xref: /freebsd/contrib/ldns/str2host.c (revision 2008043f386721d58158e37e0d7e50df8095942d)
1 /*
2  * str2host.c
3  *
4  * conversion routines from the presentation format
5  * to the host format
6  *
7  * a Net::DNS like library for C
8  *
9  * (c) NLnet Labs, 2004-2006
10  *
11  * See the file LICENSE for the license
12  */
13 #include <ldns/config.h>
14 
15 #include <ldns/ldns.h>
16 #include <ldns/internal.h>
17 
18 #ifdef HAVE_SYS_SOCKET_H
19 #include <sys/socket.h>
20 #endif
21 #ifdef HAVE_ARPA_INET_H
22 #include <arpa/inet.h>
23 #endif
24 #include <time.h>
25 
26 #include <errno.h>
27 #ifdef HAVE_NETDB_H
28 #include <netdb.h>
29 #endif
30 
31 #include <limits.h>
32 #ifdef HAVE_SYS_PARAM_H
33 #include <sys/param.h>
34 #endif
35 
36 ldns_status
37 ldns_str2rdf_int16(ldns_rdf **rd, const char *shortstr)
38 {
39 	char *end = NULL;
40 	uint16_t *r;
41 	r = LDNS_MALLOC(uint16_t);
42         if(!r) return LDNS_STATUS_MEM_ERR;
43 
44 	*r = htons((uint16_t)strtol((char *)shortstr, &end, 10));
45 
46 	if(*end != 0) {
47 		LDNS_FREE(r);
48 		return LDNS_STATUS_INVALID_INT;
49 	} else {
50 		*rd = ldns_rdf_new_frm_data(
51 			LDNS_RDF_TYPE_INT16, sizeof(uint16_t), r);
52 		LDNS_FREE(r);
53 		return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
54 	}
55 }
56 
57 ldns_status
58 ldns_str2rdf_time(ldns_rdf **rd, const char *time)
59 {
60 	/* convert a time YYYYDDMMHHMMSS to wireformat */
61 	uint32_t *r = NULL;
62 	struct tm tm;
63 	uint32_t l;
64 	char *end;
65 
66 	/* Try to scan the time... */
67 	r = (uint32_t *)LDNS_MALLOC(uint32_t);
68         if(!r) return LDNS_STATUS_MEM_ERR;
69 
70 	memset(&tm, 0, sizeof(tm));
71 
72 	if (strlen(time) == 14 &&
73 	    sscanf(time, "%4d%2d%2d%2d%2d%2d", &tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour, &tm.tm_min, &tm.tm_sec) == 6
74 	   ) {
75 	   	tm.tm_year -= 1900;
76 	   	tm.tm_mon--;
77 	   	/* Check values */
78 		if (tm.tm_year < 70) {
79 			goto bad_format;
80 		}
81 		if (tm.tm_mon < 0 || tm.tm_mon > 11) {
82 			goto bad_format;
83 		}
84 		if (tm.tm_mday < 1 || tm.tm_mday > 31) {
85 			goto bad_format;
86 		}
87 
88 		if (tm.tm_hour < 0 || tm.tm_hour > 23) {
89 			goto bad_format;
90 		}
91 
92 		if (tm.tm_min < 0 || tm.tm_min > 59) {
93 			goto bad_format;
94 		}
95 
96 		if (tm.tm_sec < 0 || tm.tm_sec > 59) {
97 			goto bad_format;
98 		}
99 
100 		l = htonl(ldns_mktime_from_utc(&tm));
101 		memcpy(r, &l, sizeof(uint32_t));
102 		*rd = ldns_rdf_new_frm_data(
103 			LDNS_RDF_TYPE_TIME, sizeof(uint32_t), r);
104 		LDNS_FREE(r);
105 		return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
106 	} else {
107 		/* handle it as 32 bits timestamp */
108 		l = htonl((uint32_t)strtol((char*)time, &end, 10));
109 		if(*end != 0) {
110 			LDNS_FREE(r);
111 			return LDNS_STATUS_ERR;
112 		} else {
113 			memcpy(r, &l, sizeof(uint32_t));
114 			*rd = ldns_rdf_new_frm_data(
115 				LDNS_RDF_TYPE_INT32, sizeof(uint32_t), r);
116 			LDNS_FREE(r);
117 		        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
118 		}
119 	}
120 
121 	bad_format:
122 	LDNS_FREE(r);
123 	return LDNS_STATUS_INVALID_TIME;
124 }
125 
126 ldns_status
127 ldns_str2rdf_nsec3_salt(ldns_rdf **rd, const char *salt_str)
128 {
129 	uint8_t salt_length;
130 	int c;
131 	int salt_length_str;
132 
133 	uint8_t *salt;
134 	uint8_t *data;
135 	if(rd == NULL) {
136 		return LDNS_STATUS_NULL;
137 	}
138 
139 	salt_length_str = (int)strlen(salt_str);
140 	if (salt_length_str == 1 && salt_str[0] == '-') {
141 		salt_length_str = 0;
142 	} else if (salt_length_str % 2 != 0) {
143 		return LDNS_STATUS_INVALID_HEX;
144 	}
145 	if (salt_length_str > 512) {
146 		return LDNS_STATUS_INVALID_HEX;
147 	}
148 
149 	salt = LDNS_XMALLOC(uint8_t, salt_length_str / 2);
150         if(!salt) {
151                 return LDNS_STATUS_MEM_ERR;
152         }
153 	for (c = 0; c < salt_length_str; c += 2) {
154 		if (isxdigit((int) salt_str[c]) && isxdigit((int) salt_str[c+1])) {
155 			salt[c/2] = (uint8_t) ldns_hexdigit_to_int(salt_str[c]) * 16 +
156 					  ldns_hexdigit_to_int(salt_str[c+1]);
157 		} else {
158 			LDNS_FREE(salt);
159 			return LDNS_STATUS_INVALID_HEX;
160 		}
161 	}
162 	salt_length = (uint8_t) (salt_length_str / 2);
163 
164 	data = LDNS_XMALLOC(uint8_t, 1 + salt_length);
165         if(!data) {
166 	        LDNS_FREE(salt);
167                 return LDNS_STATUS_MEM_ERR;
168         }
169 	data[0] = salt_length;
170 	memcpy(&data[1], salt, salt_length);
171 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_NSEC3_SALT, 1 + salt_length, data);
172 	LDNS_FREE(data);
173 	LDNS_FREE(salt);
174 
175 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
176 }
177 
178 ldns_status
179 ldns_str2rdf_period(ldns_rdf **rd,const char *period)
180 {
181         uint32_t p;
182         const char *end;
183 
184         /* Allocate required space... */
185         p = ldns_str2period(period, &end);
186 
187         if (*end != 0) {
188 		return LDNS_STATUS_ERR;
189         } else {
190                 p = (uint32_t) htonl(p);
191 		*rd = ldns_rdf_new_frm_data(
192 			LDNS_RDF_TYPE_PERIOD, sizeof(uint32_t), &p);
193         }
194 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
195 }
196 
197 ldns_status
198 ldns_str2rdf_int32(ldns_rdf **rd, const char *longstr)
199 {
200 	char *end;
201 	uint32_t *r = NULL;
202 	uint32_t l;
203 
204 	r = (uint32_t*)LDNS_MALLOC(uint32_t);
205         if(!r) return LDNS_STATUS_MEM_ERR;
206 	errno = 0; /* must set to zero before call,
207 			note race condition on errno */
208 	if(*longstr == '-')
209 		l = htonl((uint32_t)strtol((char*)longstr, &end, 10));
210 	else	l = htonl((uint32_t)strtoul((char*)longstr, &end, 10));
211 
212 	if(*end != 0) {
213 		LDNS_FREE(r);
214 		return LDNS_STATUS_ERR;
215      } else {
216 		if (errno == ERANGE) {
217 			LDNS_FREE(r);
218 			return LDNS_STATUS_SYNTAX_INTEGER_OVERFLOW;
219 		}
220 		memcpy(r, &l, sizeof(uint32_t));
221 		*rd = ldns_rdf_new_frm_data(
222 			LDNS_RDF_TYPE_INT32, sizeof(uint32_t), r);
223 		LDNS_FREE(r);
224 	        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
225 	}
226 }
227 
228 ldns_status
229 ldns_str2rdf_int8(ldns_rdf **rd, const char *bytestr)
230 {
231 	char *end;
232 	uint8_t *r = NULL;
233 
234 	r = LDNS_MALLOC(uint8_t);
235         if(!r) return LDNS_STATUS_MEM_ERR;
236 
237 	*r = (uint8_t)strtol((char*)bytestr, &end, 10);
238 
239         if(*end != 0) {
240 		LDNS_FREE(r);
241 		return LDNS_STATUS_ERR;
242         } else {
243 		*rd = ldns_rdf_new_frm_data(
244 			LDNS_RDF_TYPE_INT8, sizeof(uint8_t), r);
245 		LDNS_FREE(r);
246 	        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
247         }
248 }
249 
250 
251 /*
252  * Checks whether the escaped value at **s is an decimal value or
253  * a 'normally' escaped character (and not eos)
254  *
255  * The string pointer at *s is increased by either 0 (on error), 1 (on
256  * normal escapes), or 3 (on decimals)
257  *
258  * Returns the number of bytes read from the escaped string, or
259  * 0 on error
260  */
261 INLINE bool
262 parse_escape(uint8_t *ch_p, const char** str_p)
263 {
264 	uint16_t val;
265 
266 	if ((*str_p)[0] && isdigit((unsigned char)(*str_p)[0])  &&
267 	    (*str_p)[1] && isdigit((unsigned char)(*str_p)[1])  &&
268 	    (*str_p)[2] && isdigit((unsigned char)(*str_p)[2]))  {
269 
270 		val = (uint16_t)(((*str_p)[0] - '0') * 100 +
271 				 ((*str_p)[1] - '0') *  10 +
272 				 ((*str_p)[2] - '0'));
273 
274 		if (val > 255) {
275 			goto error;
276 		}
277 		*ch_p = (uint8_t)val;
278 		*str_p += 3;
279 		return true;
280 
281 	} else if ((*str_p)[0] && !isdigit((unsigned char)(*str_p)[0])) {
282 
283 		*ch_p = (uint8_t)*(*str_p)++;
284 		return true;
285 	}
286 error:
287 	*str_p = NULL;
288 	return false; /* LDNS_STATUS_SYNTAX_BAD_ESCAPE */
289 }
290 
291 INLINE bool
292 parse_char(uint8_t *ch_p, const char** str_p)
293 {
294 	switch (**str_p) {
295 
296 	case '\0':	return false;
297 
298 	case '\\':	*str_p += 1;
299 			return parse_escape(ch_p, str_p);
300 
301 	default:	*ch_p = (uint8_t)*(*str_p)++;
302 			return true;
303 	}
304 }
305 
306 /*
307  * No special care is taken, all dots are translated into
308  * label separators.
309  * Could be made more efficient....we do 3 memcpy's in total...
