.4  christos 		REQUIRE(rdata.type == dns_rdatatype_key ||
   1917  1.4  christos 			rdata.type == dns_rdatatype_dnskey);
   1918  1.4  christos 		REQUIRE(rdata.length > 3);
   1919  1.4  christos 
   1920  1.4  christos 		/* Skip unsupported algorithms when
   1921  1.4  christos 		 * calculating the maximum iterations.
   1922  1.4  christos 		 */
   1923  1.6  christos 		if (!dst_algorithm_supported(rdata.data[3])) {
   1924  1.4  christos 			continue;
   1925  1.6  christos 		}
   1926  1.1  christos 
   1927  1.1  christos 		isc_buffer_init(&buffer, rdata.data, rdata.length);
   1928  1.1  christos 		isc_buffer_add(&buffer, rdata.length);
   1929  1.1  christos 		CHECK(dst_key_fromdns(dns_db_origin(db), rdataset.rdclass,
   1930  1.1  christos 				      &buffer, mctx, &key));
   1931  1.1  christos 		bits = dst_key_size(key);
   1932  1.1  christos 		dst_key_free(&key);
   1933  1.6  christos 		if (minbits > bits) {
   1934  1.1  christos 			minbits = bits;
   1935  1.6  christos 		}
   1936  1.1  christos 	}
   1937  1.6  christos 	if (result != ISC_R_NOMORE) {
   1938  1.1  christos 		goto failure;
   1939  1.6  christos 	}
   1940  1.1  christos 
   1941  1.6  christos 	if (minbits <= 1024) {
   1942  1.1  christos 		*iterationsp = 150;
   1943  1.6  christos 	} else if (minbits <= 2048) {
   1944  1.1  christos 		*iterationsp = 500;
   1945  1.6  christos 	} else {
   1946  1.1  christos 		*iterationsp = 2500;
   1947  1.6  christos 	}
   1948  1.1  christos 	result = ISC_R_SUCCESS;
   1949  1.1  christos 
   1950  1.6  christos failure:
   1951  1.6  christos 	if (dns_rdataset_isassociated(&rdataset)) {
   1952  1.1  christos 		dns_rdataset_disassociate(&rdataset);
   1953  1.6  christos 	}
   1954  1.1  christos 	return (result);
   1955  1.1  christos }
   1956  1.1  christos 
   1957  1.1  christos isc_result_t
   1958  1.1  christos dns_nsec3_noexistnodata(dns_rdatatype_t type, const dns_name_t *name,
   1959  1.1  christos 			const dns_name_t *nsec3name, dns_rdataset_t *nsec3set,
   1960  1.6  christos 			dns_name_t *zonename, bool *exists, bool *data,
   1961  1.6  christos 			bool *optout, bool *unknown, bool *setclosest,
   1962  1.3  christos 			bool *setnearest, dns_name_t *closest,
   1963  1.6  christos 			dns_name_t *nearest, dns_nseclog_t logit, void *arg) {
   1964  1.1  christos 	char namebuf[DNS_NAME_FORMATSIZE];
   1965  1.1  christos 	dns_fixedname_t fzone;
   1966  1.1  christos 	dns_fixedname_t qfixed;
   1967  1.1  christos 	dns_label_t hashlabel;
   1968  1.1  christos 	dns_name_t *qname;
   1969  1.1  christos 	dns_name_t *zone;
   1970  1.1  christos 	dns_rdata_nsec3_t nsec3;
   1971  1.1  christos 	dns_rdata_t rdata = DNS_RDATA_INIT;
   1972  1.1  christos 	int order;
   1973  1.1  christos 	int scope;
   1974  1.3  christos 	bool atparent;
   1975  1.3  christos 	bool first;
   1976  1.3  christos 	bool ns;
   1977  1.3  christos 	bool soa;
   1978  1.1  christos 	isc_buffer_t buffer;
   1979  1.1  christos 	isc_result_t answer = ISC_R_IGNORE;
   1980  1.1  christos 	isc_result_t result;
   1981  1.1  christos 	unsigned char hash[NSEC3_MAX_HASH_LENGTH];
