/* $OpenBSD: as.c,v 1.13 2023/10/13 12:06:49 job Exp $ */ /* * Copyright (c) 2019 Kristaps Dzonsons * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include "extern.h" /* Parse a uint32_t AS identifier from an ASN1_INTEGER. */ int as_id_parse(const ASN1_INTEGER *v, uint32_t *out) { uint64_t res = 0; if (!ASN1_INTEGER_get_uint64(&res, v)) return 0; if (res > UINT32_MAX) return 0; *out = res; return 1; } /* * Given a newly-parsed AS number or range "a", make sure that "a" does * not overlap with any other numbers or ranges in the "as" array. * This is defined by RFC 3779 section 3.2.3.4. * Returns zero on failure, non-zero on success. */ int as_check_overlap(const struct cert_as *a, const char *fn, const struct cert_as *as, size_t asz, int quiet) { size_t i; /* We can have only one inheritance statement. */ if (asz && (a->type == CERT_AS_INHERIT || as[0].type == CERT_AS_INHERIT)) { if (quiet) return 0; warnx("%s: RFC 3779 section 3.2.3.3: " "cannot have inheritance and multiple ASnum or " "multiple inheritance", fn); return 0; } /* Now check for overlaps between singletons/ranges. */ for (i = 0; i < asz; i++) switch (as[i].type) { case CERT_AS_ID: switch (a->type) { case CERT_AS_ID: if (a->id != as[i].id) break; if (quiet) return 0; warnx("%s: RFC 3779 section 3.2.3.4: " "cannot have overlapping ASnum", fn); return 0; case CERT_AS_RANGE: if (as->range.min > as[i].id || as->range.max < as[i].id) break; if (quiet) return 0; warnx("%s: RFC 3779 section 3.2.3.4: " "cannot have overlapping ASnum", fn); return 0; default: abort(); } break; case CERT_AS_RANGE: switch (a->type) { case CERT_AS_ID: if (as[i].range.min > a->id || as[i].range.max < a->id) break; if (quiet) return 0; warnx("%s: RFC 3779 section 3.2.3.4: " "cannot have overlapping ASnum", fn); return 0; case CERT_AS_RANGE: if (a->range.max < as[i].range.min || a->range.min > as[i].range.max) break; if (quiet) return 0; warnx("%s: RFC 3779 section 3.2.3.4: " "cannot have overlapping ASnum", fn); return 0; default: abort(); } break; default: abort(); } return 1; } /* * See if a given AS range (which may be the same number, in the case of * singleton AS identifiers) is covered by the AS numbers or ranges * specified in the "as" array. * Return <0 if there is no cover, 0 if we're inheriting, >0 if there is. */ int as_check_covered(uint32_t min, uint32_t max, const struct cert_as *as, size_t asz) { size_t i; uint32_t amin, amax; for (i = 0; i < asz; i++) { if (as[i].type == CERT_AS_INHERIT) return 0; amin = as[i].type == CERT_AS_RANGE ? as[i].range.min : as[i].id; amax = as[i].type == CERT_AS_RANGE ? as[i].range.max : as[i].id; if (min >= amin && max <= amax) return 1; } return -1; } void as_warn(const char *fn, const struct cert_as *cert, const char *msg) { switch (cert->type) { case CERT_AS_ID: warnx("%s: AS %u: %s", fn, cert->id, msg); break; case CERT_AS_INHERIT: warnx("%s: AS (inherit): %s", fn, msg); break; case CERT_AS_RANGE: warnx("%s: AS range %u--%u: %s", fn, cert->range.min, cert->range.max, msg); break; default: warnx("%s: corrupt cert", fn); break; } }