310  */
311 ldns_status
312 ldns_str2rdf_dname(ldns_rdf **d, const char *str)
313 {
314 	size_t len;
315 
316 	const char *s;
317 	uint8_t *q, *pq, label_len;
318 	uint8_t buf[LDNS_MAX_DOMAINLEN + 1];
319 	*d = NULL;
320 
321 	len = strlen((char*)str);
322 	/* octet representation can make strings a lot longer than actual length */
323 	if (len > LDNS_MAX_DOMAINLEN * 4) {
324 		return LDNS_STATUS_DOMAINNAME_OVERFLOW;
325 	}
326 	if (0 == len) {
327 		return LDNS_STATUS_DOMAINNAME_UNDERFLOW;
328 	}
329 
330 	/* root label */
331 	if (1 == len && *str == '.') {
332 		*d = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, 1, "\0");
333 		return LDNS_STATUS_OK;
334 	}
335 
336 	/* get on with the rest */
337 
338 	/* s is on the current character in the string
339          * pq points to where the labellength is going to go
340          * label_len keeps track of the current label's length
341 	 * q builds the dname inside the buf array
342 	 */
343 	len = 0;
344 	q = buf+1;
345 	pq = buf;
346 	label_len = 0;
347 	for (s = str; *s; s++, q++) {
348 		if (q >= buf + LDNS_MAX_DOMAINLEN) {
349 			return LDNS_STATUS_DOMAINNAME_OVERFLOW;
350 		}
351 		*q = 0;
352 		switch (*s) {
353 		case '.':
354 			if (label_len > LDNS_MAX_LABELLEN) {
355 				return LDNS_STATUS_LABEL_OVERFLOW;
356 			}
357 			if (label_len == 0) {
358 				return LDNS_STATUS_EMPTY_LABEL;
359 			}
360 			len += label_len + 1;
361 			*pq = label_len;
362 			label_len = 0;
363 			pq = q;
364 			break;
365 		case '\\':
366 			/* octet value or literal char */
367 			s += 1;
368 			if (! parse_escape(q, &s)) {
369 				return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
370 			}
371 			s -= 1;
372 			label_len++;
373 			break;
374 		default:
375 			*q = (uint8_t)*s;
376 			label_len++;
377 		}
378 	}
379 
380 	/* add root label if last char was not '.' */
381 	if (!ldns_dname_str_absolute(str)) {
382 		if (q >= buf + LDNS_MAX_DOMAINLEN) {
383 			return LDNS_STATUS_DOMAINNAME_OVERFLOW;
384 		}
385                 if (label_len > LDNS_MAX_LABELLEN) {
386                         return LDNS_STATUS_LABEL_OVERFLOW;
387                 }
388                 if (label_len == 0) { /* label_len 0 but not . at end? */
389                         return LDNS_STATUS_EMPTY_LABEL;
390                 }
391 		len += label_len + 1;
392 		*pq = label_len;
393 		*q = 0;
394 	}
395 	len++;
396 
397 	*d = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, len, buf);
398 	return LDNS_STATUS_OK;
399 }
400 
401 ldns_status
402 ldns_str2rdf_a(ldns_rdf **rd, const char *str)
403 {
404 	in_addr_t address;
405         if (inet_pton(AF_INET, (char*)str, &address) != 1) {
406                 return LDNS_STATUS_INVALID_IP4;
407         } else {
408 		*rd = ldns_rdf_new_frm_data(
409 			LDNS_RDF_TYPE_A, sizeof(address), &address);
410         }
411 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
412 }
413 
414 ldns_status
415 ldns_str2rdf_aaaa(ldns_rdf **rd, const char *str)
416 {
417 	uint8_t address[LDNS_IP6ADDRLEN + 1];
418 
419 	if (inet_pton(AF_INET6, (char*)str, address) != 1) {
420 		return LDNS_STATUS_INVALID_IP6;
421 	} else {
422 		*rd = ldns_rdf_new_frm_data(
423 			LDNS_RDF_TYPE_AAAA, sizeof(address) - 1, &address);
424 	}
425 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
426 }
427 
428 ldns_status
429 ldns_str2rdf_str(ldns_rdf **rd, const char *str)
430 {
431 	uint8_t *data, *dp, ch = 0;
432 	size_t length;
433 
434 	/* Worst case space requirement. We'll realloc to actual size later. */
435 	dp = data = LDNS_XMALLOC(uint8_t, strlen(str) > 255 ? 256 : (strlen(str) + 1));
436 	if (! data) {
437 		return LDNS_STATUS_MEM_ERR;
438 	}
439 
440 	/* Fill data (up to 255 characters) */
441 	while (parse_char(&ch, &str)) {
442 		if (dp - data >= 255) {
443 			LDNS_FREE(data);
444 			return LDNS_STATUS_INVALID_STR;
445 		}
446 		*++dp = ch;
447 	}
448 	if (! str) {
449 		LDNS_FREE(data);
450 		return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
451 	}
452 	length = (size_t)(dp - data);
453 	/* Fix last length byte */
454 	data[0] = (uint8_t)length;
455 
456 	/* Lose the overmeasure */
457 	data = LDNS_XREALLOC(dp = data, uint8_t, length + 1);
458 	if (! data) {
459 		LDNS_FREE(dp);
460 		return LDNS_STATUS_MEM_ERR;
461 	}
462 
463 	/* Create rdf */
464 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_STR, length + 1, data);
465 	if (! *rd) {
466 		LDNS_FREE(data);
467 		return LDNS_STATUS_MEM_ERR;
468 	}
469 	return LDNS_STATUS_OK;
470 }
471 
472 ldns_status
473 ldns_str2rdf_apl(ldns_rdf **rd, const char *str)
474 {
475 	const char *my_str = str;
476 
477 	char *my_ip_str;
478 	size_t ip_str_len;
479 
480 	uint16_t family;
481 	bool negation;
482 	uint8_t afdlength = 0;
483 	uint8_t *afdpart;
484 	uint8_t prefix;
485 
486 	uint8_t *data;
487 
488 	size_t i = 0;
489 
490 	/* [!]afi:address/prefix */
491 	if (strlen(my_str) < 2
492 			|| strchr(my_str, ':') == NULL
493 			|| strchr(my_str, '/') == NULL
494 			|| strchr(my_str, ':') > strchr(my_str, '/')) {
495 		return LDNS_STATUS_INVALID_STR;
496 	}
497 
498 	if (my_str[0] == '!') {
499 		negation = true;
500 		my_str += 1;
501 	} else {
502 		negation = false;
503 	}
504 
505 	family = (uint16_t) atoi(my_str);
506 
507 	my_str = strchr(my_str, ':') + 1;
508 
509 	/* need ip addr and only ip addr for inet_pton */
510 	ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
511 	my_ip_str = LDNS_XMALLOC(char, ip_str_len + 1);
512         if(!my_ip_str) return LDNS_STATUS_MEM_ERR;
513 	strncpy(my_ip_str, my_str, ip_str_len + 1);
514 	my_ip_str[ip_str_len] = '\0';
515 
516 	if (family == 1) {
517 		/* ipv4 */
518 		afdpart = LDNS_XMALLOC(uint8_t, 4);
519                 if(!afdpart) {
520                         LDNS_FREE(my_ip_str);
521                         return LDNS_STATUS_MEM_ERR;
522                 }
523 		if (inet_pton(AF_INET, my_ip_str, afdpart) == 0) {
524                         LDNS_FREE(my_ip_str);
525                         LDNS_FREE(afdpart);
526 			return LDNS_STATUS_INVALID_STR;
527 		}
528 		for (i = 0; i < 4; i++) {
529 			if (afdpart[i] != 0) {
530 				afdlength = i + 1;
531 			}
532 		}
533 	} else if (family == 2) {
534 		/* ipv6 */
535 		afdpart = LDNS_XMALLOC(uint8_t, 16);
536                 if(!afdpart) {
537                         LDNS_FREE(my_ip_str);
538                         return LDNS_STATUS_MEM_ERR;
539                 }
540 		if (inet_pton(AF_INET6, my_ip_str, afdpart) == 0) {
541                         LDNS_FREE(my_ip_str);
542                         LDNS_FREE(afdpart);
543 			return LDNS_STATUS_INVALID_STR;
544 		}
545 		for (i = 0; i < 16; i++) {
546 			if (afdpart[i] != 0) {
547 				afdlength = i + 1;
548 			}
549 		}
550 	} else {
551 		/* unknown family */
552 		LDNS_FREE(my_ip_str);
553 		return LDNS_STATUS_INVALID_STR;
554 	}
555 
556 	my_str = strchr(my_str, '/') + 1;
557 	prefix = (uint8_t) atoi(my_str);
558 
559 	data = LDNS_XMALLOC(uint8_t, 4 + afdlength);
560         if(!data) {
561 		LDNS_FREE(afdpart);
562 		LDNS_FREE(my_ip_str);
563 		return LDNS_STATUS_INVALID_STR;
564         }
565 	ldns_write_uint16(data, family);
566 	data[2] = prefix;
567 	data[3] = afdlength;
568 	if (negation) {
569 		/* set bit 1 of byte 3 */
570 		data[3] = data[3] | 0x80;
571 	}
572 
573 	memcpy(data + 4, afdpart, afdlength);
574 
575 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_APL, afdlength + 4, data);
576 	LDNS_FREE(afdpart);
577 	LDNS_FREE(data);
578 	LDNS_FREE(my_ip_str);
579 
580 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
581 }
582 
583 ldns_status
584 ldns_str2rdf_b64(ldns_rdf **rd, const char *str)
585 {
586 	uint8_t *buffer;
587 	int16_t i;
588 
589 	if ((*str == '-' || *str == '0') && str[1] == '\0') {
590 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, 0, NULL);
591 		return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
592 	}
593 
594 	buffer = LDNS_XMALLOC(uint8_t, ldns_b64_ntop_calculate_size(strlen(str)));
595         if(!buffer) {
596                 return LDNS_STATUS_MEM_ERR;
597         }
598 
599 	i = (uint16_t)ldns_b64_pton((const char*)str, buffer,
600 						   ldns_b64_ntop_calculate_size(strlen(str)));
601 	if (-1 == i) {
602 		LDNS_FREE(buffer);
603 		return LDNS_STATUS_INVALID_B64;
604 	} else {
605 		*rd = ldns_rdf_new_frm_data(
606 			LDNS_RDF_TYPE_B64, (uint16_t) i, buffer);
607 	}
608 	LDNS_FREE(buffer);
609 
610 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
611 }
612 
613 ldns_status
614 ldns_str2rdf_b32_ext(ldns_rdf **rd, const char *str)
615 {
616 	uint8_t *buffer;
617 	int i;
618 	/* first byte contains length of actual b32 data */
619 	size_t slen = strlen(str);
620 	size_t len = ldns_b32_pton_calculate_size(slen);
621 	if (len > 255) {
622 		return LDNS_STATUS_INVALID_B32_EXT;
623 	}
624 	buffer = LDNS_XMALLOC(uint8_t, len + 1);
625         if(!buffer) {
626                 return LDNS_STATUS_MEM_ERR;
627         }
628 	buffer[0] = len;