   1982  1.1  christos 	unsigned char owner[NSEC3_MAX_HASH_LENGTH];
   1983  1.1  christos 	unsigned int length;
   1984  1.1  christos 	unsigned int qlabels;
   1985  1.1  christos 	unsigned int zlabels;
   1986  1.1  christos 
   1987  1.1  christos 	REQUIRE((exists == NULL && data == NULL) ||
   1988  1.1  christos 		(exists != NULL && data != NULL));
   1989  1.1  christos 	REQUIRE(nsec3set != NULL && nsec3set->type == dns_rdatatype_nsec3);
   1990  1.1  christos 	REQUIRE((setclosest == NULL && closest == NULL) ||
   1991  1.1  christos 		(setclosest != NULL && closest != NULL));
   1992  1.1  christos 	REQUIRE((setnearest == NULL && nearest == NULL) ||
   1993  1.1  christos 		(setnearest != NULL && nearest != NULL));
   1994  1.1  christos 
   1995  1.1  christos 	result = dns_rdataset_first(nsec3set);
   1996  1.1  christos 	if (result != ISC_R_SUCCESS) {
   1997  1.1  christos 		(*logit)(arg, ISC_LOG_DEBUG(3), "failure processing NSEC3 set");
   1998  1.1  christos 		return (result);
   1999  1.1  christos 	}
   2000  1.1  christos 
   2001  1.1  christos 	dns_rdataset_current(nsec3set, &rdata);
   2002  1.1  christos 
   2003  1.1  christos 	result = dns_rdata_tostruct(&rdata, &nsec3, NULL);
   2004  1.6  christos 	if (result != ISC_R_SUCCESS) {
   2005  1.1  christos 		return (result);
   2006  1.6  christos 	}
   2007  1.1  christos 
   2008  1.1  christos 	(*logit)(arg, ISC_LOG_DEBUG(3), "looking for relevant NSEC3");
   2009  1.1  christos 
   2010  1.1  christos 	zone = dns_fixedname_initname(&fzone);
   2011  1.1  christos 	zlabels = dns_name_countlabels(nsec3name);
   2012  1.1  christos 
   2013  1.1  christos 	/*
   2014  1.1  christos 	 * NSEC3 records must have two or more labels to be valid.
   2015  1.1  christos 	 */
   2016  1.6  christos 	if (zlabels < 2) {
   2017  1.1  christos 		return (ISC_R_IGNORE);
   2018  1.6  christos 	}
   2019  1.1  christos 
   2020  1.1  christos 	/*
   2021  1.1  christos 	 * Strip off the NSEC3 hash to get the zone.
   2022  1.1  christos 	 */
   2023  1.1  christos 	zlabels--;
   2024  1.1  christos 	dns_name_split(nsec3name, zlabels, NULL, zone);
   2025  1.1  christos 
   2026  1.1  christos 	/*
   2027  1.1  christos 	 * If not below the zone name we can ignore this record.
   2028  1.1  christos 	 */
   2029  1.6  christos 	if (!dns_name_issubdomain(name, zone)) {
   2030  1.1  christos 		return (ISC_R_IGNORE);
   2031  1.6  christos 	}
   2032  1.1  christos 
   2033  1.1  christos 	/*
   2034  1.1  christos 	 * Is this zone the same or deeper than the current zone?
   2035  1.1  christos 	 */
   2036  1.1  christos 	if (dns_name_countlabels(zonename) == 0 ||
   2037  1.6  christos 	    dns_name_issubdomain(zone, zonename)) {
   2038  1.5  christos 		dns_name_copynf(zone, zonename);
   2039  1.6  christos 	}
   2040  1.1  christos 
   2041  1.6  christos 	if (!dns_name_equal(zone, zonename)) {
   2042  1.1  christos 		return (ISC_R_IGNORE);
   2043  1.6  christos 	}
   2044  1.1  christos 
   2045  1.1  christos 	/*
   2046  1.1  christos 	 * Are we only looking for the most enclosing zone?
