str2wire.c revision 356345
1/**
2 * str2wire.c - read txt presentation of RRs
3 *
4 * (c) NLnet Labs, 2005-2006
5 *
6 * See the file LICENSE for the license
7 */
8
9/**
10 * \file
11 *
12 * Parses text to wireformat.
13 */
14#include "config.h"
15#include "sldns/str2wire.h"
16#include "sldns/wire2str.h"
17#include "sldns/sbuffer.h"
18#include "sldns/parse.h"
19#include "sldns/parseutil.h"
20#include <ctype.h>
21#ifdef HAVE_TIME_H
22#include <time.h>
23#endif
24#ifdef HAVE_NETDB_H
25#include <netdb.h>
26#endif
27
28/** return an error */
29#define RET_ERR(e, off) ((int)((e)|((off)<<LDNS_WIREPARSE_SHIFT)))
30/** Move parse error but keep its ID */
31#define RET_ERR_SHIFT(e, move) RET_ERR(LDNS_WIREPARSE_ERROR(e), LDNS_WIREPARSE_OFFSET(e)+(move));
32#define LDNS_IP6ADDRLEN      (128/8)
33
34/*
35 * No special care is taken, all dots are translated into
36 * label separators.
37 * @param rel: true if the domain is not absolute (not terminated in .).
38 * 	The output is then still terminated with a '0' rootlabel.
39 */
40static int sldns_str2wire_dname_buf_rel(const char* str, uint8_t* buf,
41	size_t* olen, int* rel)
42{
43	size_t len;
44
45	const char *s;
46	uint8_t *q, *pq, label_len;
47
48	if(rel) *rel = 0;
49	len = strlen((char*)str);
50	/* octet representation can make strings a lot longer than actual length */
51	if (len > LDNS_MAX_DOMAINLEN * 4) {
52		return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, 0);
53	}
54	if (0 == len) {
55		return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, 0);
56	}
57
58	/* root label */
59	if (1 == len && *str == '.') {
60		if(*olen < 1)
61			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
62		buf[0] = 0;
63		*olen = 1;
64		return LDNS_WIREPARSE_ERR_OK;
65	}
66
67	/* get on with the rest */
68
69	/* s is on the current character in the string
70         * pq points to where the labellength is going to go
71         * label_len keeps track of the current label's length
72	 * q builds the dname inside the buf array
73	 */
74	len = 0;
75	if(*olen < 1)
76		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
77	q = buf+1;
78	pq = buf;
79	label_len = 0;
80	for (s = str; *s; s++, q++) {
81		if (q >= buf + *olen)
82			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
83		if (q > buf + LDNS_MAX_DOMAINLEN)
84			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
85		switch (*s) {
86		case '.':
87			if (label_len > LDNS_MAX_LABELLEN) {
88				return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
89			}
90			if (label_len == 0) {
91				return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
92			}
93			len += label_len + 1;
94			*q = 0;
95			*pq = label_len;
96			label_len = 0;
97			pq = q;
98			break;
99		case '\\':
100			/* octet value or literal char */
101			s += 1;
102			if (!sldns_parse_escape(q, &s)) {
103				*q = 0;
104				return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, q-buf);
105			}
106			s -= 1;
107			label_len++;
108			break;
109		default:
110			*q = (uint8_t)*s;
111			label_len++;
112		}
113	}
114
115	/* add root label if last char was not '.' */
116	if(label_len != 0) {
117		if(rel) *rel = 1;
118		if (q >= buf + *olen)
119			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
120		if (q > buf + LDNS_MAX_DOMAINLEN) {
121			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
122		}
123                if (label_len > LDNS_MAX_LABELLEN) {
124                        return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
125                }
126                if (label_len == 0) { /* label_len 0 but not . at end? */
127                        return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
128                }
129		len += label_len + 1;
130		*pq = label_len;
131		*q = 0;
132	}
133	len++;
134	*olen = len;
135
136	return LDNS_WIREPARSE_ERR_OK;
137}
138
139int sldns_str2wire_dname_buf(const char* str, uint8_t* buf, size_t* len)
140{
141	return sldns_str2wire_dname_buf_rel(str, buf, len, NULL);
142}
143
144int sldns_str2wire_dname_buf_origin(const char* str, uint8_t* buf, size_t* len,
145	uint8_t* origin, size_t origin_len)
146{
147	size_t dlen = *len;
148	int rel = 0;
149	int s = sldns_str2wire_dname_buf_rel(str, buf, &dlen, &rel);
150	if(s) return s;
151
152	if(rel && origin && dlen > 0) {
153		if((unsigned)dlen >= 0x00ffffffU ||
154			(unsigned)origin_len >= 0x00ffffffU)
155			/* guard against integer overflow in addition */
156			return RET_ERR(LDNS_WIREPARSE_ERR_GENERAL, *len);
157		if(dlen + origin_len - 1 > LDNS_MAX_DOMAINLEN)
158			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW,
159				LDNS_MAX_DOMAINLEN);
160		if(dlen + origin_len - 1 > *len)
161			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
162				*len);
163		memmove(buf+dlen-1, origin, origin_len);
164		*len = dlen + origin_len - 1;
165	} else
166		*len = dlen;
167	return LDNS_WIREPARSE_ERR_OK;
168}
169
170uint8_t* sldns_str2wire_dname(const char* str, size_t* len)
171{
172	uint8_t dname[LDNS_MAX_DOMAINLEN+1];
173	*len = sizeof(dname);
174	if(sldns_str2wire_dname_buf(str, dname, len) == 0) {
175		uint8_t* r;
176		if(*len > sizeof(dname)) return NULL;
177		r = (uint8_t*)malloc(*len);
178		if(r) return memcpy(r, dname, *len);
179	}
180	*len = 0;
181	return NULL;
182}
183
184/** read owner name */
185static int
186rrinternal_get_owner(sldns_buffer* strbuf, uint8_t* rr, size_t* len,
187	size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
188	size_t prev_len, char* token, size_t token_len)
189{
190	/* split the rr in its parts -1 signals trouble */
191	if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
192		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
193			sldns_buffer_position(strbuf));
194	}
195
196	if(token_len < 2) /* make sure there is space to read "@" or "" */
197		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
198			sldns_buffer_position(strbuf));
199	if(token[0]=='@' && token[1]=='\0') {
200		uint8_t* tocopy;
201		if (origin) {
202			*dname_len = origin_len;
203			tocopy = origin;
204		} else if (prev) {
205			*dname_len = prev_len;
206			tocopy = prev;
207		} else {
208			/* default to root */
209			*dname_len = 1;
210			tocopy = (uint8_t*)"\0";
211		}
212		if(*len < *dname_len)
213			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
214				sldns_buffer_position(strbuf));
215		memmove(rr, tocopy, *dname_len);
216	} else if(*token == '\0') {
217		/* no ownername was given, try prev, if that fails
218		 * origin, else default to root */
219		uint8_t* tocopy;
220		if(prev) {
221			*dname_len = prev_len;
222			tocopy = prev;
223		} else if(origin) {
224			*dname_len = origin_len;
225			tocopy = origin;
226		} else {
227			*dname_len = 1;
228			tocopy = (uint8_t*)"\0";
229		}
230		if(*len < *dname_len)
231			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
232				sldns_buffer_position(strbuf));
233		memmove(rr, tocopy, *dname_len);
234	} else {
235		size_t dlen = *len;
236		int s = sldns_str2wire_dname_buf_origin(token, rr, &dlen,
237			origin, origin_len);
238		if(s) return RET_ERR_SHIFT(s,
239			sldns_buffer_position(strbuf)-strlen(token));
240		*dname_len = dlen;
241	}
242	return LDNS_WIREPARSE_ERR_OK;
243}
244
245/** read ttl */
246static int
247rrinternal_get_ttl(sldns_buffer* strbuf, char* token, size_t token_len,
248	int* not_there, uint32_t* ttl, uint32_t default_ttl)
249{
250	const char* endptr;
251	if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
252		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TTL,
253			sldns_buffer_position(strbuf));
254	}
255	*ttl = (uint32_t) sldns_str2period(token, &endptr);
256
257	if (strlen(token) > 0 && !isdigit((unsigned char)token[0])) {
258		*not_there = 1;
259		/* ah, it's not there or something */
260		if (default_ttl == 0) {
261			*ttl = LDNS_DEFAULT_TTL;
262		} else {
263			*ttl = default_ttl;
264		}
265	}
266	return LDNS_WIREPARSE_ERR_OK;
267}
268
269/** read class */
270static int
271rrinternal_get_class(sldns_buffer* strbuf, char* token, size_t token_len,
272	int* not_there, uint16_t* cl)
273{
274	/* if 'not_there' then we got token from previous parse routine */
275	if(!*not_there) {
276		/* parse new token for class */
277		if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
278			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_CLASS,
279				sldns_buffer_position(strbuf));
280		}
281	} else *not_there = 0;
