wire2str.c revision 356345
1/*
2 * wire2str.c
3 *
4 * conversion routines from the wire format
5 * to the presentation format (strings)
6 *
7 * (c) NLnet Labs, 2004-2006
8 *
9 * See the file LICENSE for the license
10 */
11/**
12 * \file
13 *
14 * Contains functions to translate the wireformat to text
15 * representation, as well as functions to print them.
16 */
17#include "config.h"
18#include "sldns/wire2str.h"
19#include "sldns/str2wire.h"
20#include "sldns/rrdef.h"
21#include "sldns/pkthdr.h"
22#include "sldns/parseutil.h"
23#include "sldns/sbuffer.h"
24#include "sldns/keyraw.h"
25#include "util/data/dname.h"
26#ifdef HAVE_TIME_H
27#include <time.h>
28#endif
29#include <sys/time.h>
30#include <stdarg.h>
31#include <ctype.h>
32#ifdef HAVE_NETDB_H
33#include <netdb.h>
34#endif
35
36/* lookup tables for standard DNS stuff  */
37/* Taken from RFC 2535, section 7.  */
38static sldns_lookup_table sldns_algorithms_data[] = {
39	{ LDNS_RSAMD5, "RSAMD5" },
40	{ LDNS_DH, "DH" },
41	{ LDNS_DSA, "DSA" },
42	{ LDNS_ECC, "ECC" },
43	{ LDNS_RSASHA1, "RSASHA1" },
44	{ LDNS_DSA_NSEC3, "DSA-NSEC3-SHA1" },
45	{ LDNS_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
46	{ LDNS_RSASHA256, "RSASHA256"},
47	{ LDNS_RSASHA512, "RSASHA512"},
48	{ LDNS_ECC_GOST, "ECC-GOST"},
49	{ LDNS_ECDSAP256SHA256, "ECDSAP256SHA256"},
50	{ LDNS_ECDSAP384SHA384, "ECDSAP384SHA384"},
51	{ LDNS_ED25519, "ED25519"},
52	{ LDNS_ED448, "ED448"},
53	{ LDNS_INDIRECT, "INDIRECT" },
54	{ LDNS_PRIVATEDNS, "PRIVATEDNS" },
55	{ LDNS_PRIVATEOID, "PRIVATEOID" },
56	{ 0, NULL }
57};
58sldns_lookup_table* sldns_algorithms = sldns_algorithms_data;
59
60/* hash algorithms in DS record */
61static sldns_lookup_table sldns_hashes_data[] = {
62	{ LDNS_SHA1, "SHA1" },
63	{ LDNS_SHA256, "SHA256" },
64	{ LDNS_HASH_GOST, "HASH-GOST" },
65	{ LDNS_SHA384, "SHA384" },
66	{ 0, NULL }
67};
68sldns_lookup_table* sldns_hashes = sldns_hashes_data;
69
70/* Taken from RFC 4398  */
71static sldns_lookup_table sldns_cert_algorithms_data[] = {
72	{ LDNS_CERT_PKIX, "PKIX" },
73	{ LDNS_CERT_SPKI, "SPKI" },
74	{ LDNS_CERT_PGP, "PGP" },
75	{ LDNS_CERT_IPKIX, "IPKIX" },
76	{ LDNS_CERT_ISPKI, "ISPKI" },
77	{ LDNS_CERT_IPGP, "IPGP" },
78	{ LDNS_CERT_ACPKIX, "ACPKIX" },
79	{ LDNS_CERT_IACPKIX, "IACPKIX" },
80	{ LDNS_CERT_URI, "URI" },
81	{ LDNS_CERT_OID, "OID" },
82	{ 0, NULL }
83};
84sldns_lookup_table* sldns_cert_algorithms = sldns_cert_algorithms_data;
85
86/* if these are used elsewhere */
87static sldns_lookup_table sldns_rcodes_data[] = {
88	{ LDNS_RCODE_NOERROR, "NOERROR" },
89	{ LDNS_RCODE_FORMERR, "FORMERR" },
90	{ LDNS_RCODE_SERVFAIL, "SERVFAIL" },
91	{ LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
92	{ LDNS_RCODE_NOTIMPL, "NOTIMPL" },
93	{ LDNS_RCODE_REFUSED, "REFUSED" },
94	{ LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
95	{ LDNS_RCODE_YXRRSET, "YXRRSET" },
96	{ LDNS_RCODE_NXRRSET, "NXRRSET" },
97	{ LDNS_RCODE_NOTAUTH, "NOTAUTH" },
98	{ LDNS_RCODE_NOTZONE, "NOTZONE" },
99	{ 0, NULL }
100};
101sldns_lookup_table* sldns_rcodes = sldns_rcodes_data;
102
103static sldns_lookup_table sldns_opcodes_data[] = {
104	{ LDNS_PACKET_QUERY, "QUERY" },
105	{ LDNS_PACKET_IQUERY, "IQUERY" },
106	{ LDNS_PACKET_STATUS, "STATUS" },
107	{ LDNS_PACKET_NOTIFY, "NOTIFY" },
108	{ LDNS_PACKET_UPDATE, "UPDATE" },
109	{ 0, NULL }
110};
111sldns_lookup_table* sldns_opcodes = sldns_opcodes_data;
112
113static sldns_lookup_table sldns_wireparse_errors_data[] = {
114	{ LDNS_WIREPARSE_ERR_OK, "no parse error" },
115	{ LDNS_WIREPARSE_ERR_GENERAL, "parse error" },
116	{ LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, "Domainname length overflow" },
117	{ LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, "Domainname length underflow (zero length)" },
118	{ LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, "buffer too small" },
119	{ LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, "Label length overflow" },
120	{ LDNS_WIREPARSE_ERR_EMPTY_LABEL, "Empty label" },
121	{ LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, "Syntax error, bad escape sequence" },
122	{ LDNS_WIREPARSE_ERR_SYNTAX, "Syntax error, could not parse the RR" },
123	{ LDNS_WIREPARSE_ERR_SYNTAX_TTL, "Syntax error, could not parse the RR's TTL" },
124	{ LDNS_WIREPARSE_ERR_SYNTAX_TYPE, "Syntax error, could not parse the RR's type" },
125	{ LDNS_WIREPARSE_ERR_SYNTAX_CLASS, "Syntax error, could not parse the RR's class" },
126	{ LDNS_WIREPARSE_ERR_SYNTAX_RDATA, "Syntax error, could not parse the RR's rdata" },
127	{ LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE, "Syntax error, value expected" },
128	{ LDNS_WIREPARSE_ERR_INVALID_STR, "Conversion error, string expected" },
129	{ LDNS_WIREPARSE_ERR_SYNTAX_B64, "Conversion error, b64 encoding expected" },
130	{ LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT, "Conversion error, b32 ext encoding expected" },
131	{ LDNS_WIREPARSE_ERR_SYNTAX_HEX, "Conversion error, hex encoding expected" },
132	{ LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM, "Bad algorithm type for CERT record" },
133	{ LDNS_WIREPARSE_ERR_SYNTAX_TIME, "Conversion error, time encoding expected" },
134	{ LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, "Conversion error, time period encoding expected" },
135	{ LDNS_WIREPARSE_ERR_SYNTAX_ILNP64, "Conversion error, 4 colon separated hex numbers expected" },
136	{ LDNS_WIREPARSE_ERR_SYNTAX_EUI48,
137		"Conversion error, 6 two character hex numbers "
138		"separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx" },
139	{ LDNS_WIREPARSE_ERR_SYNTAX_EUI64,
140		"Conversion error, 8 two character hex numbers "
141		"separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx-xx-xx" },
142	{ LDNS_WIREPARSE_ERR_SYNTAX_TAG,
143		"Conversion error, a non-zero sequence of US-ASCII letters "
144		"and numbers in lower case expected" },
145	{ LDNS_WIREPARSE_ERR_NOT_IMPL, "not implemented" },
146	{ LDNS_WIREPARSE_ERR_SYNTAX_INT, "Conversion error, integer expected" },
147	{ LDNS_WIREPARSE_ERR_SYNTAX_IP4, "Conversion error, ip4 addr expected" },
148	{ LDNS_WIREPARSE_ERR_SYNTAX_IP6, "Conversion error, ip6 addr expected" },
149	{ LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW, "Syntax error, integer overflow" },
150	{ LDNS_WIREPARSE_ERR_INCLUDE, "$INCLUDE directive was seen in the zone" },
151	{ LDNS_WIREPARSE_ERR_PARENTHESIS, "Parse error, parenthesis mismatch" },
152	{ 0, NULL }
153};
154sldns_lookup_table* sldns_wireparse_errors = sldns_wireparse_errors_data;
155
156static sldns_lookup_table sldns_edns_flags_data[] = {
157	{ 3600, "do"},
158	{ 0, NULL}
159};
160sldns_lookup_table* sldns_edns_flags = sldns_edns_flags_data;
161
162static sldns_lookup_table sldns_edns_options_data[] = {
163	{ 1, "LLQ" },
164	{ 2, "UL" },
165	{ 3, "NSID" },
166	/* 4 draft-cheshire-edns0-owner-option */
167	{ 5, "DAU" },
168	{ 6, "DHU" },
169	{ 7, "N3U" },
170	{ 8, "edns-client-subnet" },
171	{ 11, "edns-tcp-keepalive"},
172	{ 12, "Padding" },
173	{ 0, NULL}
174};
175sldns_lookup_table* sldns_edns_options = sldns_edns_options_data;
176
177static sldns_lookup_table sldns_tsig_errors_data[] = {
178	{ LDNS_TSIG_ERROR_NOERROR, "NOERROR" },
179	{ LDNS_RCODE_FORMERR, "FORMERR" },
180	{ LDNS_RCODE_SERVFAIL, "SERVFAIL" },
181	{ LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
182	{ LDNS_RCODE_NOTIMPL, "NOTIMPL" },
183	{ LDNS_RCODE_REFUSED, "REFUSED" },
184	{ LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
185	{ LDNS_RCODE_YXRRSET, "YXRRSET" },
186	{ LDNS_RCODE_NXRRSET, "NXRRSET" },
187	{ LDNS_RCODE_NOTAUTH, "NOTAUTH" },
188	{ LDNS_RCODE_NOTZONE, "NOTZONE" },
189	{ LDNS_TSIG_ERROR_BADSIG, "BADSIG" },
190	{ LDNS_TSIG_ERROR_BADKEY, "BADKEY" },
191	{ LDNS_TSIG_ERROR_BADTIME, "BADTIME" },
192	{ LDNS_TSIG_ERROR_BADMODE, "BADMODE" },
193	{ LDNS_TSIG_ERROR_BADNAME, "BADNAME" },
194	{ LDNS_TSIG_ERROR_BADALG, "BADALG" },
195	{ 0, NULL }
196};
197sldns_lookup_table* sldns_tsig_errors = sldns_tsig_errors_data;
198
199char* sldns_wire2str_pkt(uint8_t* data, size_t len)
200{
201	size_t slen = (size_t)sldns_wire2str_pkt_buf(data, len, NULL, 0);
202	char* result = (char*)malloc(slen+1);
203	if(!result) return NULL;
204	sldns_wire2str_pkt_buf(data, len, result, slen+1);
205	return result;
206}
207
208char* sldns_wire2str_rr(uint8_t* rr, size_t len)
209{