629 
630 	i = ldns_b32_pton_extended_hex((const char*)str, slen, buffer + 1,
631 							 ldns_b32_ntop_calculate_size(slen));
632 	if (i < 0) {
633                 LDNS_FREE(buffer);
634 		return LDNS_STATUS_INVALID_B32_EXT;
635 	} else {
636 		*rd = ldns_rdf_new_frm_data(
637 			LDNS_RDF_TYPE_B32_EXT, (uint16_t) i + 1, buffer);
638 	}
639 	LDNS_FREE(buffer);
640 
641 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
642 }
643 
644 ldns_status
645 ldns_str2rdf_hex(ldns_rdf **rd, const char *str)
646 {
647 	uint8_t *t, *t_orig;
648 	int i;
649 	size_t len;
650 
651 	len = strlen(str);
652 
653 	if (len > LDNS_MAX_RDFLEN * 2) {
654 		return LDNS_STATUS_LABEL_OVERFLOW;
655 	} else {
656 		t = LDNS_XMALLOC(uint8_t, (len / 2) + 1);
657                 if(!t) {
658                         return LDNS_STATUS_MEM_ERR;
659                 }
660 		t_orig = t;
661 		/* Now process octet by octet... */
662 		while (*str) {
663 			*t = 0;
664 			if (isspace((int) *str)) {
665 				str++;
666 			} else {
667 				for (i = 16; i >= 1; i -= 15) {
668 					while (*str && isspace((int) *str)) { str++; }
669 					if (*str) {
670 						if (isxdigit((int) *str)) {
671 							*t += ldns_hexdigit_to_int(*str) * i;
672 						} else {
673                                                         LDNS_FREE(t_orig);
674 							return LDNS_STATUS_ERR;
675 						}
676 						++str;
677 					}
678 				}
679 				++t;
680 			}
681 		}
682 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_HEX,
683 		                            (size_t) (t - t_orig),
684 		                            t_orig);
685 		LDNS_FREE(t_orig);
686 	}
687 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
688 }
689 
690 ldns_status
691 ldns_str2rdf_nsec(ldns_rdf **rd, const char *str)
692 {
693 	const char *delimiters = "\n\t ";
694 	char *token = LDNS_XMALLOC(char, LDNS_MAX_RDFLEN);
695 	ldns_buffer *str_buf;
696 	ssize_t c;
697 	uint16_t cur_type;
698 	size_t type_count = 0;
699 	ldns_rr_type type_list[65536];
700 	if(!token) return LDNS_STATUS_MEM_ERR;
701 	if(rd == NULL) {
702 		LDNS_FREE(token);
703 		return LDNS_STATUS_NULL;
704 	}
705 
706 	str_buf = LDNS_MALLOC(ldns_buffer);
707 	if(!str_buf) {
708 		LDNS_FREE(token);
709 		return LDNS_STATUS_MEM_ERR;
710 	}
711 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
712 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
713 		LDNS_FREE(str_buf);
714 		LDNS_FREE(token);
715 		return LDNS_STATUS_MEM_ERR;
716 	}
717 
718 	while ((c = ldns_bget_token(str_buf, token, delimiters, LDNS_MAX_RDFLEN)) != -1 && c != 0) {
719                 if(type_count >= sizeof(type_list)) {
720 		        LDNS_FREE(str_buf);
721 		        LDNS_FREE(token);
722                         return LDNS_STATUS_ERR;
723                 }
724 		cur_type = ldns_get_rr_type_by_name(token);
725 		type_list[type_count] = cur_type;
726 		type_count++;
727 	}
728 
729 	*rd = ldns_dnssec_create_nsec_bitmap(type_list,
730 	                                     type_count,
731 	                                     LDNS_RR_TYPE_NSEC);
732 
733 	LDNS_FREE(token);
734 	ldns_buffer_free(str_buf);
735 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
736 }
737 
738 ldns_status
739 ldns_str2rdf_type(ldns_rdf **rd, const char *str)
740 {
741 	uint16_t type;
742 	type = htons(ldns_get_rr_type_by_name(str));
743 	/* ldns_rr_type is a 16 bit value */
744 	*rd = ldns_rdf_new_frm_data(
745 		LDNS_RDF_TYPE_TYPE, sizeof(uint16_t), &type);
746 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
747 }
748 
749 ldns_status
750 ldns_str2rdf_class(ldns_rdf **rd, const char *str)
751 {
752 	uint16_t klass;
753 	klass = htons(ldns_get_rr_class_by_name(str));
754 	/* class is 16 bit */
755 	*rd = ldns_rdf_new_frm_data(
756 		LDNS_RDF_TYPE_CLASS, sizeof(uint16_t), &klass);
757 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
758 }
759 
760 /* An certificate alg field can either be specified as a 8 bits number
761  * or by its symbolic name. Handle both
762  */
763 ldns_status
764 ldns_str2rdf_cert_alg(ldns_rdf **rd, const char *str)
765 {
766 	ldns_lookup_table *lt;
767 	ldns_status st;
768 	uint8_t idd[2];
769 	lt = ldns_lookup_by_name(ldns_cert_algorithms, str);
770 	st = LDNS_STATUS_OK;
771 
772 	if (lt) {
773 		ldns_write_uint16(idd, (uint16_t) lt->id);
774 		*rd = ldns_rdf_new_frm_data(
775 			LDNS_RDF_TYPE_INT16, sizeof(uint16_t), idd);
776 		if (!*rd) {
777 			st = LDNS_STATUS_ERR;
778 		}
779 	} else {
780 		/* try as-is (a number) */
781 		st = ldns_str2rdf_int16(rd, str);
782 		if (st == LDNS_STATUS_OK &&
783 		    ldns_rdf2native_int16(*rd) == 0) {
784 			st = LDNS_STATUS_CERT_BAD_ALGORITHM;
785 		}
786 	}
787 
788 	return st;
789 }
790 
791 static ldns_lookup_table ldns_tlsa_certificate_usages[] = {
792 	{ LDNS_TLSA_USAGE_PKIX_TA		, "PKIX-TA"  },
793 	{ LDNS_TLSA_USAGE_PKIX_EE		, "PKIX-EE"  },
794 	{ LDNS_TLSA_USAGE_DANE_TA		, "DANE-TA"  },
795 	{ LDNS_TLSA_USAGE_DANE_EE		, "DANE-EE"  },
796 	{ LDNS_TLSA_USAGE_PRIVCERT		, "PrivCert" },
797         { 0, NULL }
798 };
799 
800 static ldns_lookup_table ldns_tlsa_selectors[] = {
801 	{ LDNS_TLSA_SELECTOR_CERT		, "Cert" },
802 	{ LDNS_TLSA_SELECTOR_SPKI		, "SPKI" },
803 	{ LDNS_TLSA_SELECTOR_PRIVSEL		, "PrivSel" },
804         { 0, NULL }
805 };
806 
807 static ldns_lookup_table ldns_tlsa_matching_types[] = {
808 	{ LDNS_TLSA_MATCHING_TYPE_FULL		, "Full"      },
809 	{ LDNS_TLSA_MATCHING_TYPE_SHA2_256	, "SHA2-256"  },
810 	{ LDNS_TLSA_MATCHING_TYPE_SHA2_512	, "SHA2-512"  },
811 	{ LDNS_TLSA_MATCHING_TYPE_PRIVMATCH	, "PrivMatch" },
812         { 0, NULL }
813 };
814 
815 static ldns_status
816 ldns_str2rdf_mnemonic4int8(ldns_lookup_table *lt,
817 		ldns_rdf **rd, const char *str)
818 {
819 	if ((lt = ldns_lookup_by_name(lt, str))) {
820 		/* it was given as a integer */
821 		*rd = ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, (uint8_t) lt->id);
822 		if (!*rd)
823 			return LDNS_STATUS_ERR;
824 		else
825 			return LDNS_STATUS_OK;
826 	}
827 	return ldns_str2rdf_int8(rd, str);
828 }
829 
830 /* An alg field can either be specified as a 8 bits number
831  * or by its symbolic name. Handle both
832  */
833 ldns_status
834 ldns_str2rdf_alg(ldns_rdf **rd, const char *str)
835 {
836 	return ldns_str2rdf_mnemonic4int8(ldns_algorithms, rd, str);
837 }
838 
839 ldns_status
840 ldns_str2rdf_certificate_usage(ldns_rdf **rd, const char *str)
841 {
842 	return ldns_str2rdf_mnemonic4int8(
843 			ldns_tlsa_certificate_usages, rd, str);
844 }
845 
846 ldns_status
847 ldns_str2rdf_selector(ldns_rdf **rd, const char *str)
848 {
849 	return ldns_str2rdf_mnemonic4int8(ldns_tlsa_selectors, rd, str);
850 }
851 
852 ldns_status
853 ldns_str2rdf_matching_type(ldns_rdf **rd, const char *str)
854 {
855 	return ldns_str2rdf_mnemonic4int8(ldns_tlsa_matching_types, rd, str);
856 }
857 
858 ldns_status
859 ldns_str2rdf_unknown( ATTR_UNUSED(ldns_rdf **rd)
860 		    , ATTR_UNUSED(const char *str)
861 		    )
862 {
863 	/* this should be caught in an earlier time (general str2host for
864 	   rr's */
865 	return LDNS_STATUS_NOT_IMPL;
866 }
867 
868 ldns_status
869 ldns_str2rdf_service( ATTR_UNUSED(ldns_rdf **rd)
870 		    , ATTR_UNUSED(const char *str)
871 		    )
872 {
873 	/* is this used? is this actually WKS? or SRV? */
874 	return LDNS_STATUS_NOT_IMPL;
875 }
876 
877 static int
878 loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
879 {
880 	/* read <digits>[.<digits>][mM] */
881 	/* into mantissa exponent format for LOC type */
882 	uint32_t meters = 0, cm = 0, val;
883 	char* cm_endstr;
884 	while (isblank((unsigned char)*my_str)) {
885 		my_str++;
886 	}
887 	meters = (uint32_t)strtol(my_str, &my_str, 10);
888 	if (*my_str == '.') {
889 		my_str++;
890 		cm = (uint32_t)strtol(my_str, &cm_endstr, 10);
891 		if (cm_endstr - my_str == 1) cm *= 10;
892 		my_str = cm_endstr;
893 	}
894 	if (meters >= 1) {
895 		*e = 2;
896 		val = meters;
897 	} else	{
898 		*e = 0;
899 		val = cm;
900 	}
901 	while(val >= 10) {
902 		(*e)++;
903 		val /= 10;
904 	}
905 	*m = (uint8_t)val;
906 
907 	if (*e > 9)
908 		return 0;
909 	if (*my_str == 'm' || *my_str == 'M') {
910 		my_str++;
911 	}
912 	*endstr = my_str;
913 	return 1;
914 }
915 
916 ldns_status
917 ldns_str2rdf_loc(ldns_rdf **rd, const char *str)
918 {
919 	uint32_t latitude = 0;
920 	uint32_t longitude = 0;
921 	uint32_t altitude = 0;
922 
923 	uint8_t *data;
924 	uint32_t equator = (uint32_t) ldns_power(2, 31);
925 
926 	uint32_t h = 0;
927 	uint32_t m = 0;
928 	uint8_t size_b = 1, size_e = 2;
929 	uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
930 	uint8_t vert_pre_b = 1, vert_pre_e = 3;
931 
932 	double s = 0.0;
933 	bool northern_hemisphere;
934 	bool eastern_hemisphere;
935 
936 	char *my_str = (char *) str;
937 
938 	/* only support version 0 */
939 	if (isdigit((int) *my_str)) {
940 		h = (uint32_t) strtol(my_str, &my_str, 10);
941 	} else {
942 		return LDNS_STATUS_INVALID_STR;
943 	}
944 