282	*cl = sldns_get_rr_class_by_name(token);
283	/* class can be left out too, assume IN, current token must be type */
284	if(*cl == 0 && strcmp(token, "CLASS0") != 0) {
285		*not_there = 1;
286		*cl = LDNS_RR_CLASS_IN;
287	}
288	return LDNS_WIREPARSE_ERR_OK;
289}
290
291/** read type */
292static int
293rrinternal_get_type(sldns_buffer* strbuf, char* token, size_t token_len,
294	int* not_there, uint16_t* tp)
295{
296	/* if 'not_there' then we got token from previous parse routine */
297	if(!*not_there) {
298		/* parse new token for type */
299		if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
300			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
301				sldns_buffer_position(strbuf));
302		}
303	}
304	*tp = sldns_get_rr_type_by_name(token);
305	if(*tp == 0 && strcmp(token, "TYPE0") != 0) {
306		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
307			sldns_buffer_position(strbuf));
308	}
309	return LDNS_WIREPARSE_ERR_OK;
310}
311
312/** put type, class, ttl into rr buffer */
313static int
314rrinternal_write_typeclassttl(sldns_buffer* strbuf, uint8_t* rr, size_t len,
315	size_t dname_len, uint16_t tp, uint16_t cl, uint32_t ttl, int question)
316{
317	if(question) {
318		/* question is : name, type, class */
319		if(dname_len + 4 > len)
320			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
321				sldns_buffer_position(strbuf));
322		sldns_write_uint16(rr+dname_len, tp);
323		sldns_write_uint16(rr+dname_len+2, cl);
324		return LDNS_WIREPARSE_ERR_OK;
325	}
326
327	/* type(2), class(2), ttl(4), rdatalen(2 (later)) = 10 */
328	if(dname_len + 10 > len)
329		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
330			sldns_buffer_position(strbuf));
331	sldns_write_uint16(rr+dname_len, tp);
332	sldns_write_uint16(rr+dname_len+2, cl);
333	sldns_write_uint32(rr+dname_len+4, ttl);
334	sldns_write_uint16(rr+dname_len+8, 0); /* rdatalen placeholder */
335	return LDNS_WIREPARSE_ERR_OK;
336}
337
338/** find delimiters for type */
339static const char*
340rrinternal_get_delims(sldns_rdf_type rdftype, size_t r_cnt, size_t r_max)
341{
342	switch(rdftype) {
343	case LDNS_RDF_TYPE_B64        :
344	case LDNS_RDF_TYPE_HEX        : /* These rdf types may con- */
345	case LDNS_RDF_TYPE_LOC        : /* tain whitespace, only if */
346	case LDNS_RDF_TYPE_WKS        : /* it is the last rd field. */
347	case LDNS_RDF_TYPE_IPSECKEY   :
348	case LDNS_RDF_TYPE_NSEC       :	if (r_cnt == r_max - 1) {
349						return "\n";
350					}
351					break;
352	default                       :	break;
353	}
354	return "\n\t ";
355}
356
357/* Syntactic sugar for sldns_rr_new_frm_str_internal */
358static int
359sldns_rdf_type_maybe_quoted(sldns_rdf_type rdf_type)
360{
361	return  rdf_type == LDNS_RDF_TYPE_STR ||
362		rdf_type == LDNS_RDF_TYPE_LONG_STR;
363}
364
365/** see if rdata is quoted */
366static int
367rrinternal_get_quoted(sldns_buffer* strbuf, const char** delimiters,
368	sldns_rdf_type rdftype)
369{
370	if(sldns_rdf_type_maybe_quoted(rdftype) &&
371		sldns_buffer_remaining(strbuf) > 0) {
372
373		/* skip spaces */
374		while(sldns_buffer_remaining(strbuf) > 0 &&
375			*(sldns_buffer_current(strbuf)) == ' ') {
376			sldns_buffer_skip(strbuf, 1);
377		}
378
379		if(sldns_buffer_remaining(strbuf) > 0 &&
380			*(sldns_buffer_current(strbuf)) == '\"') {
381			*delimiters = "\"\0";
382			sldns_buffer_skip(strbuf, 1);
383			return 1;
384		}
385	}
386	return 0;
387}
388
389/** spool hex data into rdata */
390static int
391rrinternal_spool_hex(char* token, uint8_t* rr, size_t rr_len,
392	size_t rr_cur_len, size_t* cur_hex_data_size, size_t hex_data_size)
393{
394	char* p = token;
395	while(*p) {
396		if(isspace((unsigned char)*p)) {
397			p++;
398			continue;
399		}
400		if(!isxdigit((unsigned char)*p))
401			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
402				p-token);
403		if(*cur_hex_data_size >= hex_data_size)
404			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
405				p-token);
406		/* extra robust check */
407		if(rr_cur_len+(*cur_hex_data_size)/2 >= rr_len)
408			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
409				p-token);
410		/* see if 16s or 1s */
411		if( ((*cur_hex_data_size)&1) == 0) {
412			rr[rr_cur_len+(*cur_hex_data_size)/2] =
413				(uint8_t)sldns_hexdigit_to_int(*p)*16;
414		} else {
415			rr[rr_cur_len+(*cur_hex_data_size)/2] +=
416				(uint8_t)sldns_hexdigit_to_int(*p);
417		}
418		p++;
419		(*cur_hex_data_size)++;
420	}
421	return LDNS_WIREPARSE_ERR_OK;
422}
423
424/** read unknown rr type format */
425static int
426rrinternal_parse_unknown(sldns_buffer* strbuf, char* token, size_t token_len,
427        uint8_t* rr, size_t* rr_len, size_t* rr_cur_len, size_t pre_data_pos)
428{
429	const char* delim = "\n\t ";
430	size_t hex_data_size, cur_hex_data_size;
431	/* go back to before \#
432	 * and skip it while setting delimiters better
433	 */
434	sldns_buffer_set_position(strbuf, pre_data_pos);
435	if(sldns_bget_token(strbuf, token, delim, token_len) == -1)
436		return LDNS_WIREPARSE_ERR_GENERAL; /* should not fail */
437	/* read rdata octet length */
438	if(sldns_bget_token(strbuf, token, delim, token_len) == -1) {
439		/* something goes very wrong here */
440		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
441			sldns_buffer_position(strbuf));
442	}
443	hex_data_size = (size_t)atoi(token);
444	if(hex_data_size > LDNS_MAX_RDFLEN ||
445		*rr_cur_len + hex_data_size > *rr_len) {
446		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
447			sldns_buffer_position(strbuf));
448	}
449	/* copy hex chars into hex str (2 chars per byte) */
450	hex_data_size *= 2;
451	cur_hex_data_size = 0;
452	while(cur_hex_data_size < hex_data_size) {
453		int status;
454		ssize_t c = sldns_bget_token(strbuf, token, delim, token_len);
455		if((status = rrinternal_spool_hex(token, rr, *rr_len,
456			*rr_cur_len, &cur_hex_data_size, hex_data_size)) != 0)
457			return RET_ERR_SHIFT(status,
458				sldns_buffer_position(strbuf)-strlen(token));
459		if(c == -1) {
460			if(cur_hex_data_size != hex_data_size)
461				return RET_ERR(
462					LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
463					sldns_buffer_position(strbuf));
464			break;
465		}
466	}
467	*rr_cur_len += hex_data_size/2;
468	return LDNS_WIREPARSE_ERR_OK;
469}
470
471/** parse normal RR rdata element */
472static int
473rrinternal_parse_rdf(sldns_buffer* strbuf, char* token, size_t token_len,
474	uint8_t* rr, size_t rr_len, size_t* rr_cur_len, sldns_rdf_type rdftype,
475	uint16_t rr_type, size_t r_cnt, size_t r_max, size_t dname_len,
476	uint8_t* origin, size_t origin_len)
477{
478	size_t len;
479	int status;
480
481	switch(rdftype) {
482	case LDNS_RDF_TYPE_DNAME:
483		/* check if the origin should be used or concatenated */
484		if(strcmp(token, "@") == 0) {
485			uint8_t* tocopy;
486			size_t copylen;
487			if(origin) {
488				copylen = origin_len;
489				tocopy = origin;
490			} else if(rr_type == LDNS_RR_TYPE_SOA) {
491				copylen = dname_len;
492				tocopy = rr; /* copy rr owner name */
493			} else {
494				copylen = 1;
495				tocopy = (uint8_t*)"\0";
496			}
497			if((*rr_cur_len) + copylen > rr_len)
498				return RET_ERR(
499					LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
500					sldns_buffer_position(strbuf));
501			memmove(rr+*rr_cur_len, tocopy, copylen);
502			(*rr_cur_len) += copylen;
503		} else {
504			size_t dlen = rr_len - (*rr_cur_len);
505			int s = sldns_str2wire_dname_buf_origin(token,
506				rr+*rr_cur_len, &dlen, origin, origin_len);
507			if(s) return RET_ERR_SHIFT(s,
508				sldns_buffer_position(strbuf)-strlen(token));
509			(*rr_cur_len) += dlen;
510		}
511		return LDNS_WIREPARSE_ERR_OK;
512
513	case LDNS_RDF_TYPE_HEX:
514	case LDNS_RDF_TYPE_B64:
515		/* When this is the last rdata field, then the
516		 * rest should be read in (cause then these
517		 * rdf types may contain spaces). */
518		if(r_cnt == r_max - 1) {
519			size_t tlen = strlen(token);
520			(void)sldns_bget_token(strbuf, token+tlen, "\n",
521				token_len - tlen);
522		}
523		break;
524	default:
525		break;
526	}
527
528	len = rr_len - (*rr_cur_len);
529	if((status=sldns_str2wire_rdf_buf(token, rr+(*rr_cur_len), &len,
530		rdftype)) != 0)
531		return RET_ERR_SHIFT(status,
532			sldns_buffer_position(strbuf)-strlen(token));
533	*rr_cur_len += len;
534	return LDNS_WIREPARSE_ERR_OK;
535}
536
537/**
538 * Parse one rdf token.  Takes care of quotes and parenthesis.