210	size_t slen = (size_t)sldns_wire2str_rr_buf(rr, len, NULL, 0);
211	char* result = (char*)malloc(slen+1);
212	if(!result) return NULL;
213	sldns_wire2str_rr_buf(rr, len, result, slen+1);
214	return result;
215}
216
217char* sldns_wire2str_type(uint16_t rrtype)
218{
219	char buf[16];
220	sldns_wire2str_type_buf(rrtype, buf, sizeof(buf));
221	return strdup(buf);
222}
223
224char* sldns_wire2str_class(uint16_t rrclass)
225{
226	char buf[16];
227	sldns_wire2str_class_buf(rrclass, buf, sizeof(buf));
228	return strdup(buf);
229}
230
231char* sldns_wire2str_dname(uint8_t* dname, size_t dname_len)
232{
233	size_t slen=(size_t)sldns_wire2str_dname_buf(dname, dname_len, NULL, 0);
234	char* result = (char*)malloc(slen+1);
235	if(!result) return NULL;
236	sldns_wire2str_dname_buf(dname, dname_len, result, slen+1);
237	return result;
238}
239
240char* sldns_wire2str_rcode(int rcode)
241{
242	char buf[16];
243	sldns_wire2str_rcode_buf(rcode, buf, sizeof(buf));
244	return strdup(buf);
245}
246
247int sldns_wire2str_pkt_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
248{
249	/* use arguments as temporary variables */
250	return sldns_wire2str_pkt_scan(&d, &dlen, &s, &slen);
251}
252
253int sldns_wire2str_rr_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
254{
255	/* use arguments as temporary variables */
256	return sldns_wire2str_rr_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
257}
258
259int sldns_wire2str_rrquestion_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
260{
261	/* use arguments as temporary variables */
262	return sldns_wire2str_rrquestion_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
263}
264
265int sldns_wire2str_rdata_buf(uint8_t* rdata, size_t rdata_len, char* str,
266	size_t str_len, uint16_t rrtype)
267{
268	/* use arguments as temporary variables */
269	return sldns_wire2str_rdata_scan(&rdata, &rdata_len, &str, &str_len,
270		rrtype, NULL, 0, NULL);
271}
272
273int sldns_wire2str_rr_unknown_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
274{
275	/* use arguments as temporary variables */
276	return sldns_wire2str_rr_unknown_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
277}
278
279int sldns_wire2str_rr_comment_buf(uint8_t* rr, size_t rrlen, size_t dname_len,
280	char* s, size_t slen)
281{
282	uint16_t rrtype = sldns_wirerr_get_type(rr, rrlen, dname_len);
283	return sldns_wire2str_rr_comment_print(&s, &slen, rr, rrlen, dname_len,
284		rrtype);
285}
286
287int sldns_wire2str_type_buf(uint16_t rrtype, char* s, size_t slen)
288{
289	/* use arguments as temporary variables */
290	return sldns_wire2str_type_print(&s, &slen, rrtype);
291}
292
293int sldns_wire2str_class_buf(uint16_t rrclass, char* s, size_t slen)
294{
295	/* use arguments as temporary variables */
296	return sldns_wire2str_class_print(&s, &slen, rrclass);
297}
298
299int sldns_wire2str_rcode_buf(int rcode, char* s, size_t slen)
300{
301	/* use arguments as temporary variables */
302	return sldns_wire2str_rcode_print(&s, &slen, rcode);
303}
304
305int sldns_wire2str_opcode_buf(int opcode, char* s, size_t slen)
306{
307	/* use arguments as temporary variables */
308	return sldns_wire2str_opcode_print(&s, &slen, opcode);
309}
310
311int sldns_wire2str_dname_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
312{
313	/* use arguments as temporary variables */
314	return sldns_wire2str_dname_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
315}
316
317int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args)
318{
319	int w = vsnprintf(*str, *slen, format, args);
320	if(w < 0) {
321		/* error in printout */
322		return 0;
323	} else if((size_t)w >= *slen) {
324		*str = NULL; /* we do not want str to point outside of buffer*/
325		*slen = 0;
326	} else {
327		*str += w;
328		*slen -= w;
329	}
330	return w;
331}
332
333int sldns_str_print(char** str, size_t* slen, const char* format, ...)
334{
335	int w;
336	va_list args;
337	va_start(args, format);
338	w = sldns_str_vprint(str, slen, format, args);
339	va_end(args);
340	return w;
341}
342
343/** print hex format into text buffer for specified length */
344static int print_hex_buf(char** s, size_t* slen, uint8_t* buf, size_t len)
345{
346	const char* hex = "0123456789ABCDEF";
347	size_t i;
348	for(i=0; i<len; i++) {
349		(void)sldns_str_print(s, slen, "%c%c", hex[(buf[i]&0xf0)>>4],
350			hex[buf[i]&0x0f]);
351	}
352	return (int)len*2;
353}
354
355/** print remainder of buffer in hex format with prefixed text */
356static int print_remainder_hex(const char* pref, uint8_t** d, size_t* dlen,
357	char** s, size_t* slen)
358{
359	int w = 0;
360	w += sldns_str_print(s, slen, "%s", pref);
361	w += print_hex_buf(s, slen, *d, *dlen);
362	*d += *dlen;
363	*dlen = 0;
364	return w;
365}
366
367int sldns_wire2str_pkt_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
368{
369	int w = 0, comprloop = 0;
370	unsigned qdcount, ancount, nscount, arcount, i;
371	uint8_t* pkt = *d;
372	size_t pktlen = *dlen;
373	if(*dlen >= LDNS_HEADER_SIZE) {
374		qdcount = (unsigned)LDNS_QDCOUNT(*d);
375		ancount = (unsigned)LDNS_ANCOUNT(*d);
376		nscount = (unsigned)LDNS_NSCOUNT(*d);
377		arcount = (unsigned)LDNS_ARCOUNT(*d);
378	} else {
379		qdcount = ancount = nscount = arcount = 0;
380	}
381	w += sldns_wire2str_header_scan(d, dlen, s, slen);
382	w += sldns_str_print(s, slen, "\n");
383	w += sldns_str_print(s, slen, ";; QUESTION SECTION:\n");
384	for(i=0; i<qdcount; i++) {
385		w += sldns_wire2str_rrquestion_scan(d, dlen, s, slen,
386			pkt, pktlen, &comprloop);
387		if(!*dlen) break;
388	}
389	w += sldns_str_print(s, slen, "\n");
390	w += sldns_str_print(s, slen, ";; ANSWER SECTION:\n");
391	for(i=0; i<ancount; i++) {
392		w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
393		if(!*dlen) break;
394	}
395	w += sldns_str_print(s, slen, "\n");
396	w += sldns_str_print(s, slen, ";; AUTHORITY SECTION:\n");
397	for(i=0; i<nscount; i++) {
398		w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
399		if(!*dlen) break;
400	}
401	w += sldns_str_print(s, slen, "\n");
402	w += sldns_str_print(s, slen, ";; ADDITIONAL SECTION:\n");
403	for(i=0; i<arcount; i++) {
404		w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
405		if(!*dlen) break;
406	}
407	/* other fields: WHEN(time), SERVER(IP) not available here. */
408	w += sldns_str_print(s, slen, ";; MSG SIZE  rcvd: %d\n", (int)pktlen);
409	if(*dlen > 0) {
410		w += print_remainder_hex(";; trailing garbage 0x",
411			d, dlen, s, slen);
412		w += sldns_str_print(s, slen, "\n");
413	}
414	return w;
415}
416
417/** scan type, class and ttl and printout, for rr */
418static int sldns_rr_tcttl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
419{
420	int w = 0;
421	uint16_t t, c;
422	uint32_t ttl;
423	if(*dl < 8) {
424		if(*dl < 4)
425			return w + print_remainder_hex("; Error malformed 0x",
426				d, dl, s, sl);
427		/* these print values or 0x.. if none left */
428		t = sldns_read_uint16(*d);
429		c = sldns_read_uint16((*d)+2);
430		(*d)+=4;
431		(*dl)-=4;
432		w += sldns_wire2str_class_print(s, sl, c);
433		w += sldns_str_print(s, sl, "\t");
434		w += sldns_wire2str_type_print(s, sl, t);
435		if(*dl == 0)
436			return w + sldns_str_print(s, sl, "; Error no ttl");
437		return w + print_remainder_hex(
438			"; Error malformed ttl 0x", d, dl, s, sl);
439	}
440	t = sldns_read_uint16(*d);
441	c = sldns_read_uint16((*d)+2);
442	ttl = sldns_read_uint32((*d)+4);
443	(*d)+=8;
444	(*dl)-=8;
445	w += sldns_str_print(s, sl, "%lu\t", (unsigned long)ttl);
446	w += sldns_wire2str_class_print(s, sl, c);
447	w += sldns_str_print(s, sl, "\t");
448	w += sldns_wire2str_type_print(s, sl, t);
449	return w;
450}
451
452int sldns_wire2str_rr_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
453	uint8_t* pkt, size_t pktlen, int* comprloop)
454{
455	int w = 0;
456	uint8_t* rr = *d;
457	size_t rrlen = *dlen, dname_off, rdlen, ordlen;
458	uint16_t rrtype = 0;
459
460	if(*dlen >= 3 && (*d)[0]==0 &&
461		sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
462		/* perform EDNS OPT processing */
463		return sldns_wire2str_edns_scan(d, dlen, s, slen, pkt, pktlen);
464	}
465
466	/* try to scan the rdata with pretty-printing, but if that fails, then
467	 * scan the rdata as an unknown RR type */
468	w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
469	w += sldns_str_print(s, slen, "\t");