945 	while (isblank((int) *my_str)) {
946 		my_str++;
947 	}
948 
949 	if (isdigit((int) *my_str)) {
950 		m = (uint32_t) strtol(my_str, &my_str, 10);
951 	} else if (*my_str == 'N' || *my_str == 'S') {
952 		goto north;
953 	} else {
954 		return LDNS_STATUS_INVALID_STR;
955 	}
956 
957 	while (isblank((int) *my_str)) {
958 		my_str++;
959 	}
960 
961 	if (isdigit((int) *my_str)) {
962 		s = strtod(my_str, &my_str);
963 	}
964 north:
965 	while (isblank((int) *my_str)) {
966 		my_str++;
967 	}
968 
969 	if (*my_str == 'N') {
970 		northern_hemisphere = true;
971 	} else if (*my_str == 'S') {
972 		northern_hemisphere = false;
973 	} else {
974 		return LDNS_STATUS_INVALID_STR;
975 	}
976 
977 	my_str++;
978 
979 	/* store number */
980 	s = 1000.0 * s;
981 	/* add a little to make floor in conversion a round */
982 	s += 0.0005;
983 	latitude = (uint32_t) s;
984 	latitude += 1000 * 60 * m;
985 	latitude += 1000 * 60 * 60 * h;
986 	if (northern_hemisphere) {
987 		latitude = equator + latitude;
988 	} else {
989 		latitude = equator - latitude;
990 	}
991 	while (isblank((unsigned char)*my_str)) {
992 		my_str++;
993 	}
994 
995 	if (isdigit((int) *my_str)) {
996 		h = (uint32_t) strtol(my_str, &my_str, 10);
997 	} else {
998 		return LDNS_STATUS_INVALID_STR;
999 	}
1000 
1001 	while (isblank((int) *my_str)) {
1002 		my_str++;
1003 	}
1004 
1005 	if (isdigit((int) *my_str)) {
1006 		m = (uint32_t) strtol(my_str, &my_str, 10);
1007 	} else if (*my_str == 'E' || *my_str == 'W') {
1008 		goto east;
1009 	} else {
1010 		return LDNS_STATUS_INVALID_STR;
1011 	}
1012 
1013 	while (isblank((unsigned char)*my_str)) {
1014 		my_str++;
1015 	}
1016 
1017 	if (isdigit((int) *my_str)) {
1018 		s = strtod(my_str, &my_str);
1019 	}
1020 
1021 east:
1022 	while (isblank((unsigned char)*my_str)) {
1023 		my_str++;
1024 	}
1025 
1026 	if (*my_str == 'E') {
1027 		eastern_hemisphere = true;
1028 	} else if (*my_str == 'W') {
1029 		eastern_hemisphere = false;
1030 	} else {
1031 		return LDNS_STATUS_INVALID_STR;
1032 	}
1033 
1034 	my_str++;
1035 
1036 	/* store number */
1037 	s *= 1000.0;
1038 	/* add a little to make floor in conversion a round */
1039 	s += 0.0005;
1040 	longitude = (uint32_t) s;
1041 	longitude += 1000 * 60 * m;
1042 	longitude += 1000 * 60 * 60 * h;
1043 
1044 	if (eastern_hemisphere) {
1045 		longitude += equator;
1046 	} else {
1047 		longitude = equator - longitude;
1048 	}
1049 
1050 	altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
1051 		10000000.0 + 0.5);
1052 	if (*my_str == 'm' || *my_str == 'M') {
1053 		my_str++;
1054 	}
1055 
1056 	if (strlen(my_str) > 0) {
1057 		if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1058 			return LDNS_STATUS_INVALID_STR;
1059 	}
1060 
1061 	if (strlen(my_str) > 0) {
1062 		if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1063 			return LDNS_STATUS_INVALID_STR;
1064 	}
1065 
1066 	if (strlen(my_str) > 0) {
1067 		if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1068 			return LDNS_STATUS_INVALID_STR;
1069 	}
1070 
1071 	data = LDNS_XMALLOC(uint8_t, 16);
1072         if(!data) {
1073                 return LDNS_STATUS_MEM_ERR;
1074         }
1075 	data[0] = 0;
1076 	data[1] = 0;
1077 	data[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1078 	data[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1079 	data[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1080 	ldns_write_uint32(data + 4, latitude);
1081 	ldns_write_uint32(data + 8, longitude);
1082 	ldns_write_uint32(data + 12, altitude);
1083 
1084 	*rd = ldns_rdf_new_frm_data(
1085 		LDNS_RDF_TYPE_LOC, 16, data);
1086 
1087 	LDNS_FREE(data);
1088 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
1089 }
1090 
1091 ldns_status
1092 ldns_str2rdf_wks(ldns_rdf **rd, const char *str)
1093 {
1094 	uint8_t *bitmap = NULL;
1095 	uint8_t *data;
1096 	int bm_len = 0;
1097 
1098 	struct protoent *proto = NULL;
1099 	struct servent *serv = NULL;
1100 	int serv_port;
1101 
1102 	ldns_buffer *str_buf;
1103 
1104 	char *proto_str = NULL;
1105 	char *lc_proto_str = NULL;
1106 	char *token;
1107 	char *lc_token;
1108 	char *c;
1109 	if(strlen(str) == 0)
1110 		token = LDNS_XMALLOC(char, 50);
1111 	else 	token = LDNS_XMALLOC(char, strlen(str)+2);
1112 	if(!token) return LDNS_STATUS_MEM_ERR;
1113 
1114 	str_buf = LDNS_MALLOC(ldns_buffer);
1115 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1116 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1117 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1118 		LDNS_FREE(str_buf);
1119 		LDNS_FREE(token);
1120 		return LDNS_STATUS_MEM_ERR;
1121 	}
1122 
1123 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1124 		if (!proto_str) {
1125 			proto_str = strdup(token);
1126 			lc_proto_str = strdup(token);
1127 			for (c = lc_proto_str; *c; c++) {
1128 				*c = tolower((unsigned char)*c);
1129 			}
1130 			if (!proto_str || !lc_proto_str) {
1131 				free(proto_str);
1132 				free(lc_proto_str);
1133 				LDNS_FREE(bitmap);
1134 				LDNS_FREE(token);
1135 	                        ldns_buffer_free(str_buf);
1136 				return LDNS_STATUS_INVALID_STR;
1137 			}
1138 		} else {
1139 			serv = getservbyname(token, proto_str);
1140 			if (!serv) {
1141 				serv = getservbyname(token, lc_proto_str);
1142 			}
1143 			if (!serv && (lc_token = strdup(token))) {
1144 				for (c = lc_token; *c; c++) {
1145 					*c = tolower((unsigned char)*c);
1146 				}
1147 				serv = getservbyname(lc_token, proto_str);
1148 				if (!serv) {
1149 					serv = getservbyname(lc_token, lc_proto_str);
1150 				}
1151 				free(lc_token);
1152 			}
1153 			if (serv) {
1154 				serv_port = (int) ntohs((uint16_t) serv->s_port);
1155 			} else {
1156 				serv_port = atoi(token);
1157 			}
1158 			if (serv_port < 0 || serv_port > 65535) {
1159 				LDNS_FREE(bitmap);
1160 			        LDNS_FREE(token);
1161                                 ldns_buffer_free(str_buf);
1162 			        free(proto_str);
1163 			        free(lc_proto_str);
1164 			        return LDNS_STATUS_INVALID_STR;
1165 			}
1166 			if (serv_port / 8 >= bm_len) {
1167 				uint8_t *b2 = LDNS_XREALLOC(bitmap, uint8_t, (serv_port / 8) + 1);
1168                                 if(!b2) {
1169 					LDNS_FREE(bitmap);
1170 				        LDNS_FREE(token);
1171 	                                ldns_buffer_free(str_buf);
1172 				        free(proto_str);
1173 				        free(lc_proto_str);
1174 				        return LDNS_STATUS_INVALID_STR;
1175                                 }
1176 				bitmap = b2;
1177 				/* set to zero to be sure */
1178 				for (; bm_len <= serv_port / 8; bm_len++) {
1179 					bitmap[bm_len] = 0;
1180 				}
1181 			}
1182 			ldns_set_bit(bitmap + (serv_port / 8), 7 - (serv_port % 8), true);
1183 		}
1184 	}
1185 
1186 	if (!proto_str || !bitmap) {
1187 		LDNS_FREE(bitmap);
1188 		LDNS_FREE(token);
1189 	        ldns_buffer_free(str_buf);
1190 	        free(proto_str);
1191 	        free(lc_proto_str);
1192 		return LDNS_STATUS_INVALID_STR;
1193 	}
1194 
1195 	data = LDNS_XMALLOC(uint8_t, bm_len + 1);
1196         if(!data) {
1197 	        LDNS_FREE(token);
1198 	        ldns_buffer_free(str_buf);
1199 	        LDNS_FREE(bitmap);
1200 	        free(proto_str);
1201 	        free(lc_proto_str);
1202 	        return LDNS_STATUS_INVALID_STR;
1203         }
1204     if (proto_str)
1205 		proto = getprotobyname(proto_str);
1206     	if (!proto) {
1207 		proto = getprotobyname(lc_proto_str);
1208 	}
1209 	if (proto) {
1210 		data[0] = (uint8_t) proto->p_proto;
1211 	} else if (proto_str) {
1212 		data[0] = (uint8_t) atoi(proto_str);
1213 	}
1214 	memcpy(data + 1, bitmap, (size_t) bm_len);
1215 
1216 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_WKS, (uint16_t) (bm_len + 1), data);
1217 
1218 	LDNS_FREE(data);
1219 	LDNS_FREE(token);
1220 	ldns_buffer_free(str_buf);
1221 	LDNS_FREE(bitmap);
1222 	free(proto_str);
1223 	free(lc_proto_str);
1224 #ifdef HAVE_ENDSERVENT
1225 	endservent();
1226 #endif
1227 #ifdef HAVE_ENDPROTOENT
1228 	endprotoent();
1229 #endif
1230 
1231 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1232 
1233 	return LDNS_STATUS_OK;
1234 }
1235 
1236 ldns_status
1237 ldns_str2rdf_nsap(ldns_rdf **rd, const char *str)
1238 {
1239     size_t len, i;
1240     char* nsap_str = (char*) str;
1241 
1242 	/* just a hex string with optional dots? */
1243 	if (str[0] != '0' || str[1] != 'x') {
1244 		return LDNS_STATUS_INVALID_STR;
1245 	} else {
1246 		len = strlen(str);
1247 		for (i=0; i < len; i++) {
1248 			if (nsap_str[i] == '.')
1249 				nsap_str[i] = ' ';
1250         }
1251 		return ldns_str2rdf_hex(rd, str+2);
1252 	}
1253 }
1254 
1255 ldns_status
1256 ldns_str2rdf_atma(ldns_rdf **rd, const char *str)
1257 {
1258     size_t len, i;
1259     char* atma_str = (char*) str;
1260 	ldns_status status;
1261 
1262 	/* just a hex string with optional dots? */
1263 	len = strlen(str);
1264 	for (i=0; i < len; i++) {
1265 		if (atma_str[i] == '.')