539 */
540static int
541sldns_parse_rdf_token(sldns_buffer* strbuf, char* token, size_t token_len,
542	int* quoted, int* parens, size_t* pre_data_pos,
543	const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
544{
545	size_t slen;
546
547	/* skip spaces */
548	while(sldns_buffer_remaining(strbuf) > 0 && !*quoted &&
549		*(sldns_buffer_current(strbuf)) == ' ') {
550		sldns_buffer_skip(strbuf, 1);
551	}
552
553	*pre_data_pos = sldns_buffer_position(strbuf);
554	if(sldns_bget_token_par(strbuf, token, (*quoted)?"\"":delimiters,
555		token_len, parens, (*quoted)?NULL:" \t") == -1) {
556		return 0;
557	}
558	slen = strlen(token);
559	/* check if not quoted yet, and we have encountered quotes */
560	if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
561		slen >= 2 &&
562		(token[0] == '"' || token[0] == '\'') &&
563		(token[slen-1] == '"' || token[slen-1] == '\'')) {
564		/* move token two smaller (quotes) with endnull */
565		memmove(token, token+1, slen-2);
566		token[slen-2] = 0;
567		slen -= 2;
568		*quoted = 1;
569	} else if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
570		slen >= 2 &&
571		(token[0] == '"' || token[0] == '\'')) {
572		/* got the start quote (remove it) but read remainder
573		 * of quoted string as well into remainder of token */
574		memmove(token, token+1, slen-1);
575		token[slen-1] = 0;
576		slen -= 1;
577		*quoted = 1;
578		/* rewind buffer over skipped whitespace */
579		while(sldns_buffer_position(strbuf) > 0 &&
580			(sldns_buffer_current(strbuf)[-1] == ' ' ||
581			sldns_buffer_current(strbuf)[-1] == '\t')) {
582			sldns_buffer_skip(strbuf, -1);
583		}
584		if(sldns_bget_token_par(strbuf, token+slen,
585			"\"", token_len-slen,
586			parens, NULL) == -1) {
587			return 0;
588		}
589		slen = strlen(token);
590	}
591	*token_strlen = slen;
592	return 1;
593}
594
595/** Add space and one more rdf token onto the existing token string. */
596static int
597sldns_affix_token(sldns_buffer* strbuf, char* token, size_t* token_len,
598	int* quoted, int* parens, size_t* pre_data_pos,
599	const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
600{
601	size_t addlen = *token_len - *token_strlen;
602	size_t addstrlen = 0;
603
604	/* add space */
605	if(addlen < 1) return 0;
606	token[*token_strlen] = ' ';
607	token[++(*token_strlen)] = 0;
608
609	/* read another token */
610	addlen = *token_len - *token_strlen;
611	if(!sldns_parse_rdf_token(strbuf, token+*token_strlen, addlen, quoted,
612		parens, pre_data_pos, delimiters, rdftype, &addstrlen))
613		return 0;
614	(*token_strlen) += addstrlen;
615	return 1;
616}
617
618/** parse rdata from string into rr buffer(-remainder after dname). */
619static int
620rrinternal_parse_rdata(sldns_buffer* strbuf, char* token, size_t token_len,
621	uint8_t* rr, size_t* rr_len, size_t dname_len, uint16_t rr_type,
622	uint8_t* origin, size_t origin_len)
623{
624	const sldns_rr_descriptor *desc = sldns_rr_descript((uint16_t)rr_type);
625	size_t r_cnt, r_min, r_max;
626	size_t rr_cur_len = dname_len + 10, pre_data_pos, token_strlen;
627	int was_unknown_rr_format = 0, parens = 0, status, quoted;
628	const char* delimiters;
629	sldns_rdf_type rdftype;
630	/* a desc is always returned */
631	if(!desc) return LDNS_WIREPARSE_ERR_GENERAL;
632	r_max = sldns_rr_descriptor_maximum(desc);
633	r_min = sldns_rr_descriptor_minimum(desc);
634	/* robust check */
635	if(rr_cur_len > *rr_len)
636		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
637			sldns_buffer_position(strbuf));
638
639	/* because number of fields can be variable, we can't rely on
640	 * _maximum() only */
641	for(r_cnt=0; r_cnt < r_max; r_cnt++) {
642		rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
643		delimiters = rrinternal_get_delims(rdftype, r_cnt, r_max);
644		quoted = rrinternal_get_quoted(strbuf, &delimiters, rdftype);
645
646		if(!sldns_parse_rdf_token(strbuf, token, token_len, &quoted,
647			&parens, &pre_data_pos, delimiters, rdftype,
648			&token_strlen))
649			break;
650
651		/* rfc3597 specifies that any type can be represented
652		 * with \# method, which can contain spaces...
653		 * it does specify size though... */
654
655		/* unknown RR data */
656		if(token_strlen>=2 && strncmp(token, "\\#", 2) == 0 &&
657			!quoted && (token_strlen == 2 || token[2]==' ')) {
658			was_unknown_rr_format = 1;
659			if((status=rrinternal_parse_unknown(strbuf, token,
660				token_len, rr, rr_len, &rr_cur_len,
661				pre_data_pos)) != 0)
662				return status;
663		} else if(token_strlen > 0 || quoted) {
664			if(rdftype == LDNS_RDF_TYPE_HIP) {
665				/* affix the HIT and PK fields, with a space */
666				if(!sldns_affix_token(strbuf, token,
667					&token_len, &quoted, &parens,
668					&pre_data_pos, delimiters,
669					rdftype, &token_strlen))
670					break;
671				if(!sldns_affix_token(strbuf, token,
672					&token_len, &quoted, &parens,
673					&pre_data_pos, delimiters,
674					rdftype, &token_strlen))
675					break;
676			} else if(rdftype == LDNS_RDF_TYPE_INT16_DATA &&
677				strcmp(token, "0")!=0) {
678				/* affix len and b64 fields */
679				if(!sldns_affix_token(strbuf, token,
680					&token_len, &quoted, &parens,
681					&pre_data_pos, delimiters,
682					rdftype, &token_strlen))
683					break;
684			}
685
686			/* normal RR */
687			if((status=rrinternal_parse_rdf(strbuf, token,
688				token_len, rr, *rr_len, &rr_cur_len, rdftype,
689				rr_type, r_cnt, r_max, dname_len, origin,
690				origin_len)) != 0) {
691				return status;
692			}
693		}
694	}
695	if(!was_unknown_rr_format && r_cnt+1 < r_min) {
696		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE,
697			sldns_buffer_position(strbuf));
698	}
699	while(parens != 0) {
700		/* read remainder, must be "" */
701		if(sldns_bget_token_par(strbuf, token, "\n", token_len,
702			&parens, " \t") == -1) {
703			if(parens != 0)
704				return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
705					sldns_buffer_position(strbuf));
706			break;
707		}
708		if(strcmp(token, "") != 0)
709			return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
710				sldns_buffer_position(strbuf));
711	}
712	/* write rdata length */
713	sldns_write_uint16(rr+dname_len+8, (uint16_t)(rr_cur_len-dname_len-10));
714	*rr_len = rr_cur_len;
715	return LDNS_WIREPARSE_ERR_OK;
716}
717
718/*
719 * trailing spaces are allowed
720 * leading spaces are not allowed
721 * allow ttl to be optional
722 * class is optional too
723 * if ttl is missing, and default_ttl is 0, use DEF_TTL
724 * allow ttl to be written as 1d3h
725 * So the RR should look like. e.g.
726 * miek.nl. 3600 IN MX 10 elektron.atoom.net
727 * or
728 * miek.nl. 1h IN MX 10 elektron.atoom.net
729 * or
730 * miek.nl. IN MX 10 elektron.atoom.net
731 */
732static int
733sldns_str2wire_rr_buf_internal(const char* str, uint8_t* rr, size_t* len,
734	size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
735	size_t origin_len, uint8_t* prev, size_t prev_len, int question)
736{
737	int status;
738	int not_there = 0;
739	char token[LDNS_MAX_RDFLEN+1];
740	uint32_t ttl = 0;
741	uint16_t tp = 0, cl = 0;
742	size_t ddlen = 0;
743
744	/* string in buffer */
745	sldns_buffer strbuf;
746	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
747	if(!dname_len) dname_len = &ddlen;
748
749	/* parse the owner */
750	if((status=rrinternal_get_owner(&strbuf, rr, len, dname_len, origin,
751		origin_len, prev, prev_len, token, sizeof(token))) != 0)
752		return status;
753
754	/* parse the [ttl] [class] <type> */
755	if((status=rrinternal_get_ttl(&strbuf, token, sizeof(token),
756		&not_there, &ttl, default_ttl)) != 0)
757		return status;
758	if((status=rrinternal_get_class(&strbuf, token, sizeof(token),
759		&not_there, &cl)) != 0)
760		return status;
761	if((status=rrinternal_get_type(&strbuf, token, sizeof(token),
762		&not_there, &tp)) != 0)
763		return status;
764	/* put ttl, class, type into the rr result */
765	if((status=rrinternal_write_typeclassttl(&strbuf, rr, *len, *dname_len, tp, cl,
766		ttl, question)) != 0)
767		return status;
768	/* for a question-RR we are done, no rdata */
769	if(question) {
770		*len = *dname_len + 4;
771		return LDNS_WIREPARSE_ERR_OK;
772	}
773
774	/* rdata */
775	if((status=rrinternal_parse_rdata(&strbuf, token, sizeof(token),
776		rr, len, *dname_len, tp, origin, origin_len)) != 0)
777		return status;