470	dname_off = rrlen-(*dlen);
471	if(*dlen == 4) {
472		/* like a question-RR */
473		uint16_t t = sldns_read_uint16(*d);
474		uint16_t c = sldns_read_uint16((*d)+2);
475		(*d)+=4;
476		(*dlen)-=4;
477		w += sldns_wire2str_class_print(s, slen, c);
478		w += sldns_str_print(s, slen, "\t");
479		w += sldns_wire2str_type_print(s, slen, t);
480		w += sldns_str_print(s, slen, " ; Error no ttl,rdata\n");
481		return w;
482	}
483	if(*dlen < 8) {
484		if(*dlen == 0)
485			return w + sldns_str_print(s, slen, ";Error missing RR\n");
486		w += print_remainder_hex(";Error partial RR 0x", d, dlen, s, slen);
487		return w + sldns_str_print(s, slen, "\n");
488	}
489	rrtype = sldns_read_uint16(*d);
490	w += sldns_rr_tcttl_scan(d, dlen, s, slen);
491	w += sldns_str_print(s, slen, "\t");
492
493	/* rdata */
494	if(*dlen < 2) {
495		if(*dlen == 0)
496			return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
497		w += print_remainder_hex(";Error missing rdatalen 0x",
498			d, dlen, s, slen);
499		return w + sldns_str_print(s, slen, "\n");
500	}
501	rdlen = sldns_read_uint16(*d);
502	ordlen = rdlen;
503	(*d)+=2;
504	(*dlen)-=2;
505	if(*dlen < rdlen) {
506		w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
507		if(*dlen == 0)
508			return w + sldns_str_print(s, slen, ";Error missing rdata\n");
509		w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
510		return w + sldns_str_print(s, slen, "\n");
511	}
512	w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen,
513		comprloop);
514	(*dlen) -= (ordlen-rdlen);
515
516	/* default comment */
517	w += sldns_wire2str_rr_comment_print(s, slen, rr, rrlen, dname_off,
518		rrtype);
519	w += sldns_str_print(s, slen, "\n");
520	return w;
521}
522
523int sldns_wire2str_rrquestion_scan(uint8_t** d, size_t* dlen, char** s,
524	size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
525{
526	int w = 0;
527	uint16_t t, c;
528	w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
529	w += sldns_str_print(s, slen, "\t");
530	if(*dlen < 4) {
531		if(*dlen == 0)
532			return w + sldns_str_print(s, slen, "Error malformed\n");
533		w += print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
534		return w + sldns_str_print(s, slen, "\n");
535	}
536	t = sldns_read_uint16(*d);
537	c = sldns_read_uint16((*d)+2);
538	(*d)+=4;
539	(*dlen)-=4;
540	w += sldns_wire2str_class_print(s, slen, c);
541	w += sldns_str_print(s, slen, "\t");
542	w += sldns_wire2str_type_print(s, slen, t);
543	w += sldns_str_print(s, slen, "\n");
544	return w;
545}
546
547int sldns_wire2str_rr_unknown_scan(uint8_t** d, size_t* dlen, char** s,
548	size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
549{
550	size_t rdlen, ordlen;
551	int w = 0;
552	w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
553	w += sldns_str_print(s, slen, "\t");
554	w += sldns_rr_tcttl_scan(d, dlen, s, slen);
555	w += sldns_str_print(s, slen, "\t");
556	if(*dlen < 2) {
557		if(*dlen == 0)
558			return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
559		w += print_remainder_hex(";Error missing rdatalen 0x",
560			d, dlen, s, slen);
561		return w + sldns_str_print(s, slen, "\n");
562	}
563	rdlen = sldns_read_uint16(*d);
564	ordlen = rdlen;
565	(*d) += 2;
566	(*dlen) -= 2;
567	if(*dlen < rdlen) {
568		w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
569		if(*dlen == 0)
570			return w + sldns_str_print(s, slen, ";Error missing rdata\n");
571		w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
572		return w + sldns_str_print(s, slen, "\n");
573	}
574	w += sldns_wire2str_rdata_unknown_scan(d, &rdlen, s, slen);
575	(*dlen) -= (ordlen-rdlen);
576	w += sldns_str_print(s, slen, "\n");
577	return w;
578}
579
580/** print rr comment for type DNSKEY */
581static int rr_comment_dnskey(char** s, size_t* slen, uint8_t* rr,
582	size_t rrlen, size_t dname_off)
583{
584	size_t rdlen;
585	uint8_t* rdata;
586	int flags, w = 0;
587	if(rrlen < dname_off + 10) return 0;
588	rdlen = sldns_read_uint16(rr+dname_off+8);
589	if(rrlen < dname_off + 10 + rdlen) return 0;
590	if(rdlen < 2) return 0;
591	rdata = rr + dname_off + 10;
592	flags = (int)sldns_read_uint16(rdata);
593	w += sldns_str_print(s, slen, " ;{");
594
595	/* id */
596	w += sldns_str_print(s, slen, "id = %u",
597		sldns_calc_keytag_raw(rdata, rdlen));
598
599	/* flags */
600	if((flags&LDNS_KEY_ZONE_KEY)) {
601		if((flags&LDNS_KEY_SEP_KEY))
602			w += sldns_str_print(s, slen, " (ksk)");
603		else 	w += sldns_str_print(s, slen, " (zsk)");
604	}
605
606	/* keysize */
607	if(rdlen > 4) {
608		w += sldns_str_print(s, slen, ", ");
609		w += sldns_str_print(s, slen, "size = %db",
610			(int)sldns_rr_dnskey_key_size_raw(
611			(unsigned char*)rdata+4, rdlen-4, (int)(rdata[3])));
612	}
613
614	w += sldns_str_print(s, slen, "}");
615	return w;
616}
617
618/** print rr comment for type RRSIG */
619static int rr_comment_rrsig(char** s, size_t* slen, uint8_t* rr,
620	size_t rrlen, size_t dname_off)
621{
622	size_t rdlen;
623	uint8_t* rdata;
624	if(rrlen < dname_off + 10) return 0;
625	rdlen = sldns_read_uint16(rr+dname_off+8);
626	if(rrlen < dname_off + 10 + rdlen) return 0;
627	rdata = rr + dname_off + 10;
628	if(rdlen < 18) return 0;
629	return sldns_str_print(s, slen, " ;{id = %d}",
630		(int)sldns_read_uint16(rdata+16));
631}
632
633/** print rr comment for type NSEC3 */
634static int rr_comment_nsec3(char** s, size_t* slen, uint8_t* rr,
635	size_t rrlen, size_t dname_off)
636{
637	size_t rdlen;
638	uint8_t* rdata;
639	int w = 0;
640	if(rrlen < dname_off + 10) return 0;
641	rdlen = sldns_read_uint16(rr+dname_off+8);
642	if(rrlen < dname_off + 10 + rdlen) return 0;
643	rdata = rr + dname_off + 10;
644	if(rdlen < 2) return 0;
645	if((rdata[1] & LDNS_NSEC3_VARS_OPTOUT_MASK))
646		w += sldns_str_print(s, slen, " ;{flags: optout}");
647	return w;
648}
649
650int sldns_wire2str_rr_comment_print(char** s, size_t* slen, uint8_t* rr,
651	size_t rrlen, size_t dname_off, uint16_t rrtype)
652{
653	if(rrtype == LDNS_RR_TYPE_DNSKEY) {
654		return rr_comment_dnskey(s, slen, rr, rrlen, dname_off);
655	} else if(rrtype == LDNS_RR_TYPE_RRSIG) {
656		return rr_comment_rrsig(s, slen, rr, rrlen, dname_off);
657	} else if(rrtype == LDNS_RR_TYPE_NSEC3) {
658		return rr_comment_nsec3(s, slen, rr, rrlen, dname_off);
659	}
660	return 0;
661}
662
663int sldns_wire2str_header_scan(uint8_t** d, size_t* dlen, char** s,
664	size_t* slen)
665{
666	int w = 0;
667	int opcode, rcode;
668	w += sldns_str_print(s, slen, ";; ->>HEADER<<- ");
669	if(*dlen == 0)
670		return w+sldns_str_print(s, slen, "Error empty packet");
671	if(*dlen < 4)
672		return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
673	opcode = (int)LDNS_OPCODE_WIRE(*d);
674	rcode = (int)LDNS_RCODE_WIRE(*d);
675	w += sldns_str_print(s, slen, "opcode: ");
676	w += sldns_wire2str_opcode_print(s, slen, opcode);
677	w += sldns_str_print(s, slen, ", ");
678	w += sldns_str_print(s, slen, "rcode: ");
679	w += sldns_wire2str_rcode_print(s, slen, rcode);
680	w += sldns_str_print(s, slen, ", ");
681	w += sldns_str_print(s, slen, "id: %d\n", (int)LDNS_ID_WIRE(*d));
682	w += sldns_str_print(s, slen, ";; flags:");
683	if(LDNS_QR_WIRE(*d)) w += sldns_str_print(s, slen, " qr");
684	if(LDNS_AA_WIRE(*d)) w += sldns_str_print(s, slen, " aa");
685	if(LDNS_TC_WIRE(*d)) w += sldns_str_print(s, slen, " tc");
686	if(LDNS_RD_WIRE(*d)) w += sldns_str_print(s, slen, " rd");
687	if(LDNS_CD_WIRE(*d)) w += sldns_str_print(s, slen, " cd");
688	if(LDNS_RA_WIRE(*d)) w += sldns_str_print(s, slen, " ra");
689	if(LDNS_AD_WIRE(*d)) w += sldns_str_print(s, slen, " ad");
690	if(LDNS_Z_WIRE(*d))  w += sldns_str_print(s, slen, " z");
691	w += sldns_str_print(s, slen, " ; ");
692	if(*dlen < LDNS_HEADER_SIZE)
693		return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
694	w += sldns_str_print(s, slen, "QUERY: %d, ", (int)LDNS_QDCOUNT(*d));
695	w += sldns_str_print(s, slen, "ANSWER: %d, ", (int)LDNS_ANCOUNT(*d));
696	w += sldns_str_print(s, slen, "AUTHORITY: %d, ", (int)LDNS_NSCOUNT(*d));
697	w += sldns_str_print(s, slen, "ADDITIONAL: %d ", (int)LDNS_ARCOUNT(*d));
698	*d += LDNS_HEADER_SIZE;
699	*dlen -= LDNS_HEADER_SIZE;
700	return w;
701}
702
703int sldns_wire2str_rdata_scan(uint8_t** d, size_t* dlen, char** s,
704	size_t* slen, uint16_t rrtype, uint8_t* pkt, size_t pktlen,
705	int* comprloop)
706{