   2047  1.1  christos 	 */
   2048  1.6  christos 	if (exists == NULL || data == NULL) {
   2049  1.1  christos 		return (ISC_R_SUCCESS);
   2050  1.6  christos 	}
   2051  1.1  christos 
   2052  1.1  christos 	/*
   2053  1.1  christos 	 * Only set unknown once we are sure that this NSEC3 is from
   2054  1.1  christos 	 * the deepest covering zone.
   2055  1.1  christos 	 */
   2056  1.1  christos 	if (!dns_nsec3_supportedhash(nsec3.hash)) {
   2057  1.6  christos 		if (unknown != NULL) {
   2058  1.3  christos 			*unknown = true;
   2059  1.6  christos 		}
   2060  1.1  christos 		return (ISC_R_IGNORE);
   2061  1.1  christos 	}
   2062  1.1  christos 
   2063  1.1  christos 	/*
   2064  1.1  christos 	 * Recover the hash from the first label.
   2065  1.1  christos 	 */
   2066  1.1  christos 	dns_name_getlabel(nsec3name, 0, &hashlabel);
   2067  1.1  christos 	isc_region_consume(&hashlabel, 1);
   2068  1.1  christos 	isc_buffer_init(&buffer, owner, sizeof(owner));
   2069  1.1  christos 	result = isc_base32hex_decoderegion(&hashlabel, &buffer);
   2070  1.6  christos 	if (result != ISC_R_SUCCESS) {
   2071  1.1  christos 		return (result);
   2072  1.6  christos 	}
   2073  1.1  christos 
   2074  1.1  christos 	/*
   2075  1.1  christos 	 * The hash lengths should match.  If not ignore the record.
   2076  1.1  christos 	 */
   2077  1.6  christos 	if (isc_buffer_usedlength(&buffer) != nsec3.next_length) {
   2078  1.1  christos 		return (ISC_R_IGNORE);
   2079  1.6  christos 	}
   2080  1.1  christos 
   2081  1.1  christos 	/*
   2082  1.1  christos 	 * Work out what this NSEC3 covers.
   2083  1.1  christos 	 * Inside (<0) or outside (>=0).
   2084  1.1  christos 	 */
   2085  1.3  christos 	scope = memcmp(owner, nsec3.next, nsec3.next_length);
   2086  1.1  christos 
   2087  1.1  christos 	/*
   2088  1.1  christos 	 * Prepare to compute all the hashes.
   2089  1.1  christos 	 */
   2090  1.1  christos 	qname = dns_fixedname_initname(&qfixed);
   2091  1.1  christos 	dns_name_downcase(name, qname, NULL);
   2092  1.1  christos 	qlabels = dns_name_countlabels(qname);
   2093  1.3  christos 	first = true;
   2094  1.1  christos 
   2095  1.1  christos 	while (qlabels >= zlabels) {
   2096  1.1  christos 		length = isc_iterated_hash(hash, nsec3.hash, nsec3.iterations,
   2097  1.1  christos 					   nsec3.salt, nsec3.salt_length,
   2098  1.1  christos 					   qname->ndata, qname->length);
   2099  1.1  christos 		/*
   2100  1.1  christos 		 * The computed hash length should match.
   2101  1.1  christos 		 */
   2102  1.1  christos 		if (length != nsec3.next_length) {
   2103  1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2104  1.6  christos 				 "ignoring NSEC bad length %u vs %u", length,
   2105  1.6  christos 				 nsec3.next_length);
   2106  1.1  christos 			return (ISC_R_IGNORE);
   2107  1.1  christos 		}
   2108  1.1  christos 
   2109  1.3  christos 		order = memcmp(hash, owner, length);
   2110  1.1  christos 		if (first && order == 0) {
   2111  1.1  christos 			/*
   2112  1.1  christos 			 * The hashes are the same.