778
779	return LDNS_WIREPARSE_ERR_OK;
780}
781
782int sldns_str2wire_rr_buf(const char* str, uint8_t* rr, size_t* len,
783	size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
784	size_t origin_len, uint8_t* prev, size_t prev_len)
785{
786	return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
787		default_ttl, origin, origin_len, prev, prev_len, 0);
788}
789
790int sldns_str2wire_rr_question_buf(const char* str, uint8_t* rr, size_t* len,
791	size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
792	size_t prev_len)
793{
794	return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
795		0, origin, origin_len, prev, prev_len, 1);
796}
797
798uint16_t sldns_wirerr_get_type(uint8_t* rr, size_t len, size_t dname_len)
799{
800	if(len < dname_len+2)
801		return 0;
802	return sldns_read_uint16(rr+dname_len);
803}
804
805uint16_t sldns_wirerr_get_class(uint8_t* rr, size_t len, size_t dname_len)
806{
807	if(len < dname_len+4)
808		return 0;
809	return sldns_read_uint16(rr+dname_len+2);
810}
811
812uint32_t sldns_wirerr_get_ttl(uint8_t* rr, size_t len, size_t dname_len)
813{
814	if(len < dname_len+8)
815		return 0;
816	return sldns_read_uint32(rr+dname_len+4);
817}
818
819uint16_t sldns_wirerr_get_rdatalen(uint8_t* rr, size_t len, size_t dname_len)
820{
821	if(len < dname_len+10)
822		return 0;
823	return sldns_read_uint16(rr+dname_len+8);
824}
825
826uint8_t* sldns_wirerr_get_rdata(uint8_t* rr, size_t len, size_t dname_len)
827{
828	if(len < dname_len+10)
829		return NULL;
830	return rr+dname_len+10;
831}
832
833uint8_t* sldns_wirerr_get_rdatawl(uint8_t* rr, size_t len, size_t dname_len)
834{
835	if(len < dname_len+10)
836		return NULL;
837	return rr+dname_len+8;
838}
839
840const char* sldns_get_errorstr_parse(int e)
841{
842	sldns_lookup_table *lt;
843	lt = sldns_lookup_by_id(sldns_wireparse_errors, LDNS_WIREPARSE_ERROR(e));
844	return lt?lt->name:"unknown error";
845}
846
847/* Strip whitespace from the start and the end of <line>.  */
848char *
849sldns_strip_ws(char *line)
850{
851        char *s = line, *e;
852
853        for (s = line; *s && isspace((unsigned char)*s); s++)
854                ;
855        for (e = strchr(s, 0); e > s+2 && isspace((unsigned char)e[-1]) && e[-2] != '\\'; e--)
856                ;
857        *e = 0;
858        return s;
859}
860
861int sldns_fp2wire_rr_buf(FILE* in, uint8_t* rr, size_t* len, size_t* dname_len,
862	struct sldns_file_parse_state* parse_state)
863{
864	char line[LDNS_RR_BUF_SIZE+1];
865	ssize_t size;
866
867	/* read an entire line in from the file */
868	if((size = sldns_fget_token_l(in, line, LDNS_PARSE_SKIP_SPACE,
869		LDNS_RR_BUF_SIZE, parse_state?&parse_state->lineno:NULL))
870		== -1) {
871		/* if last line was empty, we are now at feof, which is not
872		 * always a parse error (happens when for instance last line
873		 * was a comment)
874		 */
875		return LDNS_WIREPARSE_ERR_SYNTAX;
876	}
877
878	/* we can have the situation, where we've read ok, but still got
879	 * no bytes to play with, in this case size is 0 */
880	if(size == 0) {
881		if(*len > 0)
882			rr[0] = 0;
883		*len = 0;
884		*dname_len = 0;
885		return LDNS_WIREPARSE_ERR_OK;
886	}
887
888	if(strncmp(line, "$ORIGIN", 7) == 0 && isspace((unsigned char)line[7])) {
889		int s;
890		strlcpy((char*)rr, line, *len);
891		*len = 0;
892		*dname_len = 0;
893		if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
894		parse_state->origin_len = sizeof(parse_state->origin);
895		s = sldns_str2wire_dname_buf(sldns_strip_ws(line+8),
896			parse_state->origin, &parse_state->origin_len);
897		if(s) parse_state->origin_len = 0;
898		return s;
899	} else if(strncmp(line, "$TTL", 4) == 0 && isspace((unsigned char)line[4])) {
900		const char* end = NULL;
901		strlcpy((char*)rr, line, *len);
902		*len = 0;
903		*dname_len = 0;
904		if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
905		parse_state->default_ttl = sldns_str2period(
906			sldns_strip_ws(line+5), &end);
907	} else if (strncmp(line, "$INCLUDE", 8) == 0) {
908		strlcpy((char*)rr, line, *len);
909		*len = 0;
910		*dname_len = 0;
911		return LDNS_WIREPARSE_ERR_INCLUDE;
912	} else if (strncmp(line, "$", 1) == 0) {
913		strlcpy((char*)rr, line, *len);
914		*len = 0;
915		*dname_len = 0;
916		return LDNS_WIREPARSE_ERR_INCLUDE;
917	} else {
918		int r = sldns_str2wire_rr_buf(line, rr, len, dname_len,
919			parse_state?parse_state->default_ttl:0,
920			(parse_state&&parse_state->origin_len)?
921				parse_state->origin:NULL,
922			parse_state?parse_state->origin_len:0,
923			(parse_state&&parse_state->prev_rr_len)?
924				parse_state->prev_rr:NULL,
925			parse_state?parse_state->prev_rr_len:0);
926		if(r == LDNS_WIREPARSE_ERR_OK && (*dname_len) != 0 &&
927			parse_state &&
928			(*dname_len) <= sizeof(parse_state->prev_rr)) {
929			memmove(parse_state->prev_rr, rr, *dname_len);
930			parse_state->prev_rr_len = (*dname_len);
931		}
932		return r;
933	}
934	return LDNS_WIREPARSE_ERR_OK;
935}
936
937int sldns_str2wire_rdf_buf(const char* str, uint8_t* rd, size_t* len,
938	sldns_rdf_type rdftype)
939{
940	switch (rdftype) {
941	case LDNS_RDF_TYPE_DNAME:
942		return sldns_str2wire_dname_buf(str, rd, len);
943	case LDNS_RDF_TYPE_INT8:
944		return sldns_str2wire_int8_buf(str, rd, len);
945	case LDNS_RDF_TYPE_INT16:
946		return sldns_str2wire_int16_buf(str, rd, len);
947	case LDNS_RDF_TYPE_INT32:
948		return sldns_str2wire_int32_buf(str, rd, len);
949	case LDNS_RDF_TYPE_A:
950		return sldns_str2wire_a_buf(str, rd, len);
951	case LDNS_RDF_TYPE_AAAA:
952		return sldns_str2wire_aaaa_buf(str, rd, len);
953	case LDNS_RDF_TYPE_STR:
954		return sldns_str2wire_str_buf(str, rd, len);
955	case LDNS_RDF_TYPE_APL:
956		return sldns_str2wire_apl_buf(str, rd, len);
957	case LDNS_RDF_TYPE_B64:
958		return sldns_str2wire_b64_buf(str, rd, len);
959	case LDNS_RDF_TYPE_B32_EXT:
960		return sldns_str2wire_b32_ext_buf(str, rd, len);
961	case LDNS_RDF_TYPE_HEX:
962		return sldns_str2wire_hex_buf(str, rd, len);
963	case LDNS_RDF_TYPE_NSEC:
964		return sldns_str2wire_nsec_buf(str, rd, len);
965	case LDNS_RDF_TYPE_TYPE:
966		return sldns_str2wire_type_buf(str, rd, len);
967	case LDNS_RDF_TYPE_CLASS:
968		return sldns_str2wire_class_buf(str, rd, len);
969	case LDNS_RDF_TYPE_CERT_ALG:
970		return sldns_str2wire_cert_alg_buf(str, rd, len);
971	case LDNS_RDF_TYPE_ALG:
972		return sldns_str2wire_alg_buf(str, rd, len);
973	case LDNS_RDF_TYPE_TIME:
974		return sldns_str2wire_time_buf(str, rd, len);
975	case LDNS_RDF_TYPE_PERIOD:
976		return sldns_str2wire_period_buf(str, rd, len);
977	case LDNS_RDF_TYPE_TSIGTIME:
978		return sldns_str2wire_tsigtime_buf(str, rd, len);
979	case LDNS_RDF_TYPE_LOC:
980		return sldns_str2wire_loc_buf(str, rd, len);
981	case LDNS_RDF_TYPE_WKS:
982		return sldns_str2wire_wks_buf(str, rd, len);
983	case LDNS_RDF_TYPE_NSAP:
984		return sldns_str2wire_nsap_buf(str, rd, len);
985	case LDNS_RDF_TYPE_ATMA:
986		return sldns_str2wire_atma_buf(str, rd, len);
987	case LDNS_RDF_TYPE_IPSECKEY:
988		return sldns_str2wire_ipseckey_buf(str, rd, len);
989	case LDNS_RDF_TYPE_NSEC3_SALT:
990		return sldns_str2wire_nsec3_salt_buf(str, rd, len);
991	case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
992		return sldns_str2wire_b32_ext_buf(str, rd, len);
993	case LDNS_RDF_TYPE_ILNP64:
994		return sldns_str2wire_ilnp64_buf(str, rd, len);
995	case LDNS_RDF_TYPE_EUI48:
996		return sldns_str2wire_eui48_buf(str, rd, len);
997	case LDNS_RDF_TYPE_EUI64:
998		return sldns_str2wire_eui64_buf(str, rd, len);
999	case LDNS_RDF_TYPE_TAG:
1000		return sldns_str2wire_tag_buf(str, rd, len);
1001	case LDNS_RDF_TYPE_LONG_STR:
1002		return sldns_str2wire_long_str_buf(str, rd, len);
1003	case LDNS_RDF_TYPE_TSIGERROR:
1004		return sldns_str2wire_tsigerror_buf(str, rd, len);
1005	case LDNS_RDF_TYPE_HIP:
1006		return sldns_str2wire_hip_buf(str, rd, len);
1007	case LDNS_RDF_TYPE_INT16_DATA:
1008		return sldns_str2wire_int16_data_buf(str, rd, len);
1009	case LDNS_RDF_TYPE_UNKNOWN:
1010	case LDNS_RDF_TYPE_SERVICE:
1011		return LDNS_WIREPARSE_ERR_NOT_IMPL;
1012	case LDNS_RDF_TYPE_NONE:
1013	default:
1014		break;
1015	}
1016	return LDNS_WIREPARSE_ERR_GENERAL;
1017}
1018
1019int sldns_str2wire_int8_buf(const char* str, uint8_t* rd, size_t* len)
1020{
1021	char* end;
1022	uint8_t r = (uint8_t)strtol((char*)str, &end, 10);