707	/* try to prettyprint, but if that fails, use unknown format */
708	uint8_t* origd = *d;
709	char* origs = *s;
710	size_t origdlen = *dlen, origslen = *slen;
711	size_t r_cnt, r_max;
712	sldns_rdf_type rdftype;
713	int w = 0, n;
714
715	const sldns_rr_descriptor *desc = sldns_rr_descript(rrtype);
716	if(!desc) /* unknown format */
717		return sldns_wire2str_rdata_unknown_scan(d, dlen, s, slen);
718	/* dlen equals the rdatalen for the rdata */
719
720	r_max = sldns_rr_descriptor_maximum(desc);
721	for(r_cnt=0; r_cnt < r_max; r_cnt++) {
722		if(*dlen == 0) {
723			if(r_cnt < sldns_rr_descriptor_minimum(desc))
724				goto failed;
725			break; /* nothing more to print */
726		}
727		rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
728		if(r_cnt != 0)
729			w += sldns_str_print(s, slen, " ");
730		n = sldns_wire2str_rdf_scan(d, dlen, s, slen, rdftype,
731			pkt, pktlen, comprloop);
732		if(n == -1) {
733		failed:
734			/* failed, use unknown format */
735			*d = origd; *s = origs;
736			*dlen = origdlen; *slen = origslen;
737			return sldns_wire2str_rdata_unknown_scan(d, dlen,
738				s, slen);
739		}
740		w += n;
741	}
742	if(*dlen != 0) {
743		goto failed;
744	}
745	return w;
746}
747
748int sldns_wire2str_rdata_unknown_scan(uint8_t** d, size_t* dlen, char** s,
749	size_t* slen)
750{
751	int w = 0;
752
753	/* print length */
754	w += sldns_str_print(s, slen, "\\# %u", (unsigned)*dlen);
755
756	/* print rdlen in hex */
757	if(*dlen != 0)
758		w += sldns_str_print(s, slen, " ");
759	w += print_hex_buf(s, slen, *d, *dlen);
760	(*d) += *dlen;
761	(*dlen) = 0;
762	return w;
763}
764
765/** print and escape one character for a domain dname */
766static int dname_char_print(char** s, size_t* slen, uint8_t c)
767{
768	if(c == '.' || c == ';' || c == '(' || c == ')' || c == '\\')
769		return sldns_str_print(s, slen, "\\%c", c);
770	else if(!(isascii((unsigned char)c) && isgraph((unsigned char)c)))
771		return sldns_str_print(s, slen, "\\%03u", (unsigned)c);
772	/* plain printout */
773	if(*slen) {
774		**s = (char)c;
775		(*s)++;
776		(*slen)--;
777	}
778	return 1;
779}
780
781int sldns_wire2str_dname_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
782	uint8_t* pkt, size_t pktlen, int* comprloop)
783{
784	int w = 0;
785	/* spool labels onto the string, use compression if its there */
786	uint8_t* pos = *d;
787	unsigned i, counter=0;
788	unsigned maxcompr = MAX_COMPRESS_PTRS; /* loop detection, max compr ptrs */
789	int in_buf = 1;
790	if(comprloop) {
791		if(*comprloop != 0)
792			maxcompr = 30; /* for like ipv6 reverse name, per label */
793		if(*comprloop > 4)
794			maxcompr = 4; /* just don't want to spend time, any more */
795	}
796	if(*dlen == 0) return sldns_str_print(s, slen, "ErrorMissingDname");
797	if(*pos == 0) {
798		(*d)++;
799		(*dlen)--;
800		return sldns_str_print(s, slen, ".");
801	}
802	while((!pkt || pos < pkt+pktlen) && *pos) {
803		/* read label length */
804		uint8_t labellen = *pos++;
805		if(in_buf) { (*d)++; (*dlen)--; }
806
807		/* find out what sort of label we have */
808		if((labellen&0xc0) == 0xc0) {
809			/* compressed */
810			uint16_t target = 0;
811			if(in_buf && *dlen == 0)
812				return w + sldns_str_print(s, slen,
813					"ErrorPartialDname");
814			else if(!in_buf && pos+1 > pkt+pktlen)
815				return w + sldns_str_print(s, slen,
816					"ErrorPartialDname");
817			target = ((labellen&0x3f)<<8) | *pos;
818			if(in_buf) { (*d)++; (*dlen)--; }
819			/* move to target, if possible */
820			if(!pkt || target >= pktlen)
821				return w + sldns_str_print(s, slen,
822					"ErrorComprPtrOutOfBounds");
823			if(counter++ > maxcompr) {
824				if(comprloop && *comprloop < 10)
825					(*comprloop)++;
826				return w + sldns_str_print(s, slen,
827					"ErrorComprPtrLooped");
828			}
829			in_buf = 0;
830			pos = pkt+target;
831			continue;
832		} else if((labellen&0xc0)) {
833			/* notimpl label type */
834			w += sldns_str_print(s, slen,
835				"ErrorLABELTYPE%xIsUnknown",
836				(int)(labellen&0xc0));
837			return w;
838		}
839
840		/* spool label characters, end with '.' */
841		if(in_buf && *dlen < (size_t)labellen)
842			labellen = (uint8_t)*dlen;
843		else if(!in_buf && pos+(size_t)labellen > pkt+pktlen)
844			labellen = (uint8_t)(pkt + pktlen - pos);
845		for(i=0; i<(unsigned)labellen; i++) {
846			w += dname_char_print(s, slen, *pos++);
847		}
848		if(in_buf) {
849			(*d) += labellen;
850			(*dlen) -= labellen;
851			if(*dlen == 0) break;
852		}
853		w += sldns_str_print(s, slen, ".");
854	}
855	/* skip over final root label */
856	if(in_buf && *dlen > 0) { (*d)++; (*dlen)--; }
857	/* in case we printed no labels, terminate dname */
858	if(w == 0) w += sldns_str_print(s, slen, ".");
859	return w;
860}
861
862int sldns_wire2str_opcode_print(char** s, size_t* slen, int opcode)
863{
864	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_opcodes, opcode);
865	if (lt && lt->name) {
866		return sldns_str_print(s, slen, "%s", lt->name);
867	}
868	return sldns_str_print(s, slen, "OPCODE%u", (unsigned)opcode);
869}
870
871int sldns_wire2str_rcode_print(char** s, size_t* slen, int rcode)
872{
873	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rcodes, rcode);
874	if (lt && lt->name) {
875		return sldns_str_print(s, slen, "%s", lt->name);
876	}
877	return sldns_str_print(s, slen, "RCODE%u", (unsigned)rcode);
878}
879
880int sldns_wire2str_class_print(char** s, size_t* slen, uint16_t rrclass)
881{
882	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rr_classes,
883		(int)rrclass);
884	if (lt && lt->name) {
885		return sldns_str_print(s, slen, "%s", lt->name);
886	}
887	return sldns_str_print(s, slen, "CLASS%u", (unsigned)rrclass);
888}
889
890int sldns_wire2str_type_print(char** s, size_t* slen, uint16_t rrtype)
891{
892	const sldns_rr_descriptor *descriptor = sldns_rr_descript(rrtype);
893	if (descriptor && descriptor->_name) {
894		return sldns_str_print(s, slen, "%s", descriptor->_name);
895	}
896	return sldns_str_print(s, slen, "TYPE%u", (unsigned)rrtype);
897}
898
899int sldns_wire2str_edns_option_code_print(char** s, size_t* slen,
900	uint16_t opcode)
901{
902	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_edns_options,
903		(int)opcode);
904	if (lt && lt->name) {
905		return sldns_str_print(s, slen, "%s", lt->name);
906	}
907	return sldns_str_print(s, slen, "OPT%u", (unsigned)opcode);
908}
909
910int sldns_wire2str_class_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
911{
912	uint16_t c;
913	if(*dlen == 0) return 0;
914	if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
915	c = sldns_read_uint16(*d);
916	(*d)+=2;
917	(*dlen)-=2;
918	return sldns_wire2str_class_print(s, slen, c);
919}
920
921int sldns_wire2str_type_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
922{
923	uint16_t t;
924	if(*dlen == 0) return 0;
925	if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
926	t = sldns_read_uint16(*d);
927	(*d)+=2;
928	(*dlen)-=2;
929	return sldns_wire2str_type_print(s, slen, t);
930}
931
932int sldns_wire2str_ttl_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
933{
934	uint32_t ttl;
935	if(*dlen == 0) return 0;
936	if(*dlen < 4) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
937	ttl = sldns_read_uint32(*d);
938	(*d)+=4;
939	(*dlen)-=4;
940	return sldns_str_print(s, slen, "%u", (unsigned)ttl);
941}
942
943int sldns_wire2str_rdf_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
944	int rdftype, uint8_t* pkt, size_t pktlen, int* comprloop)
945{
946	if(*dlen == 0) return 0;
947	switch(rdftype) {
948	case LDNS_RDF_TYPE_NONE:
949		return 0;
950	case LDNS_RDF_TYPE_DNAME:
951		return sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
952	case LDNS_RDF_TYPE_INT8:
953		return sldns_wire2str_int8_scan(d, dlen, s, slen);
954	case LDNS_RDF_TYPE_INT16:
955		return sldns_wire2str_int16_scan(d, dlen, s, slen);
956	case LDNS_RDF_TYPE_INT32:
957		return sldns_wire2str_int32_scan(d, dlen, s, slen);
958	case LDNS_RDF_TYPE_PERIOD:
959		return sldns_wire2str_period_scan(d, dlen, s, slen);
960	case LDNS_RDF_TYPE_TSIGTIME:
961		return sldns_wire2str_tsigtime_scan(d, dlen, s, slen);
962	case LDNS_RDF_TYPE_A:
963		return sldns_wire2str_a_scan(d, dlen, s, slen);
964	case LDNS_RDF_TYPE_AAAA:
965		return sldns_wire2str_aaaa_scan(d, dlen, s, slen);
966	case LDNS_RDF_TYPE_STR:
967		return sldns_wire2str_str_scan(d, dlen, s, slen);
968	case LDNS_RDF_TYPE_APL:
969		return sldns_wire2str_apl_scan(d, dlen, s, slen);
970	case LDNS_RDF_TYPE_B32_EXT:
971		return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
972	case LDNS_RDF_TYPE_B64:
973		return sldns_wire2str_b64_scan(d, dlen, s, slen);
974	case LDNS_RDF_TYPE_HEX:
975		return sldns_wire2str_hex_scan(d, dlen, s, slen);
976	case LDNS_RDF_TYPE_NSEC:
977		return sldns_wire2str_nsec_scan(d, dlen, s, slen);
978	case LDNS_RDF_TYPE_NSEC3_SALT:
979		return sldns_wire2str_nsec3_salt_scan(d, dlen, s, slen);
980	case LDNS_RDF_TYPE_TYPE:
981		return sldns_wire2str_type_scan(d, dlen, s, slen);
982	case LDNS_RDF_TYPE_CLASS:
983		return sldns_wire2str_class_scan(d, dlen, s, slen);
984	case LDNS_RDF_TYPE_CERT_ALG:
985		return sldns_wire2str_cert_alg_scan(d, dlen, s, slen);
986	case LDNS_RDF_TYPE_ALG:
987		return sldns_wire2str_alg_scan(d, dlen, s, slen);
988	case LDNS_RDF_TYPE_UNKNOWN:
989		return sldns_wire2str_unknown_scan(d, dlen, s, slen);
990	case LDNS_RDF_TYPE_TIME:
991		return sldns_wire2str_time_scan(d, dlen, s, slen);
992	case LDNS_RDF_TYPE_LOC:
993		return sldns_wire2str_loc_scan(d, dlen, s, slen);
994	case LDNS_RDF_TYPE_WKS:
995	case LDNS_RDF_TYPE_SERVICE:
996		return sldns_wire2str_wks_scan(d, dlen, s, slen);
997	case LDNS_RDF_TYPE_NSAP:
998		return sldns_wire2str_nsap_scan(d, dlen, s, slen);
999	case LDNS_RDF_TYPE_ATMA:
1000		return sldns_wire2str_atma_scan(d, dlen, s, slen);
1001	case LDNS_RDF_TYPE_IPSECKEY:
1002		return sldns_wire2str_ipseckey_scan(d, dlen, s, slen, pkt,
1003			pktlen, comprloop);
1004	case LDNS_RDF_TYPE_HIP:
1005		return sldns_wire2str_hip_scan(d, dlen, s, slen);
1006	case LDNS_RDF_TYPE_INT16_DATA:
1007		return sldns_wire2str_int16_data_scan(d, dlen, s, slen);
1008	case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
1009		return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
1010	case LDNS_RDF_TYPE_ILNP64:
1011		return sldns_wire2str_ilnp64_scan(d, dlen, s, slen);
1012	case LDNS_RDF_TYPE_EUI48:
1013		return sldns_wire2str_eui48_scan(d, dlen, s, slen);
1014	case LDNS_RDF_TYPE_EUI64:
1015		return sldns_wire2str_eui64_scan(d, dlen, s, slen);
1016	case LDNS_RDF_TYPE_TAG:
1017		return sldns_wire2str_tag_scan(d, dlen, s, slen);
1018	case LDNS_RDF_TYPE_LONG_STR:
1019		return sldns_wire2str_long_str_scan(d, dlen, s, slen);
1020	case LDNS_RDF_TYPE_TSIGERROR:
1021		return sldns_wire2str_tsigerror_scan(d, dlen, s, slen);
1022	}
1023	/* unknown rdf type */
1024	return -1;
1025}
1026
1027int sldns_wire2str_int8_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1028{
1029	int w;
1030	if(*dl < 1) return -1;
1031	w = sldns_str_print(s, sl, "%u", (unsigned)**d);
1032	(*d)++;
1033	(*dl)--;
1034	return w;
1035}
1036
1037int sldns_wire2str_int16_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1038{
1039	int w;
1040	if(*dl < 2) return -1;
1041	w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint16(*d));
1042	(*d)+=2;
1043	(*dl)-=2;
1044	return w;
1045}
1046
1047int sldns_wire2str_int32_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1048{
1049	int w;
1050	if(*dl < 4) return -1;
1051	w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint32(*d));
1052	(*d)+=4;
1053	(*dl)-=4;
1054	return w;
1055}
1056
1057int sldns_wire2str_period_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1058{
1059	int w;
1060	if(*dl < 4) return -1;
1061	w = sldns_str_print(s, sl, "%u", (unsigned)sldns_read_uint32(*d));
1062	(*d)+=4;
1063	(*dl)-=4;
1064	return w;
1065}
1066
1067int sldns_wire2str_tsigtime_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1068{
1069	/* tsigtime is 48 bits network order unsigned integer */
1070	int w;
1071	uint64_t tsigtime = 0;
1072	uint64_t d0, d1, d2, d3, d4, d5;
1073	if(*dl < 6) return -1;
1074	d0 = (*d)[0]; /* cast to uint64 for shift operations */
1075	d1 = (*d)[1];
1076	d2 = (*d)[2];
1077	d3 = (*d)[3];
1078	d4 = (*d)[4];
1079	d5 = (*d)[5];
1080	tsigtime = (d0<<40) | (d1<<32) | (d2<<24) | (d3<<16) | (d4<<8) | d5;
1081#ifndef USE_WINSOCK
1082	w = sldns_str_print(s, sl, "%llu", (long long)tsigtime);
1083#else
1084	w = sldns_str_print(s, sl, "%I64u", (long long)tsigtime);
1085#endif
1086	(*d)+=6;
1087	(*dl)-=6;
1088	return w;
1089}
1090
1091int sldns_wire2str_a_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1092{
1093	char buf[32];
1094	int w;
1095	if(*dl < 4) return -1;
1096	if(!inet_ntop(AF_INET, *d, buf, (socklen_t)sizeof(buf)))
1097		return -1;
1098	w = sldns_str_print(s, sl, "%s", buf);
1099	(*d)+=4;
1100	(*dl)-=4;
1101	return w;
1102}
1103
1104int sldns_wire2str_aaaa_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1105{
1106#ifdef AF_INET6
1107	char buf[64];
1108	int w;
1109	if(*dl < 16) return -1;
1110	if(!inet_ntop(AF_INET6, *d, buf, (socklen_t)sizeof(buf)))
1111		return -1;
1112	w = sldns_str_print(s, sl, "%s", buf);
1113	(*d)+=16;
1114	(*dl)-=16;
1115	return w;
1116#else
1117	return -1;
1118#endif
1119}
1120
1121/** printout escaped TYPE_STR character */
1122static int str_char_print(char** s, size_t* sl, uint8_t c)
1123{
1124	if(isprint((unsigned char)c) || c == '\t') {
1125		if(c == '\"' || c == '\\')
1126			return sldns_str_print(s, sl, "\\%c", c);
1127		if(*sl) {
1128			**s = (char)c;
1129			(*s)++;
1130			(*sl)--;
1131		}
1132		return 1;
1133	}
1134	return sldns_str_print(s, sl, "\\%03u", (unsigned)c);
1135}
1136
1137int sldns_wire2str_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1138{
1139	int w = 0;
1140	size_t i, len;
1141	if(*dl < 1) return -1;
1142	len = **d;
1143	if(*dl < 1+len) return -1;
1144	(*d)++;
1145	(*dl)--;
1146	w += sldns_str_print(s, sl, "\"");
1147	for(i=0; i<len; i++)
1148		w += str_char_print(s, sl, (*d)[i]);
1149	w += sldns_str_print(s, sl, "\"");
1150	(*d)+=len;
1151	(*dl)-=len;
1152	return w;
1153}
1154
1155int sldns_wire2str_apl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1156{
1157	int i, w = 0;
1158	uint16_t family;
1159	uint8_t negation, prefix, adflength;
1160	if(*dl < 4) return -1;
1161	family = sldns_read_uint16(*d);
1162	prefix = (*d)[2];
1163	negation = ((*d)[3] & LDNS_APL_NEGATION);
1164	adflength = ((*d)[3] & LDNS_APL_MASK);
1165	if(*dl < 4+(size_t)adflength) return -1;
1166	if(family != LDNS_APL_IP4 && family != LDNS_APL_IP6)
1167		return -1; /* unknown address family */
1168	if(negation)
1169		w += sldns_str_print(s, sl, "!");
1170	w += sldns_str_print(s, sl, "%u:", (unsigned)family);
1171	if(family == LDNS_APL_IP4) {
1172		/* check if prefix <32 ? */
1173		/* address is variable length 0 - 4 */
1174		for(i=0; i<4; i++) {
1175			if(i > 0)
1176				w += sldns_str_print(s, sl, ".");
1177			if(i < (int)adflength)
1178				w += sldns_str_print(s, sl, "%d", (*d)[4+i]);
1179			else	w += sldns_str_print(s, sl, "0");
1180		}
1181	} else if(family == LDNS_APL_IP6) {
1182		/* check if prefix <128 ? */
1183		/* address is variable length 0 - 16 */
1184		for(i=0; i<16; i++) {
1185			if(i%2 == 0 && i>0)
1186				w += sldns_str_print(s, sl, ":");
1187			if(i < (int)adflength)
1188				w += sldns_str_print(s, sl, "%02x", (*d)[4+i]);
1189			else	w += sldns_str_print(s, sl, "00");
1190		}
1191	}
1192	w += sldns_str_print(s, sl, "/%u", (unsigned)prefix);
1193	(*d) += 4+adflength;
1194	(*dl) -= 4+adflength;
1195	return w;
1196}
1197
1198int sldns_wire2str_b32_ext_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1199{
1200	size_t datalen;
1201	size_t sz;
1202	if(*dl < 1) return -1;
1203	datalen = (*d)[0];
1204	if(*dl < 1+datalen) return -1;
1205	sz = sldns_b32_ntop_calculate_size(datalen);
1206	if(*sl < sz+1) {
1207		(*d) += datalen+1;
1208		(*dl) -= (datalen+1);
1209		return (int)sz; /* out of space really, but would need buffer
1210			in order to truncate the output */
1211	}
1212	sldns_b32_ntop_extended_hex((*d)+1, datalen, *s, *sl);
1213	(*d) += datalen+1;
1214	(*dl) -= (datalen+1);
1215	(*s) += sz;
1216	(*sl) -= sz;
1217	return (int)sz;
1218}
1219
1220/** scan number of bytes from wire into b64 presentation format */
1221static int sldns_wire2str_b64_scan_num(uint8_t** d, size_t* dl, char** s,
1222	size_t* sl, size_t num)
1223{
1224	/* b64_ntop_calculate size includes null at the end */
1225	size_t sz = sldns_b64_ntop_calculate_size(num)-1;
1226	if(*sl < sz+1) {
1227		(*d) += num;
1228		(*dl) -= num;
1229		return (int)sz; /* out of space really, but would need buffer