   2113  1.1  christos 			 */
   2114  1.1  christos 			atparent = dns_rdatatype_atparent(type);
   2115  1.1  christos 			ns = dns_nsec3_typepresent(&rdata, dns_rdatatype_ns);
   2116  1.1  christos 			soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa);
   2117  1.1  christos 			if (ns && !soa) {
   2118  1.1  christos 				if (!atparent) {
   2119  1.1  christos 					/*
   2120  1.1  christos 					 * This NSEC3 record is from somewhere
   2121  1.1  christos 					 * higher in the DNS, and at the
   2122  1.1  christos 					 * parent of a delegation. It can not
   2123  1.1  christos 					 * be legitimately used here.
   2124  1.1  christos 					 */
   2125  1.1  christos 					(*logit)(arg, ISC_LOG_DEBUG(3),
   2126  1.1  christos 						 "ignoring parent NSEC3");
   2127  1.1  christos 					return (ISC_R_IGNORE);
   2128  1.1  christos 				}
   2129  1.1  christos 			} else if (atparent && ns && soa) {
   2130  1.1  christos 				/*
   2131  1.1  christos 				 * This NSEC3 record is from the child.
   2132  1.1  christos 				 * It can not be legitimately used here.
   2133  1.1  christos 				 */
   2134  1.1  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2135  1.1  christos 					 "ignoring child NSEC3");
   2136  1.1  christos 				return (ISC_R_IGNORE);
   2137  1.1  christos 			}
   2138  1.1  christos 			if (type == dns_rdatatype_cname ||
   2139  1.1  christos 			    type == dns_rdatatype_nxt ||
   2140  1.1  christos 			    type == dns_rdatatype_nsec ||
   2141  1.1  christos 			    type == dns_rdatatype_key ||
   2142  1.6  christos 			    !dns_nsec3_typepresent(&rdata, dns_rdatatype_cname))
   2143  1.6  christos 			{
   2144  1.3  christos 				*exists = true;
   2145  1.1  christos 				*data = dns_nsec3_typepresent(&rdata, type);
   2146  1.1  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2147  1.1  christos 					 "NSEC3 proves name exists (owner) "
   2148  1.6  christos 					 "data=%d",
   2149  1.6  christos 					 *data);
   2150  1.1  christos 				return (ISC_R_SUCCESS);
   2151  1.1  christos 			}
   2152  1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2153  1.1  christos 				 "NSEC3 proves CNAME exists");
   2154  1.1  christos 			return (ISC_R_IGNORE);
   2155  1.1  christos 		}
   2156  1.1  christos 
   2157  1.1  christos 		if (order == 0 &&
   2158  1.1  christos 		    dns_nsec3_typepresent(&rdata, dns_rdatatype_ns) &&
   2159  1.1  christos 		    !dns_nsec3_typepresent(&rdata, dns_rdatatype_soa))
   2160  1.1  christos 		{
   2161  1.1  christos 			/*
   2162  1.1  christos 			 * This NSEC3 record is from somewhere higher in
   2163  1.1  christos 			 * the DNS, and at the parent of a delegation.
   2164  1.1  christos 			 * It can not be legitimately used here.
   2165  1.1  christos 			 */
   2166  1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2167  1.1  christos 				 "ignoring parent NSEC3");
   2168  1.1  christos 			return (ISC_R_IGNORE);
   2169  1.1  christos 		}
   2170  1.1  christos 
   2171  1.1  christos 		/*
   2172  1.1  christos 		 * Potential closest encloser.