1023	if(*end != 0)
1024		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1025	if(*len < 1)
1026		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1027	rd[0] = r;
1028	*len = 1;
1029	return LDNS_WIREPARSE_ERR_OK;
1030}
1031
1032int sldns_str2wire_int16_buf(const char* str, uint8_t* rd, size_t* len)
1033{
1034	char* end;
1035	uint16_t r = (uint16_t)strtol((char*)str, &end, 10);
1036	if(*end != 0)
1037		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1038	if(*len < 2)
1039		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1040	sldns_write_uint16(rd, r);
1041	*len = 2;
1042	return LDNS_WIREPARSE_ERR_OK;
1043}
1044
1045int sldns_str2wire_int32_buf(const char* str, uint8_t* rd, size_t* len)
1046{
1047	char* end;
1048	uint32_t r;
1049	errno = 0; /* must set to zero before call,
1050			note race condition on errno */
1051	if(*str == '-')
1052		r = (uint32_t)strtol((char*)str, &end, 10);
1053	else	r = (uint32_t)strtoul((char*)str, &end, 10);
1054	if(*end != 0)
1055		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1056	if(errno == ERANGE)
1057		return LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW;
1058	if(*len < 4)
1059		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1060	sldns_write_uint32(rd, r);
1061	*len = 4;
1062	return LDNS_WIREPARSE_ERR_OK;
1063}
1064
1065int sldns_str2wire_a_buf(const char* str, uint8_t* rd, size_t* len)
1066{
1067	struct in_addr address;
1068	if(inet_pton(AF_INET, (char*)str, &address) != 1)
1069		return LDNS_WIREPARSE_ERR_SYNTAX_IP4;
1070	if(*len < sizeof(address))
1071		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1072	memmove(rd, &address, sizeof(address));
1073	*len = sizeof(address);
1074	return LDNS_WIREPARSE_ERR_OK;
1075}
1076
1077int sldns_str2wire_aaaa_buf(const char* str, uint8_t* rd, size_t* len)
1078{
1079#ifdef AF_INET6
1080	uint8_t address[LDNS_IP6ADDRLEN + 1];
1081	if(inet_pton(AF_INET6, (char*)str, address) != 1)
1082		return LDNS_WIREPARSE_ERR_SYNTAX_IP6;
1083	if(*len < LDNS_IP6ADDRLEN)
1084		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1085	memmove(rd, address, LDNS_IP6ADDRLEN);
1086	*len = LDNS_IP6ADDRLEN;
1087	return LDNS_WIREPARSE_ERR_OK;
1088#else
1089	return LDNS_WIREPARSE_ERR_NOT_IMPL;
1090#endif
1091}
1092
1093int sldns_str2wire_str_buf(const char* str, uint8_t* rd, size_t* len)
1094{
1095	uint8_t ch = 0;
1096	size_t sl = 0;
1097	const char* s = str;
1098	/* skip length byte */
1099	if(*len < 1)
1100		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1101
1102	/* read characters */
1103	while(sldns_parse_char(&ch, &s)) {
1104		if(sl >= 255)
1105			return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR, s-str);
1106		if(*len < sl+2)
1107			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1108				s-str);
1109		rd[++sl] = ch;
1110	}
1111	if(!s)
1112		return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
1113	rd[0] = (uint8_t)sl;
1114	*len = sl+1;
1115	return LDNS_WIREPARSE_ERR_OK;
1116}
1117
1118int sldns_str2wire_apl_buf(const char* str, uint8_t* rd, size_t* len)
1119{
1120	const char *my_str = str;
1121
1122	char my_ip_str[64];
1123	size_t ip_str_len;
1124
1125	uint16_t family;
1126	int negation;
1127	size_t adflength = 0;
1128	uint8_t data[16+4];
1129	uint8_t prefix;
1130	size_t i;
1131
1132	if(*my_str == '\0') {
1133		/* empty APL element, no data, no string */
1134		*len = 0;
1135		return LDNS_WIREPARSE_ERR_OK;
1136	}
1137
1138	/* [!]afi:address/prefix */
1139	if (strlen(my_str) < 2
1140			|| strchr(my_str, ':') == NULL
1141			|| strchr(my_str, '/') == NULL
1142			|| strchr(my_str, ':') > strchr(my_str, '/')) {
1143		return LDNS_WIREPARSE_ERR_INVALID_STR;
1144	}
1145
1146	if (my_str[0] == '!') {
1147		negation = 1;
1148		my_str += 1;
1149	} else {
1150		negation = 0;
1151	}
1152
1153	family = (uint16_t) atoi(my_str);
1154
1155	my_str = strchr(my_str, ':') + 1;
1156
1157	/* need ip addr and only ip addr for inet_pton */
1158	ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
1159	if(ip_str_len+1 > sizeof(my_ip_str))
1160		return LDNS_WIREPARSE_ERR_INVALID_STR;
1161	(void)strlcpy(my_ip_str, my_str, sizeof(my_ip_str));
1162	my_ip_str[ip_str_len] = 0;
1163
1164	if (family == 1) {
1165		/* ipv4 */
1166		if(inet_pton(AF_INET, my_ip_str, data+4) == 0)
1167			return LDNS_WIREPARSE_ERR_INVALID_STR;
1168		for (i = 0; i < 4; i++) {
1169			if (data[i+4] != 0) {
1170				adflength = i + 1;
1171			}
1172		}
1173	} else if (family == 2) {
1174		/* ipv6 */
1175		if (inet_pton(AF_INET6, my_ip_str, data+4) == 0)
1176			return LDNS_WIREPARSE_ERR_INVALID_STR;
1177		for (i = 0; i < 16; i++) {
1178			if (data[i+4] != 0) {
1179				adflength = i + 1;
1180			}
1181		}
1182	} else {
1183		/* unknown family */
1184		return LDNS_WIREPARSE_ERR_INVALID_STR;
1185	}
1186
1187	my_str = strchr(my_str, '/') + 1;
1188	prefix = (uint8_t) atoi(my_str);
1189
1190	sldns_write_uint16(data, family);
1191	data[2] = prefix;
1192	data[3] = (uint8_t)adflength;
1193	if (negation) {
1194		/* set bit 1 of byte 3 */
1195		data[3] = data[3] | 0x80;
1196	}
1197
1198	if(*len < 4+adflength)
1199		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1200	memmove(rd, data, 4+adflength);
1201	*len = 4+adflength;
1202	return LDNS_WIREPARSE_ERR_OK;
1203}
1204
1205int sldns_str2wire_b64_buf(const char* str, uint8_t* rd, size_t* len)
1206{
1207	size_t sz = sldns_b64_pton_calculate_size(strlen(str));
1208	int n;
1209	if(strcmp(str, "0") == 0) {
1210		*len = 0;
1211		return LDNS_WIREPARSE_ERR_OK;
1212	}
1213	if(*len < sz)
1214		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1215	n = sldns_b64_pton(str, rd, *len);
1216	if(n < 0)
1217		return LDNS_WIREPARSE_ERR_SYNTAX_B64;
1218	*len = (size_t)n;
1219	return LDNS_WIREPARSE_ERR_OK;
1220}
1221
1222int sldns_str2wire_b32_ext_buf(const char* str, uint8_t* rd, size_t* len)
1223{
1224	size_t slen = strlen(str);
1225	size_t sz = sldns_b32_pton_calculate_size(slen);
1226	int n;
1227	if(*len < 1+sz)
1228		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1229	rd[0] = (uint8_t)sz;
1230	n = sldns_b32_pton_extended_hex(str, slen, rd+1, *len-1);
1231	if(n < 0)
1232		return LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT;
1233	*len = (size_t)n+1;
1234	return LDNS_WIREPARSE_ERR_OK;
1235}
1236
1237/** see if the string ends, or ends in whitespace */
1238static int
1239sldns_is_last_of_string(const char* str)
1240{
1241	if(*str == 0) return 1;
1242	while(isspace((unsigned char)*str))
1243		str++;
1244	if(*str == 0) return 1;
1245	return 0;
1246}
1247
1248int sldns_str2wire_hex_buf(const char* str, uint8_t* rd, size_t* len)
1249{
1250	const char* s = str;
1251	size_t dlen = 0; /* number of hexdigits parsed */
1252	while(*s) {
1253		if(isspace((unsigned char)*s)) {
1254			s++;
1255			continue;
1256		}
1257		if(dlen == 0 && *s == '0' && sldns_is_last_of_string(s+1)) {
1258			*len = 0;
1259			return LDNS_WIREPARSE_ERR_OK;
1260		}
1261		if(!isxdigit((unsigned char)*s))
1262			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1263		if(*len < dlen/2 + 1)
1264			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1265				s-str);
1266		if((dlen&1)==0)
1267			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1268		else	rd[dlen/2] += (uint8_t)sldns_hexdigit_to_int(*s++);
1269		dlen++;
1270	}
1271	if((dlen&1)!=0)
1272		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1273	*len = dlen/2;
1274	return LDNS_WIREPARSE_ERR_OK;
1275}
1276
1277int sldns_str2wire_nsec_buf(const char* str, uint8_t* rd, size_t* len)
1278{
1279	const char *delim = "\n\t ";
1280	char token[64]; /* for a type name */
1281	size_t type_count = 0;
1282	int block;
1283	size_t used = 0;
1284	uint16_t maxtype = 0;
1285	uint8_t typebits[8192]; /* 65536 bits */
1286	uint8_t window_in_use[256];
1287
1288	/* string in buffer */
1289	sldns_buffer strbuf;
1290	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1291
1292	/* parse the types */
1293	memset(typebits, 0, sizeof(typebits));
1294	memset(window_in_use, 0, sizeof(window_in_use));
1295	while(sldns_buffer_remaining(&strbuf) > 0 &&
1296		sldns_bget_token(&strbuf, token, delim, sizeof(token)) != -1) {
1297		uint16_t t = sldns_get_rr_type_by_name(token);
1298		if(token[0] == 0)
1299			continue;
1300		if(t == 0 && strcmp(token, "TYPE0") != 0)
1301			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
1302				sldns_buffer_position(&strbuf));