1230			in order to truncate the output */
1231	}
1232	sldns_b64_ntop(*d, num, *s, *sl);
1233	(*d) += num;
1234	(*dl) -= num;
1235	(*s) += sz;
1236	(*sl) -= sz;
1237	return (int)sz;
1238}
1239
1240int sldns_wire2str_b64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1241{
1242	if(*dl == 0) {
1243		return sldns_str_print(s, sl, "0");
1244	}
1245	return sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1246}
1247
1248int sldns_wire2str_hex_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1249{
1250	if(*dl == 0) {
1251		return sldns_str_print(s, sl, "0");
1252	}
1253	return print_remainder_hex("", d, dl, s, sl);
1254}
1255
1256int sldns_wire2str_nsec_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1257{
1258	uint8_t* p = *d;
1259	size_t pl = *dl;
1260	unsigned i, bit, window, block_len;
1261	uint16_t t;
1262	int w = 0;
1263
1264	/* check for errors */
1265	while(pl) {
1266		if(pl < 2) return -1;
1267		block_len = (unsigned)p[1];
1268		if(pl < 2+block_len) return -1;
1269		p += block_len+2;
1270		pl -= block_len+2;
1271	}
1272
1273	/* do it */
1274	p = *d;
1275	pl = *dl;
1276	while(pl) {
1277		if(pl < 2) return -1; /* cannot happen */
1278		window = (unsigned)p[0];
1279		block_len = (unsigned)p[1];
1280		if(pl < 2+block_len) return -1; /* cannot happen */
1281		p += 2;
1282		for(i=0; i<block_len; i++) {
1283			if(p[i] == 0) continue;
1284			/* base type number for this octet */
1285			t = ((window)<<8) | (i << 3);
1286			for(bit=0; bit<8; bit++) {
1287				if((p[i]&(0x80>>bit))) {
1288					if(w) w += sldns_str_print(s, sl, " ");
1289					w += sldns_wire2str_type_print(s, sl,
1290						t+bit);
1291				}
1292			}
1293		}
1294		p += block_len;
1295		pl -= block_len+2;
1296	}
1297	(*d) += *dl;
1298	(*dl) = 0;
1299	return w;
1300}
1301
1302int sldns_wire2str_nsec3_salt_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1303{
1304	size_t salt_len;
1305	int w;
1306	if(*dl < 1) return -1;
1307	salt_len = (size_t)(*d)[0];
1308	if(*dl < 1+salt_len) return -1;
1309	(*d)++;
1310	(*dl)--;
1311	if(salt_len == 0) {
1312		return sldns_str_print(s, sl, "-");
1313	}
1314	w = print_hex_buf(s, sl, *d, salt_len);
1315	(*dl)-=salt_len;
1316	(*d)+=salt_len;
1317	return w;
1318}
1319
1320int sldns_wire2str_cert_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1321{
1322	sldns_lookup_table *lt;
1323	int data, w;
1324	if(*dl < 2) return -1;
1325	data = (int)sldns_read_uint16(*d);
1326	lt = sldns_lookup_by_id(sldns_cert_algorithms, data);
1327	if(lt && lt->name)
1328		w = sldns_str_print(s, sl, "%s", lt->name);
1329	else 	w = sldns_str_print(s, sl, "%d", data);
1330	(*dl)-=2;
1331	(*d)+=2;
1332	return w;
1333}
1334
1335int sldns_wire2str_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1336{
1337	/* don't use algorithm mnemonics in the presentation format
1338	 * this kind of got sneaked into the rfc's */
1339	return sldns_wire2str_int8_scan(d, dl, s, sl);
1340}
1341
1342int sldns_wire2str_unknown_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1343{
1344	return sldns_wire2str_rdata_unknown_scan(d, dl, s, sl);
1345}
1346
1347int sldns_wire2str_time_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1348{
1349	/* create a YYYYMMDDHHMMSS string if possible */
1350	struct tm tm;
1351	char date_buf[16];
1352	uint32_t t;
1353	memset(&tm, 0, sizeof(tm));
1354	if(*dl < 4) return -1;
1355	t = sldns_read_uint32(*d);
1356	date_buf[15]=0;
1357	if(sldns_serial_arithmetics_gmtime_r(t, time(NULL), &tm) &&
1358		strftime(date_buf, 15, "%Y%m%d%H%M%S", &tm)) {
1359		(*d) += 4;
1360		(*dl) -= 4;
1361		return sldns_str_print(s, sl, "%s", date_buf);
1362	}
1363	return -1;
1364}
1365
1366static int
1367loc_cm_print(char** str, size_t* sl, uint8_t mantissa, uint8_t exponent)
1368{
1369	int w = 0;
1370	uint8_t i;
1371	/* is it 0.<two digits> ? */
1372	if(exponent < 2) {
1373		if(exponent == 1)
1374			mantissa *= 10;
1375		return sldns_str_print(str, sl, "0.%02ld", (long)mantissa);
1376	}
1377	/* always <digit><string of zeros> */
1378	w += sldns_str_print(str, sl, "%d", (int)mantissa);
1379	for(i=0; i<exponent-2; i++)
1380		w += sldns_str_print(str, sl, "0");
1381	return w;
1382}
1383
1384int sldns_wire2str_loc_scan(uint8_t** d, size_t* dl, char** str, size_t* sl)
1385{
1386	/* we could do checking (ie degrees < 90 etc)? */
1387	uint8_t version;
1388	uint8_t size;
1389	uint8_t horizontal_precision;
1390	uint8_t vertical_precision;
1391	uint32_t longitude;
1392	uint32_t latitude;
1393	uint32_t altitude;
1394	char northerness;
1395	char easterness;
1396	uint32_t h;
1397	uint32_t m;
1398	double s;
1399	uint32_t equator = (uint32_t)1 << 31; /* 2**31 */
1400	int w = 0;
1401
1402	if(*dl < 16) return -1;
1403	version = (*d)[0];
1404	if(version != 0)
1405		return sldns_wire2str_hex_scan(d, dl, str, sl);
1406	size = (*d)[1];
1407	horizontal_precision = (*d)[2];
1408	vertical_precision = (*d)[3];
1409
1410	latitude = sldns_read_uint32((*d)+4);
1411	longitude = sldns_read_uint32((*d)+8);
1412	altitude = sldns_read_uint32((*d)+12);
1413
1414	if (latitude > equator) {
1415		northerness = 'N';
1416		latitude = latitude - equator;
1417	} else {
1418		northerness = 'S';
1419		latitude = equator - latitude;
1420	}
1421	h = latitude / (1000 * 60 * 60);
1422	latitude = latitude % (1000 * 60 * 60);
1423	m = latitude / (1000 * 60);
1424	latitude = latitude % (1000 * 60);
1425	s = (double) latitude / 1000.0;
1426	w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1427		h, m, s, northerness);
1428
1429	if (longitude > equator) {
1430		easterness = 'E';
1431		longitude = longitude - equator;
1432	} else {
1433		easterness = 'W';
1434		longitude = equator - longitude;
1435	}
1436	h = longitude / (1000 * 60 * 60);
1437	longitude = longitude % (1000 * 60 * 60);
1438	m = longitude / (1000 * 60);
1439	longitude = longitude % (1000 * 60);
1440	s = (double) longitude / (1000.0);
1441	w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1442		h, m, s, easterness);
1443
1444	s = ((double) altitude) / 100;
1445	s -= 100000;
1446
1447	if(altitude%100 != 0)
1448		w += sldns_str_print(str, sl, "%.2f", s);
1449	else
1450		w += sldns_str_print(str, sl, "%.0f", s);
1451
1452	w += sldns_str_print(str, sl, "m ");
1453
1454	w += loc_cm_print(str, sl, (size & 0xf0) >> 4, size & 0x0f);
1455	w += sldns_str_print(str, sl, "m ");
1456
1457	w += loc_cm_print(str, sl, (horizontal_precision & 0xf0) >> 4,
1458		horizontal_precision & 0x0f);
1459	w += sldns_str_print(str, sl, "m ");
1460
1461	w += loc_cm_print(str, sl, (vertical_precision & 0xf0) >> 4,
1462		vertical_precision & 0x0f);
1463	w += sldns_str_print(str, sl, "m");
1464
1465	(*d)+=16;
1466	(*dl)-=16;
1467	return w;
1468}
1469
1470int sldns_wire2str_wks_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1471{
1472	/* protocol, followed by bitmap of services */
1473	const char* proto_name = NULL;
1474	struct protoent *protocol;
1475	struct servent *service;
1476	uint8_t protocol_nr;
1477	int bit, port, w = 0;
1478	size_t i;
1479	/* we cannot print with strings because they
1480	 * are not portable, the presentation format may
1481	 * not be able to be read in on another computer.  */
1482	int print_symbols = 0;
1483
1484	/* protocol */
1485	if(*dl < 1) return -1;
1486	protocol_nr = (*d)[0];
1487	(*d)++;
1488	(*dl)--;
1489	protocol = getprotobynumber((int)protocol_nr);
1490	if(protocol && (protocol->p_name != NULL)) {
1491		w += sldns_str_print(s, sl, "%s", protocol->p_name);
1492		proto_name = protocol->p_name;
1493	} else if(protocol_nr == 6) {
1494		w += sldns_str_print(s, sl, "tcp");
1495	} else if(protocol_nr == 17) {
1496		w += sldns_str_print(s, sl, "udp");
1497	} else	{
1498		w += sldns_str_print(s, sl, "%u", (unsigned)protocol_nr);
1499	}
1500
1501	for(i=0; i<*dl; i++) {
1502		if((*d)[i] == 0)
1503			continue;
1504		for(bit=0; bit<8; bit++) {
1505			if(!(((*d)[i])&(0x80>>bit)))
1506				continue;
1507			port = (int)i*8 + bit;
1508
1509			if(!print_symbols)
1510				service = NULL;
1511			else
1512				service = getservbyport(
1513					(int)htons((uint16_t)port), proto_name);
1514			if(service && service->s_name)
1515				w += sldns_str_print(s, sl, " %s",
1516					service->s_name);
1517			else 	w += sldns_str_print(s, sl, " %u",
1518					(unsigned)port);
1519		}
1520	}
1521
1522#ifdef HAVE_ENDSERVENT
1523	endservent();
1524#endif
1525#ifdef HAVE_ENDPROTOENT