1266 			atma_str[i] = ' ';
1267 	}
1268 	status = ldns_str2rdf_hex(rd, str);
1269     if (status != LDNS_STATUS_OK) {
1270 		; /* probably in e.164 format than */
1271 	}
1272 	return status;
1273 }
1274 
1275 ldns_status
1276 ldns_str2rdf_ipseckey(ldns_rdf **rd, const char *str)
1277 {
1278 	uint8_t precedence = 0;
1279 	uint8_t gateway_type = 0;
1280 	uint8_t algorithm = 0;
1281 	char* gateway = NULL;
1282 	char* publickey = NULL;
1283 	uint8_t *data;
1284 	ldns_buffer *str_buf;
1285 	char *token;
1286 	int token_count = 0;
1287 	int ipseckey_len = 0;
1288 	ldns_rdf* gateway_rdf = NULL;
1289 	ldns_rdf* publickey_rdf = NULL;
1290 	ldns_status status = LDNS_STATUS_OK;
1291 
1292 	if(strlen(str) == 0)
1293 		token = LDNS_XMALLOC(char, 256);
1294 	else	token = LDNS_XMALLOC(char, strlen(str)+2);
1295 	if(!token) return LDNS_STATUS_MEM_ERR;
1296 
1297 	str_buf = LDNS_MALLOC(ldns_buffer);
1298 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1299 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1300 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1301 		LDNS_FREE(str_buf);
1302 		LDNS_FREE(token);
1303 		return LDNS_STATUS_MEM_ERR;
1304 	}
1305 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1306 		switch (token_count) {
1307 				case 0:
1308 					precedence = (uint8_t)atoi(token);
1309 					break;
1310 				case 1:
1311 					gateway_type = (uint8_t)atoi(token);
1312 					break;
1313 				case 2:
1314 					algorithm = (uint8_t)atoi(token);
1315 					break;
1316 				case 3:
1317 					gateway = strdup(token);
1318 					if (!gateway || (gateway_type == 0 &&
1319 							(token[0] != '.' || token[1] != '\0'))) {
1320 						LDNS_FREE(gateway);
1321 						LDNS_FREE(token);
1322 						ldns_buffer_free(str_buf);
1323 						return LDNS_STATUS_INVALID_STR;
1324 					}
1325 					break;
1326 				case 4:
1327 					publickey = strdup(token);
1328 					break;
1329 				default:
1330 					LDNS_FREE(token);
1331 					ldns_buffer_free(str_buf);
1332 					return LDNS_STATUS_INVALID_STR;
1333 					break;
1334 		}
1335 		token_count++;
1336 	}
1337 
1338 	if (!gateway || !publickey) {
1339 		if (gateway)
1340 			LDNS_FREE(gateway);
1341 		if (publickey)
1342 			LDNS_FREE(publickey);
1343 		LDNS_FREE(token);
1344 		ldns_buffer_free(str_buf);
1345 		return LDNS_STATUS_INVALID_STR;
1346 	}
1347 
1348 	if (gateway_type == 1) {
1349 		status = ldns_str2rdf_a(&gateway_rdf, gateway);
1350 	} else if (gateway_type == 2) {
1351 		status = ldns_str2rdf_aaaa(&gateway_rdf, gateway);
1352 	} else if (gateway_type == 3) {
1353 		status = ldns_str2rdf_dname(&gateway_rdf, gateway);
1354 	} else if (gateway_type > 3) {
1355 		status = LDNS_STATUS_INVALID_STR;
1356 	}
1357 
1358 	if (status != LDNS_STATUS_OK) {
1359 		if (gateway)
1360 			LDNS_FREE(gateway);
1361 		if (publickey)
1362 			LDNS_FREE(publickey);
1363 		LDNS_FREE(token);
1364 		ldns_buffer_free(str_buf);
1365 		return LDNS_STATUS_INVALID_STR;
1366 	}
1367 
1368 	status = ldns_str2rdf_b64(&publickey_rdf, publickey);
1369 
1370 	if (status != LDNS_STATUS_OK) {
1371 		if (gateway)
1372 			LDNS_FREE(gateway);
1373 		if (publickey)
1374 			LDNS_FREE(publickey);
1375 		LDNS_FREE(token);
1376 		ldns_buffer_free(str_buf);
1377 		if (gateway_rdf) ldns_rdf_free(gateway_rdf);
1378 		return LDNS_STATUS_INVALID_STR;
1379 	}
1380 
1381 	/* now copy all into one ipseckey rdf */
1382 	if (gateway_type)
1383 		ipseckey_len = 3 + (int)ldns_rdf_size(gateway_rdf) + (int)ldns_rdf_size(publickey_rdf);
1384 	else
1385 		ipseckey_len = 3 + (int)ldns_rdf_size(publickey_rdf);
1386 
1387 	data = LDNS_XMALLOC(uint8_t, ipseckey_len);
1388 	if(!data) {
1389 		if (gateway)
1390 			LDNS_FREE(gateway);
1391 		if (publickey)
1392 			LDNS_FREE(publickey);
1393 		LDNS_FREE(token);
1394 		ldns_buffer_free(str_buf);
1395 		if (gateway_rdf) ldns_rdf_free(gateway_rdf);
1396 		if (publickey_rdf) ldns_rdf_free(publickey_rdf);
1397 		return LDNS_STATUS_MEM_ERR;
1398 	}
1399 
1400 	data[0] = precedence;
1401 	data[1] = gateway_type;
1402 	data[2] = algorithm;
1403 
1404 	if (gateway_type) {
1405 		memcpy(data + 3,
1406 			ldns_rdf_data(gateway_rdf), ldns_rdf_size(gateway_rdf));
1407 		memcpy(data + 3 + ldns_rdf_size(gateway_rdf),
1408 			ldns_rdf_data(publickey_rdf), ldns_rdf_size(publickey_rdf));
1409 	} else {
1410 		memcpy(data + 3,
1411 			ldns_rdf_data(publickey_rdf), ldns_rdf_size(publickey_rdf));
1412 	}
1413 
1414 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_IPSECKEY, (uint16_t) ipseckey_len, data);
1415 
1416 	if (gateway)
1417 		LDNS_FREE(gateway);
1418 	if (publickey)
1419 		LDNS_FREE(publickey);
1420 	LDNS_FREE(token);
1421 	ldns_buffer_free(str_buf);
1422 	ldns_rdf_deep_free(gateway_rdf);
1423 	ldns_rdf_deep_free(publickey_rdf);
1424 	LDNS_FREE(data);
1425 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1426 	return LDNS_STATUS_OK;
1427 }
1428 
1429 ldns_status
1430 ldns_str2rdf_ilnp64(ldns_rdf **rd, const char *str)
1431 {
1432 	unsigned int a, b, c, d;
1433 	uint16_t shorts[4];
1434 	int l;
1435 
1436 	if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1437 			l != (int)strlen(str) || /* more data to read */
1438 			strpbrk(str, "+-")       /* signed hexes */
1439 			) {
1440 		return LDNS_STATUS_INVALID_ILNP64;
1441 	} else {
1442 		shorts[0] = htons(a);
1443 		shorts[1] = htons(b);
1444 		shorts[2] = htons(c);
1445 		shorts[3] = htons(d);
1446 		*rd = ldns_rdf_new_frm_data(
1447 			LDNS_RDF_TYPE_ILNP64, 4 * sizeof(uint16_t), &shorts);
1448 	}
1449 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1450 }
1451 
1452 ldns_status
1453 ldns_str2rdf_eui48(ldns_rdf **rd, const char *str)
1454 {
1455 	unsigned int a, b, c, d, e, f;
1456 	uint8_t bytes[6];
1457 	int l;
1458 
1459 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1460 			&a, &b, &c, &d, &e, &f, &l) != 6 ||
1461 			l != (int)strlen(str)) {
1462 		return LDNS_STATUS_INVALID_EUI48;
1463 	} else {
1464 		bytes[0] = a;
1465 		bytes[1] = b;
1466 		bytes[2] = c;
1467 		bytes[3] = d;
1468 		bytes[4] = e;
1469 		bytes[5] = f;
1470 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_EUI48, 6, &bytes);
1471 	}
1472 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1473 }
1474 
1475 ldns_status
1476 ldns_str2rdf_eui64(ldns_rdf **rd, const char *str)
1477 {
1478 	unsigned int a, b, c, d, e, f, g, h;
1479 	uint8_t bytes[8];
1480 	int l;
1481 
1482 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
1483 			&a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
1484 			l != (int)strlen(str)) {
1485 		return LDNS_STATUS_INVALID_EUI64;
1486 	} else {
1487 		bytes[0] = a;
1488 		bytes[1] = b;
1489 		bytes[2] = c;
1490 		bytes[3] = d;
1491 		bytes[4] = e;
1492 		bytes[5] = f;
1493 		bytes[6] = g;
1494 		bytes[7] = h;
1495 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_EUI64, 8, &bytes);
1496 	}
1497 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1498 }
1499 
1500 ldns_status
1501 ldns_str2rdf_tag(ldns_rdf **rd, const char *str)
1502 {
1503 	uint8_t *data;
1504 	const char* ptr;
1505 
1506 	if (strlen(str) > 255) {
1507 		return LDNS_STATUS_INVALID_TAG;
1508 	}
1509 	for (ptr = str; *ptr; ptr++) {
1510 		if (! isalnum((unsigned char)*ptr)) {
1511 			return LDNS_STATUS_INVALID_TAG;
1512 		}
1513 	}
1514 	data = LDNS_XMALLOC(uint8_t, strlen(str) + 1);
1515         if (!data) {
1516 		return LDNS_STATUS_MEM_ERR;
1517 	}
1518 	data[0] = strlen(str);
1519 	memcpy(data + 1, str, strlen(str));
1520 
1521 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_TAG, strlen(str) + 1, data);
1522 	if (!*rd) {
1523 		LDNS_FREE(data);
1524 		return LDNS_STATUS_MEM_ERR;
1525 	}
1526 	return LDNS_STATUS_OK;
1527 }
1528 
1529 ldns_status
1530 ldns_str2rdf_long_str(ldns_rdf **rd, const char *str)
1531 {
1532 	uint8_t *data, *dp, ch = 0;
1533 	size_t length;
1534 
1535 	/* Worst case space requirement. We'll realloc to actual size later. */
1536 	dp = data = LDNS_XMALLOC(uint8_t, strlen(str));
1537         if (! data) {
1538 		return LDNS_STATUS_MEM_ERR;
1539 	}
1540 
1541 	/* Fill data with parsed bytes */
1542 	while (parse_char(&ch, &str)) {
1543 		*dp++ = ch;
1544 		if (dp - data > LDNS_MAX_RDFLEN) {
1545 			LDNS_FREE(data);
1546 			return LDNS_STATUS_INVALID_STR;
1547 		}
1548 	}
1549 	if (! str) {
1550 		LDNS_FREE(data);
1551 		return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1552 	}
1553 	if (!(length = (size_t)(dp - data))) {
1554 		/* An empty string is a data buffer of 0 bytes.  The rdf for
1555 		 * this long string has to have length 0 and point to NULL.