1303		typebits[t/8] |= (0x80>>(t%8));
1304		window_in_use[t/256] = 1;
1305		type_count++;
1306		if(t > maxtype) maxtype = t;
1307	}
1308
1309	/* empty NSEC bitmap */
1310	if(type_count == 0) {
1311		*len = 0;
1312		return LDNS_WIREPARSE_ERR_OK;
1313	}
1314
1315	/* encode windows {u8 windowblock, u8 bitmaplength, 0-32u8 bitmap},
1316	 * block is 0-255 upper octet of types, length if 0-32. */
1317	for(block = 0; block <= (int)maxtype/256; block++) {
1318		int i, blocklen = 0;
1319		if(!window_in_use[block])
1320			continue;
1321		for(i=0; i<32; i++) {
1322			if(typebits[block*32+i] != 0)
1323				blocklen = i+1;
1324		}
1325		if(blocklen == 0)
1326			continue; /* empty window should have been !in_use */
1327		if(used+blocklen+2 > *len)
1328			return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1329		rd[used+0] = (uint8_t)block;
1330		rd[used+1] = (uint8_t)blocklen;
1331		for(i=0; i<blocklen; i++) {
1332			rd[used+2+i] = typebits[block*32+i];
1333		}
1334		used += blocklen+2;
1335	}
1336	*len = used;
1337	return LDNS_WIREPARSE_ERR_OK;
1338}
1339
1340int sldns_str2wire_type_buf(const char* str, uint8_t* rd, size_t* len)
1341{
1342	uint16_t t = sldns_get_rr_type_by_name(str);
1343	if(t == 0 && strcmp(str, "TYPE0") != 0)
1344		return LDNS_WIREPARSE_ERR_SYNTAX_TYPE;
1345	if(*len < 2)
1346		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1347	sldns_write_uint16(rd, t);
1348	*len = 2;
1349	return LDNS_WIREPARSE_ERR_OK;
1350}
1351
1352int sldns_str2wire_class_buf(const char* str, uint8_t* rd, size_t* len)
1353{
1354	uint16_t c = sldns_get_rr_class_by_name(str);
1355	if(c == 0 && strcmp(str, "CLASS0") != 0)
1356		return LDNS_WIREPARSE_ERR_SYNTAX_CLASS;
1357	if(*len < 2)
1358		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1359	sldns_write_uint16(rd, c);
1360	*len = 2;
1361	return LDNS_WIREPARSE_ERR_OK;
1362}
1363
1364/* An certificate alg field can either be specified as a 8 bits number
1365 * or by its symbolic name. Handle both */
1366int sldns_str2wire_cert_alg_buf(const char* str, uint8_t* rd, size_t* len)
1367{
1368	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_cert_algorithms,
1369		str);
1370	if(*len < 2)
1371		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1372	if(lt) {
1373		sldns_write_uint16(rd, (uint16_t)lt->id);
1374	} else {
1375		int s = sldns_str2wire_int16_buf(str, rd, len);
1376		if(s) return s;
1377		if(sldns_read_uint16(rd) == 0)
1378			return LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM;
1379	}
1380	*len = 2;
1381	return LDNS_WIREPARSE_ERR_OK;
1382}
1383
1384/* An alg field can either be specified as a 8 bits number
1385 * or by its symbolic name. Handle both */
1386int sldns_str2wire_alg_buf(const char* str, uint8_t* rd, size_t* len)
1387{
1388	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_algorithms, str);
1389	if(*len < 1)
1390		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1391	if(lt) {
1392		rd[0] = (uint8_t)lt->id;
1393		*len = 1;
1394	} else {
1395		/* try as-is (a number) */
1396		return sldns_str2wire_int8_buf(str, rd, len);
1397	}
1398	return LDNS_WIREPARSE_ERR_OK;
1399}
1400
1401int sldns_str2wire_tsigerror_buf(const char* str, uint8_t* rd, size_t* len)
1402{
1403	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_tsig_errors, str);
1404	if(*len < 2)
1405		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1406	if(lt) {
1407		sldns_write_uint16(rd, (uint16_t)lt->id);
1408		*len = 2;
1409	} else {
1410		/* try as-is (a number) */
1411		return sldns_str2wire_int16_buf(str, rd, len);
1412	}
1413	return LDNS_WIREPARSE_ERR_OK;
1414}
1415
1416int sldns_str2wire_time_buf(const char* str, uint8_t* rd, size_t* len)
1417{
1418	/* convert a time YYYYDDMMHHMMSS to wireformat */
1419	struct tm tm;
1420	if(*len < 4)
1421		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1422
1423	/* Try to scan the time... */
1424	memset(&tm, 0, sizeof(tm));
1425	if (strlen(str) == 14 && sscanf(str, "%4d%2d%2d%2d%2d%2d",
1426		&tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour,
1427		&tm.tm_min, &tm.tm_sec) == 6) {
1428	   	tm.tm_year -= 1900;
1429	   	tm.tm_mon--;
1430	   	/* Check values */
1431		if (tm.tm_year < 70)
1432			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1433		if (tm.tm_mon < 0 || tm.tm_mon > 11)
1434			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1435		if (tm.tm_mday < 1 || tm.tm_mday > 31)
1436			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1437		if (tm.tm_hour < 0 || tm.tm_hour > 23)
1438			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1439		if (tm.tm_min < 0 || tm.tm_min > 59)
1440			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1441		if (tm.tm_sec < 0 || tm.tm_sec > 59)
1442			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1443
1444		sldns_write_uint32(rd, (uint32_t)sldns_mktime_from_utc(&tm));
1445	} else {
1446		/* handle it as 32 bits timestamp */
1447		char *end;
1448		uint32_t l = (uint32_t)strtol((char*)str, &end, 10);
1449		if(*end != 0)
1450			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME,
1451				end-(char*)str);
1452		sldns_write_uint32(rd, l);
1453	}
1454	*len = 4;
1455	return LDNS_WIREPARSE_ERR_OK;
1456}
1457
1458int sldns_str2wire_tsigtime_buf(const char* str, uint8_t* rd, size_t* len)
1459{
1460	char* end;
1461	uint64_t t = (uint64_t)strtol((char*)str, &end, 10);
1462	uint16_t high;
1463	uint32_t low;
1464	if(*end != 0)
1465		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME, end-str);
1466	if(*len < 6)
1467		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1468	high = (uint16_t)(t>>32);
1469	low = (uint32_t)(t);
1470	sldns_write_uint16(rd, high);
1471	sldns_write_uint32(rd+2, low);
1472	*len = 6;
1473	return LDNS_WIREPARSE_ERR_OK;
1474}
1475
1476int sldns_str2wire_period_buf(const char* str, uint8_t* rd, size_t* len)
1477{
1478	const char* end;
1479	uint32_t p = sldns_str2period(str, &end);
1480	if(*end != 0)
1481		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, end-str);
1482	if(*len < 4)
1483		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1484	sldns_write_uint32(rd, p);
1485	*len = 4;
1486	return LDNS_WIREPARSE_ERR_OK;
1487}
1488
1489/** read "<digits>[.<digits>][mM]" into mantissa exponent format for LOC type */
1490static int
1491loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
1492{
1493	uint32_t meters = 0, cm = 0, val;
1494	while (isblank((unsigned char)*my_str)) {
1495		my_str++;
1496	}
1497	meters = (uint32_t)strtol(my_str, &my_str, 10);
1498	if (*my_str == '.') {
1499		my_str++;
1500		cm = (uint32_t)strtol(my_str, &my_str, 10);
1501	}
1502	if (meters >= 1) {
1503		*e = 2;
1504		val = meters;
1505	} else	{
1506		*e = 0;
1507		val = cm;
1508	}
1509	while(val >= 10) {
1510		(*e)++;
1511		val /= 10;
1512	}
1513	*m = (uint8_t)val;
1514
1515	if (*e > 9)
1516		return 0;
1517	if (*my_str == 'm' || *my_str == 'M') {
1518		my_str++;
1519	}
1520	*endstr = my_str;
1521	return 1;
1522}
1523
1524int sldns_str2wire_loc_buf(const char* str, uint8_t* rd, size_t* len)
1525{
1526	uint32_t latitude = 0;
1527	uint32_t longitude = 0;
1528	uint32_t altitude = 0;
1529
1530	uint32_t equator = (uint32_t)1<<31; /* 2**31 */
1531
1532	/* only support version 0 */
1533	uint32_t h = 0;
1534	uint32_t m = 0;
1535	uint8_t size_b = 1, size_e = 2;
1536	uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
1537	uint8_t vert_pre_b = 1, vert_pre_e = 3;
1538
1539	double s = 0.0;
1540	int northerness;
1541	int easterness;
1542
1543	char *my_str = (char *) str;
1544
1545	if (isdigit((unsigned char) *my_str)) {
1546		h = (uint32_t) strtol(my_str, &my_str, 10);
1547	} else {
1548		return LDNS_WIREPARSE_ERR_INVALID_STR;
1549	}
1550
1551	while (isblank((unsigned char) *my_str)) {
1552		my_str++;
1553	}
1554
1555	if (isdigit((unsigned char) *my_str)) {
1556		m = (uint32_t) strtol(my_str, &my_str, 10);
1557	} else if (*my_str == 'N' || *my_str == 'S') {
1558		goto north;
1559	} else {
1560		return LDNS_WIREPARSE_ERR_INVALID_STR;
1561	}
1562
1563	while (isblank((unsigned char) *my_str)) {
1564		my_str++;
1565	}
1566
1567	if (isdigit((unsigned char) *my_str)) {
1568		s = strtod(my_str, &my_str);
1569	}
1570
1571	/* skip blanks before northerness */
1572	while (isblank((unsigned char) *my_str)) {
1573		my_str++;
1574	}
1575
1576north:
1577	if (*my_str == 'N') {
1578		northerness = 1;