1526        endprotoent();
1527#endif
1528	(*d) += *dl;
1529	(*dl) = 0;
1530	return w;
1531}
1532
1533int sldns_wire2str_nsap_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1534{
1535	return print_remainder_hex("0x", d, dl, s, sl);
1536}
1537
1538int sldns_wire2str_atma_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1539{
1540	return print_remainder_hex("", d, dl, s, sl);
1541}
1542
1543/* internal scan routine that can modify arguments on failure */
1544static int sldns_wire2str_ipseckey_scan_internal(uint8_t** d, size_t* dl,
1545	char** s, size_t* sl, uint8_t* pkt, size_t pktlen, int* comprloop)
1546{
1547	/* http://www.ietf.org/internet-drafts/draft-ietf-ipseckey-rr-12.txt*/
1548	uint8_t precedence, gateway_type, algorithm;
1549	int w = 0;
1550
1551	if(*dl < 3) return -1;
1552	precedence = (*d)[0];
1553	gateway_type = (*d)[1];
1554	algorithm = (*d)[2];
1555	if(gateway_type > 3)
1556		return -1; /* unknown */
1557	(*d)+=3;
1558	(*dl)-=3;
1559	w += sldns_str_print(s, sl, "%d %d %d ",
1560		(int)precedence, (int)gateway_type, (int)algorithm);
1561
1562	switch(gateway_type) {
1563	case 0: /* no gateway */
1564		w += sldns_str_print(s, sl, ".");
1565		break;
1566	case 1: /* ip4 */
1567		w += sldns_wire2str_a_scan(d, dl, s, sl);
1568		break;
1569	case 2: /* ip6 */
1570		w += sldns_wire2str_aaaa_scan(d, dl, s, sl);
1571		break;
1572	case 3: /* dname */
1573		w += sldns_wire2str_dname_scan(d, dl, s, sl, pkt, pktlen, comprloop);
1574		break;
1575	default: /* unknown */
1576		return -1;
1577	}
1578
1579	if(*dl < 1)
1580		return -1;
1581	w += sldns_str_print(s, sl, " ");
1582	w += sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1583	return w;
1584}
1585
1586int sldns_wire2str_ipseckey_scan(uint8_t** d, size_t* dl, char** s, size_t* sl,
1587	uint8_t* pkt, size_t pktlen, int* comprloop)
1588{
1589	uint8_t* od = *d;
1590	char* os = *s;
1591	size_t odl = *dl, osl = *sl;
1592	int w=sldns_wire2str_ipseckey_scan_internal(d, dl, s, sl, pkt, pktlen, comprloop);
1593	if(w == -1) {
1594		*d = od;
1595		*s = os;
1596		*dl = odl;
1597		*sl = osl;
1598		return -1;
1599	}
1600	return w;
1601}
1602
1603int sldns_wire2str_hip_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1604{
1605	int w;
1606	uint8_t algo, hitlen;
1607	uint16_t pklen;
1608
1609	/* read lengths */
1610	if(*dl < 4)
1611		return -1;
1612	hitlen = (*d)[0];
1613	algo = (*d)[1];
1614	pklen = sldns_read_uint16((*d)+2);
1615	if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen)
1616		return -1;
1617
1618	/* write: algo hit pubkey */
1619	w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
1620	w += print_hex_buf(s, sl, (*d)+4, hitlen);
1621	w += sldns_str_print(s, sl, " ");
1622	(*d)+=4+hitlen;
1623	(*dl)-= (4+hitlen);
1624	w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
1625	return w;
1626}
1627
1628int sldns_wire2str_int16_data_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1629{
1630	int w;
1631	uint16_t n;
1632	if(*dl < 2)
1633		return -1;
1634	n = sldns_read_uint16(*d);
1635	if(*dl < 2+(size_t)n)
1636		return -1;
1637	(*d)+=2;
1638	(*dl)-=2;
1639	if(n == 0) {
1640		return sldns_str_print(s, sl, "0");
1641	}
1642	w = sldns_str_print(s, sl, "%u ", (unsigned)n);
1643	w += sldns_wire2str_b64_scan_num(d, dl, s, sl, n);
1644	return w;
1645}
1646
1647int sldns_wire2str_nsec3_next_owner_scan(uint8_t** d, size_t* dl, char** s,
1648	size_t* sl)
1649{
1650	return sldns_wire2str_b32_ext_scan(d, dl, s, sl);
1651}
1652
1653int sldns_wire2str_ilnp64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1654{
1655	int w;
1656	if(*dl < 8)
1657		return -1;
1658	w = sldns_str_print(s, sl, "%.4x:%.4x:%.4x:%.4x",
1659		sldns_read_uint16(*d), sldns_read_uint16((*d)+2),
1660		sldns_read_uint16((*d)+4), sldns_read_uint16((*d)+6));
1661	(*d)+=8;
1662	(*dl)-=8;
1663	return w;
1664}
1665
1666int sldns_wire2str_eui48_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1667{
1668	int w;
1669	if(*dl < 6)
1670		return -1;
1671	w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1672		(*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5]);
1673	(*d)+=6;
1674	(*dl)-=6;
1675	return w;
1676}
1677
1678int sldns_wire2str_eui64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1679{
1680	int w;
1681	if(*dl < 8)
1682		return -1;
1683	w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1684		(*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5],
1685		(*d)[6], (*d)[7]);
1686	(*d)+=8;
1687	(*dl)-=8;
1688	return w;
1689}
1690
1691int sldns_wire2str_tag_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1692{
1693	size_t i, n;
1694	int w = 0;
1695	if(*dl < 1)
1696		return -1;
1697	n = (size_t)((*d)[0]);
1698	if(*dl < 1+n)
1699		return -1;
1700	for(i=0; i<n; i++)
1701		if(!isalnum((unsigned char)(*d)[i+1]))
1702			return -1;
1703	for(i=0; i<n; i++)
1704		w += sldns_str_print(s, sl, "%c", (char)(*d)[i+1]);
1705	(*d)+=n+1;
1706	(*dl)-=(n+1);
1707	return w;
1708}
1709
1710int sldns_wire2str_long_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1711{
1712	size_t i;
1713	int w = 0;
1714	w += sldns_str_print(s, sl, "\"");
1715	for(i=0; i<*dl; i++)
1716		w += str_char_print(s, sl, (*d)[i]);
1717	w += sldns_str_print(s, sl, "\"");
1718	(*d)+=*dl;
1719	(*dl)=0;
1720	return w;
1721}
1722
1723int sldns_wire2str_tsigerror_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1724{
1725	sldns_lookup_table *lt;
1726	int data, w;
1727	if(*dl < 2) return -1;
1728	data = (int)sldns_read_uint16(*d);
1729	lt = sldns_lookup_by_id(sldns_tsig_errors, data);
1730	if(lt && lt->name)
1731		w = sldns_str_print(s, sl, "%s", lt->name);
1732	else 	w = sldns_str_print(s, sl, "%d", data);
1733	(*dl)-=2;
1734	(*d)+=2;
1735	return w;
1736}
1737
1738int sldns_wire2str_edns_llq_print(char** s, size_t* sl, uint8_t* data,
1739	size_t len)
1740{
1741	/* LLQ constants */
1742	const char* llq_errors[] = {"NO-ERROR", "SERV-FULL", "STATIC",
1743		"FORMAT-ERR", "NO-SUCH-LLQ", "BAD-VERS", "UNKNOWN_ERR"};
1744	const unsigned int llq_errors_num = 7;
1745	const char* llq_opcodes[] = {"LLQ-SETUP", "LLQ-REFRESH", "LLQ-EVENT"};
1746	const unsigned int llq_opcodes_num = 3;
1747	uint16_t version, llq_opcode, error_code;
1748	uint64_t llq_id;
1749	uint32_t lease_life; /* Requested or granted life of LLQ, in seconds */
1750	int w = 0;
1751
1752	/* read the record */
1753	if(len != 18) {
1754		w += sldns_str_print(s, sl, "malformed LLQ ");
1755		w += print_hex_buf(s, sl, data, len);
1756		return w;
1757	}
1758	version = sldns_read_uint16(data);
1759	llq_opcode = sldns_read_uint16(data+2);
1760	error_code = sldns_read_uint16(data+4);
1761	memmove(&llq_id, data+6, sizeof(llq_id));
1762	lease_life = sldns_read_uint32(data+14);
1763
1764	/* print it */
1765	w += sldns_str_print(s, sl, "v%d ", (int)version);
1766	if(llq_opcode < llq_opcodes_num)
1767		w += sldns_str_print(s, sl, "%s", llq_opcodes[llq_opcode]);
1768	else	w += sldns_str_print(s, sl, "opcode %d", (int)llq_opcode);
1769	if(error_code < llq_errors_num)
1770		w += sldns_str_print(s, sl, " %s", llq_errors[error_code]);
1771	else	w += sldns_str_print(s, sl, " error %d", (int)error_code);
1772#ifndef USE_WINSOCK
1773	w += sldns_str_print(s, sl, " id %llx lease-life %lu",
1774		(unsigned long long)llq_id, (unsigned long)lease_life);
1775#else
1776	w += sldns_str_print(s, sl, " id %I64x lease-life %lu",
1777		(unsigned long long)llq_id, (unsigned long)lease_life);
1778#endif
1779	return w;
1780}
1781
1782int sldns_wire2str_edns_ul_print(char** s, size_t* sl, uint8_t* data,
1783	size_t len)
1784{
1785	uint32_t lease;
1786	int w = 0;
1787	if(len != 4) {
1788		w += sldns_str_print(s, sl, "malformed UL ");
1789		w += print_hex_buf(s, sl, data, len);
1790		return w;
1791	}
1792	lease = sldns_read_uint32(data);
1793	w += sldns_str_print(s, sl, "lease %lu", (unsigned long)lease);
1794	return w;
1795}
1796
1797int sldns_wire2str_edns_nsid_print(char** s, size_t* sl, uint8_t* data,
1798	size_t len)
1799{
1800	int w = 0;
1801	size_t i, printed=0;
1802	w += print_hex_buf(s, sl, data, len);
1803	for(i=0; i<len; i++) {
1804		if(isprint((unsigned char)data[i]) || data[i] == '\t') {
1805			if(!printed) {
1806				w += sldns_str_print(s, sl, " (");
1807				printed = 1;
1808			}
1809			w += sldns_str_print(s, sl, "%c", (char)data[i]);
1810		}
1811	}
1812	if(printed)