1556 		 */
1557 		LDNS_FREE(data);
1558 		data = NULL;
1559 	} else {
1560 		/* Lose the overmeasure */
1561 		data = LDNS_XREALLOC(dp = data, uint8_t, length);
1562 		if (! data) {
1563 			LDNS_FREE(dp);
1564 			return LDNS_STATUS_MEM_ERR;
1565 		}
1566 	}
1567 	/* Create rdf */
1568 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_LONG_STR, length, data);
1569 	if (! *rd) {
1570 		LDNS_FREE(data);
1571 		return LDNS_STATUS_MEM_ERR;
1572 	}
1573 	return LDNS_STATUS_OK;
1574 }
1575 
1576 ldns_status
1577 ldns_str2rdf_hip(ldns_rdf **rd, const char *str)
1578 {
1579 	const char *hit = str == NULL ? NULL : strchr(str, ' ');
1580 	const char *pk  = hit == NULL ? NULL : strchr(hit + 1, ' ');
1581 	size_t hit_size = hit == NULL ? 0
1582 	                : pk  == NULL ? strlen(hit + 1) : (size_t) (pk - hit) - 1;
1583 	size_t  pk_size = pk  == NULL ? 0 : strlen(pk + 1);
1584 	size_t hit_wire_size = (hit_size + 1) / 2;
1585 	size_t  pk_wire_size = ldns_b64_pton_calculate_size(pk_size);
1586 	size_t rdf_size = 4 + hit_wire_size + pk_wire_size;
1587 
1588 	char *endptr; /* utility var for strtol usage */
1589 	int algorithm = str == NULL ? 0 : strtol(str, &endptr, 10);
1590 
1591 	uint8_t *data, *dp;
1592 	int hi, lo, written;
1593 
1594 	if (hit_size == 0 || pk_size == 0 || (hit_size + 1) / 2 > 255
1595 			|| rdf_size > LDNS_MAX_RDFLEN
1596 			|| algorithm < 0 || algorithm > 255
1597 			|| (errno != 0 && algorithm == 0) /* out of range */
1598 			|| endptr == str                  /* no digits    */) {
1599 
1600 		return LDNS_STATUS_SYNTAX_ERR;
1601 	}
1602 	hit += 1;
1603 	pk  += 1;
1604 	if ((data = LDNS_XMALLOC(uint8_t, rdf_size)) == NULL) {
1605 
1606 		return LDNS_STATUS_MEM_ERR;
1607 	}
1608 	/* From RFC 5205 section 5. HIP RR Storage Format:
1609 	 *************************************************
1610 
1611 	0                   1                   2                   3
1612 	0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1613 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1614 	|  HIT length   | PK algorithm  |          PK length            |
1615 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1616 	|                                                               |
1617 	~                           HIT                                 ~
1618 	|                                                               |
1619 	+                     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1620 	|                     |                                         |
1621 	+-+-+-+-+-+-+-+-+-+-+-+                                         +
1622 	|                           Public Key                          |
1623 	~                                                               ~
1624 	|                                                               |
1625 	+                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1626 	|                               |                               |
1627 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
1628 	|                                                               |
1629 	~                       Rendezvous Servers                      ~
1630 	|                                                               |
1631 	+             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1632 	|             |
1633 	+-+-+-+-+-+-+-+                                                    */
1634 
1635 	data[0] = (uint8_t) hit_wire_size;
1636 	data[1] = (uint8_t) algorithm;
1637 
1638 	for (dp = data + 4; *hit && *hit != ' '; dp++) {
1639 
1640 		if ((hi = ldns_hexdigit_to_int(*hit++)) == -1 ||
1641 		    (lo = ldns_hexdigit_to_int(*hit++)) == -1) {
1642 
1643 			LDNS_FREE(data);
1644 			return LDNS_STATUS_INVALID_HEX;
1645 		}
1646 		*dp = (uint8_t) hi << 4 | lo;
1647 	}
1648 	if ((written = ldns_b64_pton(pk, dp, pk_wire_size)) <= 0) {
1649 
1650 		LDNS_FREE(data);
1651 		return LDNS_STATUS_INVALID_B64;
1652 	}
1653 
1654 	/* Because ldns_b64_pton_calculate_size isn't always correct:
1655 	 * (we have to fix it at some point)
1656 	 */
1657 	pk_wire_size = (uint16_t) written;
1658 	ldns_write_uint16(data + 2, pk_wire_size);
1659 	rdf_size = 4 + hit_wire_size + pk_wire_size;
1660 
1661 	/* Create rdf */
1662 	if (! (*rd = ldns_rdf_new(LDNS_RDF_TYPE_HIP, rdf_size, data))) {
1663 
1664 		LDNS_FREE(data);
1665 		return LDNS_STATUS_MEM_ERR;
1666 	}
1667 	return LDNS_STATUS_OK;
1668 }
1669 
1670 
1671 /* Implementation mimics ldns_str2rdf_ipseckey */
1672 ldns_status
1673 ldns_str2rdf_amtrelay(ldns_rdf **rd, const char *str)
1674 {
1675 	/* From draft-ietf-mboned-driad-amt-discovery
1676 	 *      Section 4.2. AMTRELAY RData Format
1677 	 *************************************************
1678 
1679 	 0                   1                   2                   3
1680 	 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1681 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1682 	|   precedence  |D|    type     |                               |
1683 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
1684 	~                            relay                              ~
1685 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  */
1686 
1687 	uint8_t precedence = 0;
1688 	uint8_t relay_type = 0;
1689 	uint8_t discovery_optional = 0;
1690 	char* relay = NULL;
1691 	uint8_t *data;
1692 	ldns_buffer *str_buf;
1693 	char *token;
1694 	int token_count = 0;
1695 	int amtrelay_len = 0;
1696 	ldns_rdf* relay_rdf = NULL;
1697 	ldns_status status = LDNS_STATUS_OK;
1698 
1699 	if(strlen(str) == 0)
1700 		token = LDNS_XMALLOC(char, 256);
1701 	else	token = LDNS_XMALLOC(char, strlen(str)+2);
1702 	if(!token) return LDNS_STATUS_MEM_ERR;
1703 
1704 	str_buf = LDNS_MALLOC(ldns_buffer);
1705 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1706 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1707 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1708 		LDNS_FREE(str_buf);
1709 		LDNS_FREE(token);
1710 		return LDNS_STATUS_MEM_ERR;
1711 	}
1712 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1713 		switch (token_count) {
1714 		case 0:
1715 			precedence = (uint8_t)atoi(token);
1716 			break;
1717 		case 1:
1718 			discovery_optional = (uint8_t)atoi(token);
1719 			if (discovery_optional != 0 &&
1720 			    discovery_optional != 1) {
1721 				LDNS_FREE(relay);
1722 				LDNS_FREE(token);
1723 				ldns_buffer_free(str_buf);
1724 				return LDNS_STATUS_INVALID_STR;
1725 			}
1726 			break;
1727 		case 2:
1728 			relay_type = (uint8_t)atoi(token);
1729 			break;
1730 		case 3:
1731 			relay = strdup(token);
1732 			if (!relay || (relay_type == 0 &&
1733 					(token[0] != '.' || token[1] != '\0'))) {
1734 				LDNS_FREE(relay);
1735 				LDNS_FREE(token);
1736 				ldns_buffer_free(str_buf);
1737 				return LDNS_STATUS_INVALID_STR;
1738 			}
1739 			break;
1740 		default:
1741 			LDNS_FREE(token);
1742 			ldns_buffer_free(str_buf);
1743 			return LDNS_STATUS_INVALID_STR;
1744 			break;
1745 		}
1746 		token_count++;
1747 	}
1748 	if (!relay && relay_type > 0) {
1749 		if (relay)
1750 			LDNS_FREE(relay);
1751 		LDNS_FREE(token);
1752 		ldns_buffer_free(str_buf);
1753 		return LDNS_STATUS_INVALID_STR;
1754 	}
1755 
1756 	if (relay_type == 1) {
1757 		status = ldns_str2rdf_a(&relay_rdf, relay);
1758 	} else if (relay_type == 2) {
1759 		status = ldns_str2rdf_aaaa(&relay_rdf, relay);
1760 	} else if (relay_type == 3) {
1761 		status = ldns_str2rdf_dname(&relay_rdf, relay);
1762 	} else if (relay_type > 3) {
1763 		status = LDNS_STATUS_INVALID_STR;
1764 	}
1765 
1766 	if (status != LDNS_STATUS_OK) {
1767 		if (relay)
1768 			LDNS_FREE(relay);
1769 		LDNS_FREE(token);
1770 		ldns_buffer_free(str_buf);
1771 		return LDNS_STATUS_INVALID_STR;
1772 	}
1773 
1774 	/* now copy all into one amtrelay rdf */
1775 	if (relay_type)
1776 		amtrelay_len = 2 + (int)ldns_rdf_size(relay_rdf);
1777 	else
1778 		amtrelay_len = 2;
1779 
1780 	data = LDNS_XMALLOC(uint8_t, amtrelay_len);
1781 	if(!data) {
1782 		if (relay)
1783 			LDNS_FREE(relay);
1784 		LDNS_FREE(token);
1785 		ldns_buffer_free(str_buf);
1786 		if (relay_rdf) ldns_rdf_free(relay_rdf);
1787 		return LDNS_STATUS_MEM_ERR;
1788 	}
1789 
1790 	data[0] = precedence;
1791 	data[1] = relay_type;
1792 	data[1] |= (discovery_optional << 7);
1793 
1794 	if (relay_type) {
1795 		memcpy(data + 2,
1796 			ldns_rdf_data(relay_rdf), ldns_rdf_size(relay_rdf));
1797 	}
1798 	*rd = ldns_rdf_new_frm_data( LDNS_RDF_TYPE_AMTRELAY
1799 	                           , (uint16_t) amtrelay_len, data);
1800 
1801 	if (relay)
1802 		LDNS_FREE(relay);
1803 	LDNS_FREE(token);
1804 	ldns_buffer_free(str_buf);
1805 	ldns_rdf_free(relay_rdf);
1806 	LDNS_FREE(data);
1807 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1808 	return LDNS_STATUS_OK;
1809 }
1810 
1811 #ifdef RRTYPE_SVCB_HTTPS
1812 static int
1813 network_uint16_cmp(const void *a, const void *b)
1814 {
1815 	return ((int)ldns_read_uint16(a)) - ((int)ldns_read_uint16(b));
1816 }
1817 
1818 static ldns_status parse_svcparam_key(const char **s, ldns_svcparam_key *key);
1819 static ldns_status
1820 parse_svcparam_mandatory(const char **s, uint8_t **dp, uint8_t *eod)
1821 {
1822 	bool quoted = false;
1823 	uint8_t *keys = *dp;
1824 	int prev_key;
1825 
1826 	if (**s == '"') {
1827 		*s += 1;
1828 		quoted = true;
1829 	}
1830 	for (;;) {
1831 		ldns_status st;
1832 		ldns_svcparam_key key;
1833 
1834 		if ((st = parse_svcparam_key(s, &key)))
1835 			return st;
1836 
1837 		if (*dp + 2 > eod)
1838 			return LDNS_STATUS_RDATA_OVERFLOW;
1839 
1840 		ldns_write_uint16(*dp, key);
1841 		*dp += 2;
1842 
1843 		if (**s == ',')
1844 			*s += 1;
1845 		else
1846 			break;
1847 	}
1848 	if (quoted) {
1849 		if (**s != '"')
1850 			return LDNS_STATUS_INVALID_STR;
1851 		*s += 1;
1852 	}
1853 	if (*dp - keys == 0)
1854 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
1855 
1856 	if (**s && !isspace((unsigned char)**s))
1857 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
1858 
1859 	/* In draft-ietf-dnsop-svcb-https-02 Section 7:
1860 	 *
1861 	 *     In wire format, the keys are represented by their numeric
1862 	 *     values in network byte order, concatenated in ascending order.