1579	} else if (*my_str == 'S') {
1580		northerness = 0;
1581	} else {
1582		return LDNS_WIREPARSE_ERR_INVALID_STR;
1583	}
1584
1585	my_str++;
1586
1587	/* store number */
1588	s = 1000.0 * s;
1589	/* add a little to make floor in conversion a round */
1590	s += 0.0005;
1591	latitude = (uint32_t) s;
1592	latitude += 1000 * 60 * m;
1593	latitude += 1000 * 60 * 60 * h;
1594	if (northerness) {
1595		latitude = equator + latitude;
1596	} else {
1597		latitude = equator - latitude;
1598	}
1599	while (isblank((unsigned char)*my_str)) {
1600		my_str++;
1601	}
1602
1603	if (isdigit((unsigned char) *my_str)) {
1604		h = (uint32_t) strtol(my_str, &my_str, 10);
1605	} else {
1606		return LDNS_WIREPARSE_ERR_INVALID_STR;
1607	}
1608
1609	while (isblank((unsigned char) *my_str)) {
1610		my_str++;
1611	}
1612
1613	if (isdigit((unsigned char) *my_str)) {
1614		m = (uint32_t) strtol(my_str, &my_str, 10);
1615	} else if (*my_str == 'E' || *my_str == 'W') {
1616		goto east;
1617	} else {
1618		return LDNS_WIREPARSE_ERR_INVALID_STR;
1619	}
1620
1621	while (isblank((unsigned char)*my_str)) {
1622		my_str++;
1623	}
1624
1625	if (isdigit((unsigned char) *my_str)) {
1626		s = strtod(my_str, &my_str);
1627	}
1628
1629	/* skip blanks before easterness */
1630	while (isblank((unsigned char)*my_str)) {
1631		my_str++;
1632	}
1633
1634east:
1635	if (*my_str == 'E') {
1636		easterness = 1;
1637	} else if (*my_str == 'W') {
1638		easterness = 0;
1639	} else {
1640		return LDNS_WIREPARSE_ERR_INVALID_STR;
1641	}
1642
1643	my_str++;
1644
1645	/* store number */
1646	s *= 1000.0;
1647	/* add a little to make floor in conversion a round */
1648	s += 0.0005;
1649	longitude = (uint32_t) s;
1650	longitude += 1000 * 60 * m;
1651	longitude += 1000 * 60 * 60 * h;
1652
1653	if (easterness) {
1654		longitude += equator;
1655	} else {
1656		longitude = equator - longitude;
1657	}
1658
1659	altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
1660		10000000.0 + 0.5);
1661	if (*my_str == 'm' || *my_str == 'M') {
1662		my_str++;
1663	}
1664
1665	if (strlen(my_str) > 0) {
1666		if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1667			return LDNS_WIREPARSE_ERR_INVALID_STR;
1668	}
1669
1670	if (strlen(my_str) > 0) {
1671		if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1672			return LDNS_WIREPARSE_ERR_INVALID_STR;
1673	}
1674
1675	if (strlen(my_str) > 0) {
1676		if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1677			return LDNS_WIREPARSE_ERR_INVALID_STR;
1678	}
1679
1680	if(*len < 16)
1681		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1682	rd[0] = 0;
1683	rd[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1684	rd[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1685	rd[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1686	sldns_write_uint32(rd + 4, latitude);
1687	sldns_write_uint32(rd + 8, longitude);
1688	sldns_write_uint32(rd + 12, altitude);
1689	*len = 16;
1690	return LDNS_WIREPARSE_ERR_OK;
1691}
1692
1693static void
1694ldns_tolower_str(char* s)
1695{
1696	if(s) {
1697		while(*s) {
1698			*s = (char)tolower((unsigned char)*s);
1699			s++;
1700		}
1701	}
1702}
1703
1704int sldns_str2wire_wks_buf(const char* str, uint8_t* rd, size_t* len)
1705{
1706	int rd_len = 1;
1707	int have_proto = 0;
1708	char token[50], proto_str[50];
1709	sldns_buffer strbuf;
1710	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1711	proto_str[0]=0;
1712
1713	/* check we have one byte for proto */
1714	if(*len < 1)
1715		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1716
1717	while(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) > 0) {
1718		ldns_tolower_str(token);
1719		if(!have_proto) {
1720			struct protoent *p = getprotobyname(token);
1721			have_proto = 1;
1722			if(p) rd[0] = (uint8_t)p->p_proto;
1723			else if(strcasecmp(token, "tcp")==0) rd[0]=6;
1724			else if(strcasecmp(token, "udp")==0) rd[0]=17;
1725			else rd[0] = (uint8_t)atoi(token);
1726			(void)strlcpy(proto_str, token, sizeof(proto_str));
1727		} else {
1728			int serv_port;
1729			struct servent *serv = getservbyname(token, proto_str);
1730			if(serv) serv_port=(int)ntohs((uint16_t)serv->s_port);
1731			else if(strcasecmp(token, "domain")==0) serv_port=53;
1732			else {
1733				serv_port = atoi(token);
1734				if(serv_port == 0 && strcmp(token, "0") != 0) {
1735#ifdef HAVE_ENDSERVENT
1736					endservent();
1737#endif
1738#ifdef HAVE_ENDPROTOENT
1739					endprotoent();
1740#endif
1741					return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1742						sldns_buffer_position(&strbuf));
1743				}
1744				if(serv_port < 0 || serv_port > 65535) {
1745#ifdef HAVE_ENDSERVENT
1746					endservent();
1747#endif
1748#ifdef HAVE_ENDPROTOENT
1749					endprotoent();
1750#endif
1751					return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1752						sldns_buffer_position(&strbuf));
1753				}
1754			}
1755			if(rd_len < 1+serv_port/8+1) {
1756				/* bitmap is larger, init new bytes at 0 */
1757				if(*len < 1+(size_t)serv_port/8+1) {
1758#ifdef HAVE_ENDSERVENT
1759					endservent();
1760#endif
1761#ifdef HAVE_ENDPROTOENT
1762					endprotoent();
1763#endif
1764					return RET_ERR(
1765					LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1766					sldns_buffer_position(&strbuf));
1767				}
1768				memset(rd+rd_len, 0, 1+(size_t)serv_port/8+1-rd_len);
1769				rd_len = 1+serv_port/8+1;
1770			}
1771			rd[1+ serv_port/8] |= (1 << (7 - serv_port % 8));
1772		}
1773	}
1774	*len = (size_t)rd_len;
1775
1776#ifdef HAVE_ENDSERVENT
1777	endservent();
1778#endif
1779#ifdef HAVE_ENDPROTOENT
1780	endprotoent();
1781#endif
1782	return LDNS_WIREPARSE_ERR_OK;
1783}
1784
1785int sldns_str2wire_nsap_buf(const char* str, uint8_t* rd, size_t* len)
1786{
1787	const char* s = str;
1788	size_t slen;
1789	size_t dlen = 0; /* number of hexdigits parsed */
1790
1791	/* just a hex string with optional dots? */
1792	if (s[0] != '0' || s[1] != 'x')
1793		return LDNS_WIREPARSE_ERR_INVALID_STR;
1794	s += 2;
1795	slen = strlen(s);
1796	if(slen > LDNS_MAX_RDFLEN*2)
1797		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1798	while(*s) {
1799		if(isspace((unsigned char)*s) || *s == '.') {
1800			s++;
1801			continue;
1802		}
1803		if(!isxdigit((unsigned char)*s))
1804			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1805		if(*len < dlen/2 + 1)
1806			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1807				s-str);
1808		if((dlen&1)==0)
1809			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1810		else	rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1811		dlen++;
1812	}
1813	if((dlen&1)!=0)
1814		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1815	*len = dlen/2;
1816	return LDNS_WIREPARSE_ERR_OK;
1817}
1818
1819int sldns_str2wire_atma_buf(const char* str, uint8_t* rd, size_t* len)
1820{
1821	const char* s = str;
1822	size_t slen = strlen(str);
1823	size_t dlen = 0; /* number of hexdigits parsed */
1824
1825	/* just a hex string with optional dots? */
1826	/* notimpl e.164 format */
1827	if(slen > LDNS_MAX_RDFLEN*2)
1828		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1829	while(*s) {
1830		if(isspace((unsigned char)*s) || *s == '.') {
1831			s++;
1832			continue;
1833		}
1834		if(!isxdigit((unsigned char)*s))
1835			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1836		if(*len < dlen/2 + 1)
1837			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1838				s-str);
1839		if((dlen&1)==0)
1840			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1841		else	rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1842		dlen++;
1843	}
1844	if((dlen&1)!=0)
1845		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1846	*len = dlen/2;
1847	return LDNS_WIREPARSE_ERR_OK;
1848}
1849
1850int sldns_str2wire_ipseckey_buf(const char* str, uint8_t* rd, size_t* len)
1851{
1852	size_t gwlen = 0, keylen = 0;
1853	int s;
1854	uint8_t gwtype;
1855	char token[512];
1856	sldns_buffer strbuf;
1857	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1858
1859	if(*len < 3)
1860		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1861	/* precedence */
1862	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1863		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1864			sldns_buffer_position(&strbuf));
1865	rd[0] = (uint8_t)atoi(token);
1866	/* gateway_type */