   2173  1.1  christos 		 */
   2174  1.1  christos 		if (order == 0) {
   2175  1.1  christos 			if (closest != NULL &&
   2176  1.1  christos 			    (dns_name_countlabels(closest) == 0 ||
   2177  1.1  christos 			     dns_name_issubdomain(qname, closest)) &&
   2178  1.1  christos 			    !dns_nsec3_typepresent(&rdata, dns_rdatatype_ds) &&
   2179  1.6  christos 			    !dns_nsec3_typepresent(&rdata,
   2180  1.6  christos 						   dns_rdatatype_dname) &&
   2181  1.1  christos 			    (dns_nsec3_typepresent(&rdata, dns_rdatatype_soa) ||
   2182  1.1  christos 			     !dns_nsec3_typepresent(&rdata, dns_rdatatype_ns)))
   2183  1.1  christos 			{
   2184  1.1  christos 				dns_name_format(qname, namebuf,
   2185  1.1  christos 						sizeof(namebuf));
   2186  1.1  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2187  1.1  christos 					 "NSEC3 indicates potential closest "
   2188  1.6  christos 					 "encloser: '%s'",
   2189  1.6  christos 					 namebuf);
   2190  1.5  christos 				dns_name_copynf(qname, closest);
   2191  1.3  christos 				*setclosest = true;
   2192  1.1  christos 			}
   2193  1.1  christos 			dns_name_format(qname, namebuf, sizeof(namebuf));
   2194  1.1  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2195  1.1  christos 				 "NSEC3 at super-domain %s", namebuf);
   2196  1.1  christos 			return (answer);
   2197  1.1  christos 		}
   2198  1.1  christos 
   2199  1.1  christos 		/*
   2200  1.1  christos 		 * Find if the name does not exist.
   2201  1.1  christos 		 *
   2202  1.1  christos 		 * We continue as we need to find the name closest to the
   2203  1.1  christos 		 * closest encloser that doesn't exist.
   2204  1.1  christos 		 *
   2205  1.1  christos 		 * We also need to continue to ensure that we are not
   2206  1.1  christos 		 * proving the non-existence of a record in a sub-zone.
   2207  1.1  christos 		 * If that would be the case we will return ISC_R_IGNORE
   2208  1.1  christos 		 * above.
   2209  1.1  christos 		 */
   2210  1.1  christos 		if ((scope < 0 && order > 0 &&
   2211  1.1  christos 		     memcmp(hash, nsec3.next, length) < 0) ||
   2212  1.6  christos 		    (scope >= 0 &&
   2213  1.6  christos 		     (order > 0 || memcmp(hash, nsec3.next, length) < 0)))
   2214  1.1  christos 		{
   2215  1.1  christos 			dns_name_format(qname, namebuf, sizeof(namebuf));
   2216  1.6  christos 			(*logit)(arg, ISC_LOG_DEBUG(3),
   2217  1.6  christos 				 "NSEC3 proves "
   2218  1.6  christos 				 "name does not exist: '%s'",
   2219  1.6  christos 				 namebuf);
   2220  1.1  christos 			if (nearest != NULL &&
   2221  1.1  christos 			    (dns_name_countlabels(nearest) == 0 ||
   2222  1.6  christos 			     dns_name_issubdomain(nearest, qname)))
   2223  1.6  christos 			{
   2224  1.5  christos 				dns_name_copynf(qname, nearest);
   2225  1.3  christos 				*setnearest = true;
   2226  1.1  christos 			}
   2227  1.1  christos 
   2228  1.3  christos 			*exists = false;
   2229  1.3  christos 			*data = false;
   2230  1.1  christos 			if (optout != NULL) {
   2231  1.6  christos 				*optout = ((nsec3.flags &
   2232  1.6  christos 					    DNS_NSEC3FLAG_OPTOUT) != 0);
   2233  1.3  christos 				(*logit)(arg, ISC_LOG_DEBUG(3),
   2234  1.6  christos 					 (*optout ? "NSEC3 indicates optout"
   2235  1.6  christos 						  : "NSEC3 indicates secure "
   2236  1.6  christos 						    "range"));
   2237  1.1  christos 			}
   2238  1.1  christos 			answer = ISC_R_SUCCESS;
   2239  1.1  christos 		}
   2240  1.1  christos 
   2241  1.1  christos 		qlabels--;
   2242  1.6  christos 		if (qlabels > 0) {
   2243  1.1  christos 			dns_name_split(qname, qlabels, NULL, qname);
   2244  1.6  christos 		}
   2245  1.3  christos 		first = false;
   2246  1.1  christos 	}
   2247  1.1  christos 	return (answer);
   2248  1.1  christos }
   2249