1863 	 */
1864 	qsort(keys, (*dp - keys) / 2, 2, network_uint16_cmp);
1865 
1866 	/* In draft-ietf-dnsop-svcb-https-02 Section 7:
1867 	 *
1868 	 *     Keys ...<snip>... MUST NOT appear more than once.
1869 	 */
1870 	prev_key = -1;
1871 	while (keys < *dp) {
1872 		uint16_t key = ldns_read_uint16(keys);
1873 
1874 		if (key == prev_key) {
1875 			/* "Be conservative in what you send,
1876 			 *  be liberal in what you accept"
1877 			 *
1878 			 * Instead of
1879 			 *   `return LDNS_STATUS_SVCPARAM_KEY_MORE_THAN_ONCE;`,
1880 			 *
1881 			 * we eliminate the double occurrence.
1882 			 */
1883 			memmove(keys - 2, keys, *dp - keys);
1884 			*dp -= 2;
1885 		} else {
1886 			prev_key = key;
1887 			keys += 2;
1888 		}
1889 	}
1890 	return LDNS_STATUS_OK;
1891 }
1892 
1893 INLINE bool parse_escape2(uint8_t *ch_p, const char** str_p)
1894 { *str_p += 1; return parse_escape(ch_p, str_p); }
1895 
1896 static ldns_status
1897 parse_svcparam_alpn(const char **s, uint8_t **dp, uint8_t *eod)
1898 {
1899 	uint8_t *val;
1900 	size_t len;
1901 
1902 	if (*dp + 1 > eod)
1903 		return LDNS_STATUS_RDATA_OVERFLOW;
1904 	*dp += 1;
1905 	val = *dp;
1906 	if (**s == '"') {
1907 		*s += 1;
1908 		while (**s != '"') {
1909 			if (**s == 0)
1910 				return LDNS_STATUS_INVALID_STR;
1911 
1912 			else if (**s == ',') {
1913 				len = *dp - val;
1914 				if (len == 0 || len > 255)
1915 					return LDNS_STATUS_INVALID_STR;
1916 				val[-1] = len;
1917 				if (*dp + 1 > eod)
1918 					return LDNS_STATUS_RDATA_OVERFLOW;
1919 				*dp += 1;
1920 				val = *dp;
1921 				*s += 1;
1922 
1923 			} else if (*dp + 1 > eod)
1924 				return LDNS_STATUS_RDATA_OVERFLOW;
1925 
1926 			else if (**s != '\\')
1927 				*(*dp)++ = (uint8_t)*(*s)++;
1928 
1929 			else if (!parse_escape2(*dp, s))
1930 				return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1931 			else
1932 				*dp += 1;
1933 		}
1934 		*s += 1;
1935 
1936 	} else while (**s && !isspace((unsigned char)**s)) {
1937 		if (**s == ',') {
1938 			len = *dp - val;
1939 			if (len == 0 || len > 255)
1940 				return LDNS_STATUS_INVALID_STR;
1941 			val[-1] = len;
1942 			if (*dp + 1 > eod)
1943 				return LDNS_STATUS_RDATA_OVERFLOW;
1944 			*dp += 1;
1945 			val = *dp;
1946 			*s += 1;
1947 
1948 		} else if (*dp + 1 > eod)
1949 			return LDNS_STATUS_RDATA_OVERFLOW;
1950 
1951 		else if (**s != '\\')
1952 			*(*dp)++ = (uint8_t)*(*s)++;
1953 
1954 		else if (!parse_escape2(*dp, s))
1955 			return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1956 		else
1957 			*dp += 1;
1958 	}
1959 	len = *dp - val;
1960 	if (len == 0 || len > 255)
1961 		return LDNS_STATUS_INVALID_STR;
1962 	val[-1] = len;
1963 	return **s && !isspace((unsigned char)**s)
1964 	     ? LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR
1965 	     : LDNS_STATUS_OK;
1966 }
1967 
1968 static ldns_status
1969 parse_svcparam_value(const char **s, uint8_t **dp, uint8_t *eod)
1970 {
1971 	if (**s == '"') {
1972 		*s += 1;
1973 		while (**s != '"') {
1974 			if (**s == 0)
1975 				return LDNS_STATUS_INVALID_STR;
1976 
1977 			else if (*dp + 1 > eod)
1978 				return LDNS_STATUS_RDATA_OVERFLOW;
1979 
1980 			else if (**s != '\\')
1981 				*(*dp)++ = (uint8_t)*(*s)++;
1982 
1983 			else if (!parse_escape2(*dp, s))
1984 				return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1985 			else
1986 				*dp += 1;
1987 		}
1988 		*s += 1;
1989 
1990 	} else while (**s && !isspace((unsigned char)**s)) {
1991 		if (*dp + 1 > eod)
1992 			return LDNS_STATUS_RDATA_OVERFLOW;
1993 
1994 		else if (**s != '\\')
1995 			*(*dp)++ = (uint8_t)*(*s)++;
1996 
1997 		else if (!parse_escape2(*dp, s))
1998 			return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1999 		else
2000 			*dp += 1;
2001 	}
2002 	return **s && !isspace((unsigned char)**s)
2003 	     ? LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR
2004 	     : LDNS_STATUS_OK;
2005 }
2006 
2007 static ldns_status
2008 parse_svcparam_port(const char **s, uint8_t **dp, uint8_t *eod)
2009 {
2010 	uint8_t *val = *dp;
2011 	ldns_status st;
2012 	size_t len;
2013 	char num_str[6];
2014 	char *endptr;
2015 	unsigned long int num;
2016 
2017 	if ((st = parse_svcparam_value(s, dp, eod)))
2018 		return st;
2019 	len = *dp - val;
2020 	if (len == 0 || len > 5)
2021 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2022 
2023 	memcpy(num_str, val, len);
2024 	num_str[len] = 0;
2025 	num = strtoul(num_str, &endptr, 10);
2026 	if (*endptr)
2027 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2028 
2029 	ldns_write_uint16(val, num);
2030 	*dp = val + 2;
2031 	return LDNS_STATUS_OK;
2032 }
2033 
2034 static ldns_status
2035 parse_svcparam_ipv4hint(const char **s, uint8_t **dp, uint8_t *eod)
2036 {
2037 	bool quoted = false;
2038 
2039 	if (**s == '"') {
2040 		*s += 1;
2041 		quoted = true;
2042 	}
2043 	for (;;) {
2044 		const char *ipv4_start = *s;
2045 		char        ipv4_str[16];
2046 		size_t      len;
2047 
2048 		while (isdigit((unsigned char)**s) || **s == '.')
2049 			*s += 1;
2050 
2051 		len = *s - ipv4_start;
2052 		if (len == 0 || len > 15)
2053 			return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2054 
2055 		if (*dp + 4 > eod)
2056 			return LDNS_STATUS_RDATA_OVERFLOW;
2057 
2058 		memcpy(ipv4_str, ipv4_start, len);
2059 		ipv4_str[len] = 0;
2060 		if (inet_pton(AF_INET, ipv4_str, *dp) != 1)
2061 			return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2062 
2063 		*dp += 4;
2064 		if (**s == ',')
2065 			*s += 1;
2066 		else
2067 			break;
2068 	}
2069 	if (quoted) {
2070 		if (**s != '"')
2071 			return LDNS_STATUS_INVALID_STR;
2072 		*s += 1;
2073 	}
2074 	return **s && !isspace((unsigned char)**s)
2075 	     ? LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR
2076 	     : LDNS_STATUS_OK;
2077 }
2078 
2079 static ldns_status
2080 parse_svcparam_ech(const char **s, uint8_t **dp, uint8_t *eod)
2081 {
2082 	bool quoted = false;
2083 	const char *b64_str;
2084 	size_t len, pad, out_len;
2085 	char in_buf[4096];
2086 	char *in = in_buf;
2087 	int out;
2088 
2089 	if (**s == '"') {
2090 		*s += 1;
2091 		quoted = true;
2092 	}
2093 	b64_str = *s;
2094 	while (isalnum((unsigned char)**s) || **s == '+'
2095 	                                   || **s == '/'
2096 	                                   || **s == '=')
2097 		*s += 1;
2098 
2099 	len = *s - b64_str;
2100 	pad = len % 4;
2101 	pad = pad ? 4 - pad : 0;
2102 	if (len == 0 || pad == 3)
2103 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2104 
2105 	if (quoted) {
2106 		if (**s != '"')
2107 			return LDNS_STATUS_INVALID_STR;
2108 		*s += 1;
2109 	}
2110 	if (**s && !isspace((unsigned char)**s))
2111 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2112 
2113 	out_len = ldns_b64_pton_calculate_size(len);
2114 	if (*dp + out_len > eod)
2115 		return LDNS_STATUS_RDATA_OVERFLOW;
2116 
2117 	if (len + pad > sizeof(in_buf) - 1
2118 	&& !(in = LDNS_XMALLOC(char, len + pad + 1)))
2119 		return LDNS_STATUS_MEM_ERR;
2120 
2121 	memcpy(in, b64_str, len);
2122 	while (pad--)
2123 		in[len++] = '=';
2124 	in[len] = 0;
2125 	out = ldns_b64_pton(in, *dp, out_len);
2126 	if (in != in_buf)
2127 		LDNS_FREE(in);
2128 
2129 	if (out <= 0)
2130 		return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2131 
2132 	*dp += out;
2133 	return LDNS_STATUS_OK;
2134 }
2135 
2136 static ldns_status
2137 parse_svcparam_ipv6hint(const char **s, uint8_t **dp, uint8_t *eod)
2138 {
2139 	bool quoted = false;
2140 
2141 	if (**s == '"') {
2142 		*s += 1;
2143 		quoted = true;
2144 	}
2145 	for (;;) {
2146 		const char *ipv6_start = *s;
2147 		char        ipv6_str[INET6_ADDRSTRLEN];
2148 		size_t      len;
2149 
2150 		while (isxdigit((unsigned char)**s) || **s == ':' || **s == '.')
2151 			*s += 1;
2152 
2153 		len = *s - ipv6_start;
2154 		if (len == 0 || len > INET6_ADDRSTRLEN)
2155 			return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2156 
2157 		if (*dp + 16 > eod)
2158 			return LDNS_STATUS_RDATA_OVERFLOW;
2159 
2160 		memcpy(ipv6_str, ipv6_start, len);
2161 		ipv6_str[len] = 0;
2162 		if (inet_pton(AF_INET6, ipv6_str, *dp) != 1)
2163 			return LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR;
2164 
2165 		*dp += 16;
2166 		if (**s == ',')
2167 			*s += 1;
2168 		else
2169 			break;
2170 	}
2171 	if (quoted) {
2172 		if (**s != '"')
2173 			return LDNS_STATUS_INVALID_STR;
2174 		*s += 1;
2175 	}
2176 	return **s && !isspace((unsigned char)**s)
2177 	     ? LDNS_STATUS_SYNTAX_SVCPARAM_VALUE_ERR
2178 	     : LDNS_STATUS_OK;
2179 }
2180 
2181 struct struct_svcparam_key_def {
2182 	const char *str;
2183 	size_t      len;
2184 };
2185 typedef struct struct_svcparam_key_def svcparam_key_def;
2186 
2187 static svcparam_key_def svcparam_key_defs[] = { { "mandatory"      ,  9 }
2188                                               , { "alpn"           ,  4 }
2189                                               , { "no-default-alpn", 15 }
2190                                               , { "port"           ,  4 }
2191                                               , { "ipv4hint"       ,  8 }
2192                                               , { "ech"            ,  3 }
2193                                               , { "ipv6hint"       ,  8 }
2194                                               , { "dohpath"        ,  7 } };
2195 
2196 static const size_t svcparam_key_defs_len = sizeof(svcparam_key_defs)
2197                                           / sizeof(svcparam_key_def);
2198 
2199 /* svcparam_key2buffer_str() should actually be in host2str.c, but we need the
2200  * svcparam_key_defs for it and it is not an exposed symbol anyway.