1813		w += sldns_str_print(s, sl, ")");
1814	return w;
1815}
1816
1817int sldns_wire2str_edns_dau_print(char** s, size_t* sl, uint8_t* data,
1818	size_t len)
1819{
1820	sldns_lookup_table *lt;
1821	size_t i;
1822	int w = 0;
1823	for(i=0; i<len; i++) {
1824		lt = sldns_lookup_by_id(sldns_algorithms, (int)data[i]);
1825		if(lt && lt->name)
1826			w += sldns_str_print(s, sl, " %s", lt->name);
1827		else 	w += sldns_str_print(s, sl, " %d", (int)data[i]);
1828	}
1829	return w;
1830}
1831
1832int sldns_wire2str_edns_dhu_print(char** s, size_t* sl, uint8_t* data,
1833	size_t len)
1834{
1835	sldns_lookup_table *lt;
1836	size_t i;
1837	int w = 0;
1838	for(i=0; i<len; i++) {
1839		lt = sldns_lookup_by_id(sldns_hashes, (int)data[i]);
1840		if(lt && lt->name)
1841			w += sldns_str_print(s, sl, " %s", lt->name);
1842		else 	w += sldns_str_print(s, sl, " %d", (int)data[i]);
1843	}
1844	return w;
1845}
1846
1847int sldns_wire2str_edns_n3u_print(char** s, size_t* sl, uint8_t* data,
1848	size_t len)
1849{
1850	size_t i;
1851	int w = 0;
1852	for(i=0; i<len; i++) {
1853		if(data[i] == 1)
1854			w += sldns_str_print(s, sl, " SHA1");
1855		else 	w += sldns_str_print(s, sl, " %d", (int)data[i]);
1856	}
1857	return w;
1858}
1859
1860int sldns_wire2str_edns_subnet_print(char** s, size_t* sl, uint8_t* data,
1861	size_t len)
1862{
1863	int w = 0;
1864	uint16_t family;
1865	uint8_t source, scope;
1866	if(len < 4) {
1867		w += sldns_str_print(s, sl, "malformed subnet ");
1868		w += print_hex_buf(s, sl, data, len);
1869		return w;
1870	}
1871	family = sldns_read_uint16(data);
1872	source = data[2];
1873	scope = data[3];
1874	if(family == 1) {
1875		/* IP4 */
1876		char buf[64];
1877		uint8_t ip4[4];
1878		memset(ip4, 0, sizeof(ip4));
1879		if(len-4 > 4) {
1880			w += sldns_str_print(s, sl, "trailingdata:");
1881			w += print_hex_buf(s, sl, data+4+4, len-4-4);
1882			w += sldns_str_print(s, sl, " ");
1883			len = 4+4;
1884		}
1885		memmove(ip4, data+4, len-4);
1886		if(!inet_ntop(AF_INET, ip4, buf, (socklen_t)sizeof(buf))) {
1887			w += sldns_str_print(s, sl, "ip4ntoperror ");
1888			w += print_hex_buf(s, sl, data+4+4, len-4-4);
1889		} else {
1890			w += sldns_str_print(s, sl, "%s", buf);
1891		}
1892	} else if(family == 2) {
1893		/* IP6 */
1894		char buf[64];
1895		uint8_t ip6[16];
1896		memset(ip6, 0, sizeof(ip6));
1897		if(len-4 > 16) {
1898			w += sldns_str_print(s, sl, "trailingdata:");
1899			w += print_hex_buf(s, sl, data+4+16, len-4-16);
1900			w += sldns_str_print(s, sl, " ");
1901			len = 4+16;
1902		}
1903		memmove(ip6, data+4, len-4);
1904#ifdef AF_INET6
1905		if(!inet_ntop(AF_INET6, ip6, buf, (socklen_t)sizeof(buf))) {
1906			w += sldns_str_print(s, sl, "ip6ntoperror ");
1907			w += print_hex_buf(s, sl, data+4+4, len-4-4);
1908		} else {
1909			w += sldns_str_print(s, sl, "%s", buf);
1910		}
1911#else
1912		w += print_hex_buf(s, sl, data+4+4, len-4-4);
1913#endif
1914	} else {
1915		/* unknown */
1916		w += sldns_str_print(s, sl, "family %d ",
1917			(int)family);
1918		w += print_hex_buf(s, sl, data, len);
1919	}
1920	w += sldns_str_print(s, sl, "/%d scope /%d", (int)source, (int)scope);
1921	return w;
1922}
1923
1924static int sldns_wire2str_edns_keepalive_print(char** s, size_t* sl,
1925	uint8_t* data, size_t len)
1926{
1927	int w = 0;
1928	uint16_t timeout;
1929	if(!(len == 0 || len == 2)) {
1930		w += sldns_str_print(s, sl, "malformed keepalive ");
1931		w += print_hex_buf(s, sl, data, len);
1932		return w;
1933	}
1934	if(len == 0 ) {
1935		w += sldns_str_print(s, sl, "no timeout value (only valid for client option) ");
1936	} else {
1937		timeout = sldns_read_uint16(data);
1938		w += sldns_str_print(s, sl, "timeout value in units of 100ms %u", (int)timeout);
1939	}
1940	return w;
1941}
1942
1943int sldns_wire2str_edns_option_print(char** s, size_t* sl,
1944	uint16_t option_code, uint8_t* optdata, size_t optlen)
1945{
1946	int w = 0;
1947	w += sldns_wire2str_edns_option_code_print(s, sl, option_code);
1948	w += sldns_str_print(s, sl, ": ");
1949	switch(option_code) {
1950	case LDNS_EDNS_LLQ:
1951		w += sldns_wire2str_edns_llq_print(s, sl, optdata, optlen);
1952		break;
1953	case LDNS_EDNS_UL:
1954		w += sldns_wire2str_edns_ul_print(s, sl, optdata, optlen);
1955		break;
1956	case LDNS_EDNS_NSID:
1957		w += sldns_wire2str_edns_nsid_print(s, sl, optdata, optlen);
1958		break;
1959	case LDNS_EDNS_DAU:
1960		w += sldns_wire2str_edns_dau_print(s, sl, optdata, optlen);
1961		break;
1962	case LDNS_EDNS_DHU:
1963		w += sldns_wire2str_edns_dhu_print(s, sl, optdata, optlen);
1964		break;
1965	case LDNS_EDNS_N3U:
1966		w += sldns_wire2str_edns_n3u_print(s, sl, optdata, optlen);
1967		break;
1968	case LDNS_EDNS_CLIENT_SUBNET:
1969		w += sldns_wire2str_edns_subnet_print(s, sl, optdata, optlen);
1970		break;
1971	 case LDNS_EDNS_KEEPALIVE:
1972		w += sldns_wire2str_edns_keepalive_print(s, sl, optdata, optlen);
1973		break;
1974	case LDNS_EDNS_PADDING:
1975		w += print_hex_buf(s, sl, optdata, optlen);
1976		break;
1977	default:
1978		/* unknown option code */
1979		w += print_hex_buf(s, sl, optdata, optlen);
1980		break;
1981	}
1982	return w;
1983}
1984
1985/** print the edns options to string */
1986static int
1987print_edns_opts(char** s, size_t* sl, uint8_t* rdata, size_t rdatalen)
1988{
1989	uint16_t option_code, option_len;
1990	int w = 0;
1991	while(rdatalen > 0) {
1992		/* option name */
1993		if(rdatalen < 4) {
1994			w += sldns_str_print(s, sl, " ; malformed: ");
1995			w += print_hex_buf(s, sl, rdata, rdatalen);
1996			return w;
1997		}
1998		option_code = sldns_read_uint16(rdata);
1999		option_len = sldns_read_uint16(rdata+2);
2000		rdata += 4;
2001		rdatalen -= 4;
2002
2003		/* option value */
2004		if(rdatalen < (size_t)option_len) {
2005			w += sldns_str_print(s, sl, " ; malformed ");
2006			w += sldns_wire2str_edns_option_code_print(s, sl,
2007				option_code);
2008			w += sldns_str_print(s, sl, ": ");
2009			w += print_hex_buf(s, sl, rdata, rdatalen);
2010			return w;
2011		}
2012		w += sldns_str_print(s, sl, " ; ");
2013		w += sldns_wire2str_edns_option_print(s, sl, option_code,
2014			rdata, option_len);
2015		rdata += option_len;
2016		rdatalen -= option_len;
2017	}
2018	return w;
2019}
2020
2021int sldns_wire2str_edns_scan(uint8_t** data, size_t* data_len, char** str,
2022        size_t* str_len, uint8_t* pkt, size_t pktlen)
2023{
2024	int w = 0;
2025	uint8_t ext_rcode, edns_version;
2026	uint16_t udpsize, edns_bits, rdatalen;
2027	w += sldns_str_print(str, str_len, "; EDNS:");
2028
2029	/* some input checks, domain name */
2030	if(*data_len < 1+10)
2031		return w + print_remainder_hex("Error malformed 0x",
2032			data, data_len, str, str_len);
2033	if(*data[0] != 0) {
2034		return w + print_remainder_hex("Error nonrootdname 0x",
2035			data, data_len, str, str_len);
2036	}
2037	(*data)++;
2038	(*data_len)--;
2039
2040	/* check type and read fixed contents */
2041	if(sldns_read_uint16((*data)) != LDNS_RR_TYPE_OPT) {
2042		return w + print_remainder_hex("Error nottypeOPT 0x",
2043			data, data_len, str, str_len);
2044	}
2045	udpsize = sldns_read_uint16((*data)+2);
2046	ext_rcode = (*data)[4];
2047	edns_version = (*data)[5];
2048	edns_bits = sldns_read_uint16((*data)+6);
2049	rdatalen = sldns_read_uint16((*data)+8);
2050	(*data)+=10;
2051	(*data_len)-=10;
2052
2053	w += sldns_str_print(str, str_len, " version: %u;",
2054		(unsigned)edns_version);
2055	w += sldns_str_print(str, str_len, " flags:");
2056	if((edns_bits & LDNS_EDNS_MASK_DO_BIT))
2057		w += sldns_str_print(str, str_len, " do");
2058	/* the extended rcode is the value set, shifted four bits,
2059	 * and or'd with the original rcode */
2060	if(ext_rcode) {
2061		int rc = ((int)ext_rcode)<<4;
2062		if(pkt && pktlen >= LDNS_HEADER_SIZE)
2063			rc |= LDNS_RCODE_WIRE(pkt);
2064		w += sldns_str_print(str, str_len, " ; ext-rcode: %d", rc);
2065	}
2066	w += sldns_str_print(str, str_len, " ; udp: %u", (unsigned)udpsize);
2067
2068	if(rdatalen) {
2069		if((size_t)*data_len < rdatalen) {
2070			w += sldns_str_print(str, str_len,
2071				" ; Error EDNS rdata too short; ");
2072			rdatalen = (uint16_t)*data_len;
2073		}
2074		w += print_edns_opts(str, str_len, *data, rdatalen);
2075		(*data) += rdatalen;
2076		(*data_len) -= rdatalen;
2077	}
2078	w += sldns_str_print(str, str_len, "\n");
2079	return w;
2080}
2081