1867	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1868		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1869			sldns_buffer_position(&strbuf));
1870	rd[1] = (uint8_t)atoi(token);
1871	gwtype = rd[1];
1872	/* algorithm */
1873	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1874		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1875			sldns_buffer_position(&strbuf));
1876	rd[2] = (uint8_t)atoi(token);
1877
1878	/* gateway */
1879	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1880		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1881			sldns_buffer_position(&strbuf));
1882	if(gwtype == 0) {
1883		/* NOGATEWAY */
1884		if(strcmp(token, ".") != 0)
1885			return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1886				sldns_buffer_position(&strbuf));
1887		gwlen = 0;
1888	} else if(gwtype == 1) {
1889		/* IP4 */
1890		gwlen = *len - 3;
1891		s = sldns_str2wire_a_buf(token, rd+3, &gwlen);
1892		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1893	} else if(gwtype == 2) {
1894		/* IP6 */
1895		gwlen = *len - 3;
1896		s = sldns_str2wire_aaaa_buf(token, rd+3, &gwlen);
1897		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1898	} else if(gwtype == 3) {
1899		/* DNAME */
1900		gwlen = *len - 3;
1901		s = sldns_str2wire_dname_buf(token, rd+3, &gwlen);
1902		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1903	} else {
1904		/* unknown gateway type */
1905		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1906			sldns_buffer_position(&strbuf));
1907	}
1908	/* double check for size */
1909	if(*len < 3 + gwlen)
1910		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1911			sldns_buffer_position(&strbuf));
1912
1913	/* publickey in remainder of strbuf */
1914	keylen = *len - 3 - gwlen;
1915	s = sldns_str2wire_b64_buf((const char*)sldns_buffer_current(&strbuf),
1916		rd+3+gwlen, &keylen);
1917	if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1918
1919	*len = 3 + gwlen + keylen;
1920	return LDNS_WIREPARSE_ERR_OK;
1921}
1922
1923int sldns_str2wire_nsec3_salt_buf(const char* str, uint8_t* rd, size_t* len)
1924{
1925	int i, salt_length_str = (int)strlen(str);
1926	if (salt_length_str == 1 && str[0] == '-') {
1927		salt_length_str = 0;
1928	} else if (salt_length_str % 2 != 0) {
1929		return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1930	}
1931	if (salt_length_str > 512)
1932		return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1933	if(*len < 1+(size_t)salt_length_str / 2)
1934		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1935	rd[0] = (uint8_t) (salt_length_str / 2);
1936	for (i = 0; i < salt_length_str; i += 2) {
1937		if (isxdigit((unsigned char)str[i]) &&
1938			isxdigit((unsigned char)str[i+1])) {
1939			rd[1+i/2] = (uint8_t)(sldns_hexdigit_to_int(str[i])*16
1940				+ sldns_hexdigit_to_int(str[i+1]));
1941		} else {
1942			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, i);
1943		}
1944	}
1945	*len = 1 + (size_t)rd[0];
1946	return LDNS_WIREPARSE_ERR_OK;
1947}
1948
1949int sldns_str2wire_ilnp64_buf(const char* str, uint8_t* rd, size_t* len)
1950{
1951	unsigned int a, b, c, d;
1952	uint16_t shorts[4];
1953	int l;
1954	if(*len < sizeof(shorts))
1955		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1956
1957	if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1958			l != (int)strlen(str) || /* more data to read */
1959			strpbrk(str, "+-")       /* signed hexes */
1960			)
1961		return LDNS_WIREPARSE_ERR_SYNTAX_ILNP64;
1962	shorts[0] = htons(a);
1963	shorts[1] = htons(b);
1964	shorts[2] = htons(c);
1965	shorts[3] = htons(d);
1966	memmove(rd, &shorts, sizeof(shorts));
1967	*len = sizeof(shorts);
1968	return LDNS_WIREPARSE_ERR_OK;
1969}
1970
1971int sldns_str2wire_eui48_buf(const char* str, uint8_t* rd, size_t* len)
1972{
1973	unsigned int a, b, c, d, e, f;
1974	int l;
1975
1976	if(*len < 6)
1977		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1978	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1979			&a, &b, &c, &d, &e, &f, &l) != 6 ||
1980			l != (int)strlen(str))
1981		return LDNS_WIREPARSE_ERR_SYNTAX_EUI48;
1982	rd[0] = a;
1983	rd[1] = b;
1984	rd[2] = c;
1985	rd[3] = d;
1986	rd[4] = e;
1987	rd[5] = f;
1988	*len = 6;
1989	return LDNS_WIREPARSE_ERR_OK;
1990}
1991
1992int sldns_str2wire_eui64_buf(const char* str, uint8_t* rd, size_t* len)
1993{
1994	unsigned int a, b, c, d, e, f, g, h;
1995	int l;
1996
1997	if(*len < 8)
1998		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1999	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
2000			&a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
2001			l != (int)strlen(str))
2002		return LDNS_WIREPARSE_ERR_SYNTAX_EUI64;
2003	rd[0] = a;
2004	rd[1] = b;
2005	rd[2] = c;
2006	rd[3] = d;
2007	rd[4] = e;
2008	rd[5] = f;
2009	rd[6] = g;
2010	rd[7] = h;
2011	*len = 8;
2012	return LDNS_WIREPARSE_ERR_OK;
2013}
2014
2015int sldns_str2wire_tag_buf(const char* str, uint8_t* rd, size_t* len)
2016{
2017	size_t slen = strlen(str);
2018	const char* ptr;
2019
2020	if (slen > 255)
2021		return LDNS_WIREPARSE_ERR_SYNTAX_TAG;
2022	if(*len < slen+1)
2023		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2024	for (ptr = str; *ptr; ptr++) {
2025		if(!isalnum((unsigned char)*ptr))
2026			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TAG, ptr-str);
2027	}
2028	rd[0] = (uint8_t)slen;
2029	memmove(rd+1, str, slen);
2030	*len = slen+1;
2031	return LDNS_WIREPARSE_ERR_OK;
2032}
2033
2034int sldns_str2wire_long_str_buf(const char* str, uint8_t* rd, size_t* len)
2035{
2036	uint8_t ch = 0;
2037	const char* pstr = str;
2038	size_t length = 0;
2039
2040	/* Fill data with parsed bytes */
2041	while (sldns_parse_char(&ch, &pstr)) {
2042		if(*len < length+1)
2043			return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2044		rd[length++] = ch;
2045	}
2046	if(!pstr)
2047		return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
2048	*len = length;
2049	return LDNS_WIREPARSE_ERR_OK;
2050}
2051
2052int sldns_str2wire_hip_buf(const char* str, uint8_t* rd, size_t* len)
2053{
2054	char* s, *end;
2055	int e;
2056	size_t hitlen, pklen = 0;
2057	/* presentation format:
2058	 * 	pk-algo HIThex pubkeybase64
2059	 * wireformat:
2060	 * 	hitlen[1byte] pkalgo[1byte] pubkeylen[2byte] [hit] [pubkey] */
2061	if(*len < 4)
2062		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2063
2064	/* read PK algorithm */
2065	rd[1] = (uint8_t)strtol((char*)str, &s, 10);
2066	if(*s != ' ')
2067		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2068	s++;
2069	while(*s == ' ')
2070		s++;
2071
2072	/* read HIT hex tag */
2073	/* zero terminate the tag (replace later) */
2074	end = strchr(s, ' ');
2075	if(!end) return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX, s-(char*)str);
2076	*end = 0;
2077	hitlen = *len - 4;
2078	if((e = sldns_str2wire_hex_buf(s, rd+4, &hitlen)) != 0) {
2079		*end = ' ';
2080		return RET_ERR_SHIFT(e, s-(char*)str);
2081	}
2082	if(hitlen > 255) {
2083		*end = ' ';
2084		return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+255*2);
2085	}
2086	rd[0] = (uint8_t)hitlen;
2087	*end = ' ';
2088	s = end+1;
2089
2090	/* read pubkey base64 sequence */
2091	pklen = *len - 4 - hitlen;
2092	if((e = sldns_str2wire_b64_buf(s, rd+4+hitlen, &pklen)) != 0)
2093		return RET_ERR_SHIFT(e, s-(char*)str);
2094	if(pklen > 65535)
2095		return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+65535);
2096	sldns_write_uint16(rd+2, (uint16_t)pklen);
2097
2098	*len = 4 + hitlen + pklen;
2099	return LDNS_WIREPARSE_ERR_OK;
2100}
2101
2102int sldns_str2wire_int16_data_buf(const char* str, uint8_t* rd, size_t* len)
2103{
2104	char* s;
2105	int n;
2106	n = strtol(str, &s, 10);
2107	if(n < 0) /* negative number not allowed */
2108		return LDNS_WIREPARSE_ERR_SYNTAX;
2109	if(*len < ((size_t)n)+2)
2110		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2111	if(n > 65535)
2112		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
2113
2114	if(n == 0) {
2115		sldns_write_uint16(rd, 0);
2116		*len = 2;
2117		return LDNS_WIREPARSE_ERR_OK;
2118	}
2119	if(*s != ' ')
2120		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2121	s++;
2122	while(*s == ' ')
2123		s++;
2124
2125	n = sldns_b64_pton(s, rd+2, (*len)-2);
2126	if(n < 0)
2127		return LDNS_WIREPARSE_ERR_SYNTAX_B64;
2128	sldns_write_uint16(rd, (uint16_t)n);
2129	*len = ((size_t)n)+2;
2130	return LDNS_WIREPARSE_ERR_OK;
2131}
2132