2201  */
2202 ldns_status svcparam_key2buffer_str(ldns_buffer *output, uint16_t key)
2203 {
2204 	if (key <= LDNS_SVCPARAM_KEY_LAST_KEY)
2205 		ldns_buffer_write_string(output, svcparam_key_defs[key].str);
2206 	else
2207 		ldns_buffer_printf(output, "key%d", (int)key);
2208 	return	ldns_buffer_status(output);
2209 }
2210 
2211 static ldns_status
2212 parse_svcparam_key(const char **s, ldns_svcparam_key *key)
2213 {
2214 	size_t i, len;
2215 	const char *key_str = *s;
2216 	char num_str[6];
2217 	char *endptr;
2218 	unsigned long int num;
2219 
2220 	/* parse key */
2221 	while (islower((unsigned char)**s) || isdigit((unsigned char)**s)
2222 	                                   || **s == '-')
2223 		*s += 1;
2224 
2225 	len = *s - key_str;
2226 	for (i = 0; i < svcparam_key_defs_len; i++) {
2227 		if (len == svcparam_key_defs[i].len
2228 		&& !strncmp(key_str, svcparam_key_defs[i].str, len)) {
2229 			*key = i;
2230 			return LDNS_STATUS_OK;
2231 		}
2232 	}
2233 	/* Also allow "echconfig" from earlier draft versions. */
2234 	if (len == 9 && !strncmp(key_str, "echconfig", 9)) {
2235 		*key = LDNS_SVCPARAM_KEY_ECH;
2236 		return LDNS_STATUS_OK;
2237 	}
2238 	if (len < 4 || len > 8 || strncmp(key_str, "key", 3))
2239 		return LDNS_STATUS_SYNTAX_SVCPARAM_KEY_ERR;
2240 
2241 	memcpy(num_str, key_str + 3, len - 3);
2242 	num_str[len - 3] = 0;
2243 	num = strtoul(num_str, &endptr, 10);
2244 	if (*endptr || num > 65535)
2245 		return LDNS_STATUS_SYNTAX_SVCPARAM_KEY_ERR;
2246 
2247 	/* key65535 is Reserved to be an ("Invalid key"), though there is no
2248 	 * physiological reason to deny usage. We restrict ourselves to the
2249 	 * anatomical limitations only to maximize serviceability.
2250 	 * ```
2251 	 * if (num == 65535)
2252 	 * 	return LDNS_STATUS_RESERVED_SVCPARAM_KEY;
2253 	 * ```
2254 	 */
2255 	*key = num;
2256 	return LDNS_STATUS_OK;
2257 }
2258 
2259 static ldns_status
2260 parse_svcparam(const char **s, uint8_t **dp, uint8_t *eod)
2261 {
2262 	ldns_svcparam_key key;
2263 	ldns_status st;
2264 	uint8_t *val;
2265 
2266 	if (*dp + 4 > eod)
2267 		return LDNS_STATUS_RDATA_OVERFLOW;
2268 
2269 	if ((st = parse_svcparam_key(s, &key)))
2270 		return st;
2271 
2272 	ldns_write_uint16(*dp, key);
2273 	ldns_write_uint16(*dp + 2, 0);
2274 	*dp += 4;
2275 	if (isspace((unsigned char)**s) || !**s)
2276 		return LDNS_STATUS_OK;
2277 
2278 	else if (**s != '=')
2279 		return LDNS_STATUS_SYNTAX_ERR;
2280 	*s += 1;
2281 	val = *dp;
2282 	switch(key) {
2283 	case LDNS_SVCPARAM_KEY_MANDATORY:
2284 		st = parse_svcparam_mandatory(s, dp, eod);
2285 		break;
2286 	case LDNS_SVCPARAM_KEY_ALPN:
2287 		st = parse_svcparam_alpn(s, dp, eod);
2288 		break;
2289 	case LDNS_SVCPARAM_KEY_NO_DEFAULT_ALPN:
2290 		return LDNS_STATUS_NO_SVCPARAM_VALUE_EXPECTED;
2291 	case LDNS_SVCPARAM_KEY_PORT:
2292 		st = parse_svcparam_port(s, dp, eod);
2293 		break;
2294 	case LDNS_SVCPARAM_KEY_IPV4HINT:
2295 		st = parse_svcparam_ipv4hint(s, dp, eod);
2296 		break;
2297 	case LDNS_SVCPARAM_KEY_ECH:
2298 		st = parse_svcparam_ech(s, dp, eod);
2299 		break;
2300 	case LDNS_SVCPARAM_KEY_IPV6HINT:
2301 		st = parse_svcparam_ipv6hint(s, dp, eod);
2302 		break;
2303 	default:
2304 		st = parse_svcparam_value(s, dp, eod);
2305 		break;
2306 	}
2307 	if (st)
2308 		return st;
2309 	ldns_write_uint16(val - 2, *dp - val);
2310 	return LDNS_STATUS_OK;
2311 }
2312 
2313 static int
2314 svcparam_ptr_cmp(const void *a, const void *b)
2315 {
2316 	uint8_t *x = *(uint8_t **)a          , *y = *(uint8_t **)b;
2317 	uint16_t x_type = ldns_read_uint16(x),  y_type = ldns_read_uint16(y);
2318 	uint16_t x_len                       ,  y_len;
2319 
2320 	if (x_type != y_type)
2321 		return x_type > y_type ? 1 : -1;
2322 
2323 	x_len = ldns_read_uint16(x + 2);
2324 	y_len = ldns_read_uint16(y + 2);
2325 
2326 	return  x_len != y_len
2327 	     ? (x_len >  y_len ? 1 : -1)
2328 	     : (x_len == 0     ? 0 : memcmp(x + 4, y + 4, x_len));
2329 }
2330 
2331 ldns_status
2332 ldns_str2rdf_svcparams(ldns_rdf **rd, const char *str)
2333 {
2334 	uint8_t *data, *dp, *eod, *p, *new_data;
2335 	ldns_status st = LDNS_STATUS_OK;
2336 	size_t length, i;
2337 	size_t nparams = 0;
2338 	uint8_t **svcparams;
2339 	int prev_key;
2340 
2341 	if (!rd || !str)
2342 		return LDNS_STATUS_NULL;
2343 
2344 	length = strlen(str);
2345 	/* Worst case space requirement. We'll realloc to actual size later. */
2346 	if (!(dp = data = LDNS_XMALLOC(uint8_t, length * 4)))
2347 		return LDNS_STATUS_MEM_ERR;
2348 	eod = data + length * 4;
2349 
2350 	/* Fill data with parsed bytes */
2351 	for (;;) {
2352 		while (isspace((unsigned char)*str))
2353 			str += 1;
2354 		if(!*str)
2355 			break;
2356 		if ((st = parse_svcparam(&str, &dp, eod))) {
2357 			LDNS_FREE(data);
2358 			return st;
2359 		}
2360 		nparams += 1;
2361 	}
2362 
2363 	/* draft-ietf-dnsop-svcb-https-02 in Section 2.2:
2364 	 *
2365 	 *     SvcParamKeys SHALL appear in increasing numeric order
2366 	 *
2367 	 * A svcparams array (with pointers to the individual key, value pairs)
2368 	 * is created to qsort the pairs in increasing numeric order.
2369 	 */
2370 	if (!(svcparams = LDNS_XMALLOC(uint8_t *, nparams))) {
2371 		LDNS_FREE(data);
2372 		return LDNS_STATUS_MEM_ERR;
2373 	}
2374 	for ( p = data, i = 0
2375 	    ; p < dp && i < nparams
2376 	    ; p += 4 + ldns_read_uint16(p + 2))
2377 		svcparams[i++] = p;
2378 
2379 	qsort(svcparams, i, sizeof(uint8_t *), svcparam_ptr_cmp);
2380 
2381 	/* Write out the (key, value) pairs to a newly allocated data in
2382 	 * sorted order.
2383 	 */
2384 	length = dp - data;
2385 	if (!(new_data = LDNS_XMALLOC(uint8_t, length))) {
2386 		LDNS_FREE(data);
2387 		LDNS_FREE(svcparams);
2388 		return LDNS_STATUS_MEM_ERR;
2389 	}
2390 	prev_key = -1;
2391 	for ( p = new_data, i = 0
2392 	    ; p < new_data + length && i < nparams
2393 	    ; p += 4 + ldns_read_uint16(p + 2), i += 1) {
2394 		uint16_t key = ldns_read_uint16(svcparams[i]);
2395 
2396 		/* In draft-ietf-dnsop-svcb-https-02 Section 2.1:
2397 		 *
2398 		 *     SvcParams ...<snip>... keys MUST NOT be repeated.
2399 		 *
2400 		 * ldns will not impose this limitation on the library user,
2401 		 * but we can merge completely equal repetitions into one.
2402 		 * So, not doing
2403 		 * ```
2404 		 * if (key == prev_key)
2405 		 * 	return LDNS_STATUS_SVCPARAM_KEY_MORE_THAN_ONCE;
2406 		 * ```
2407 		 * but instead:
2408 		 */
2409 		if (key == prev_key && ldns_read_uint16(svcparams[i] + 2)
2410 		                    == ldns_read_uint16(svcparams[i - 1] + 2)
2411 		&&  0 == memcmp( svcparams[i    ] + 4
2412 		               , svcparams[i - 1] + 4
2413 		               , ldns_read_uint16(svcparams[i] + 2))) {
2414 			p -= 4 + ldns_read_uint16(svcparams[i] + 2);
2415 			continue;
2416 		}
2417 		memcpy(p, svcparams[i], 4 + ldns_read_uint16(svcparams[i] + 2));
2418 		prev_key = key;
2419 	}
2420 	LDNS_FREE(data);
2421 	LDNS_FREE(svcparams);
2422 
2423 	/* Create rdf */
2424 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_SVCPARAMS, p - new_data, new_data);
2425 	if (! *rd) {
2426 		LDNS_FREE(new_data);
2427 		return LDNS_STATUS_MEM_ERR;
2428 	}
2429 	return LDNS_STATUS_OK;
2430 }
2431 #else	/* #ifdef RRTYPE_SVCB_HTTPS */
2432 ldns_status
2433 ldns_str2rdf_svcparams(ldns_rdf **rd, const char *str)
2434 {
2435 	(void)rd; (void)str;
2436 	return LDNS_STATUS_NOT_IMPL;
2437 }
2438 #endif	/* #ifdef RRTYPE_SVCB_HTTPS */
2439