xref: /freebsd/contrib/ldns/str2host.c (revision bc96366c864c07ef352edb92017357917c75b36c)
1 /*
2  * str2host.c
3  *
4  * conversion routines from the presentation format
5  * to the host format
6  *
7  * a Net::DNS like library for C
8  *
9  * (c) NLnet Labs, 2004-2006
10  *
11  * See the file LICENSE for the license
12  */
13 #include <ldns/config.h>
14 
15 #include <ldns/ldns.h>
16 
17 #ifdef HAVE_SYS_SOCKET_H
18 #include <sys/socket.h>
19 #endif
20 #ifdef HAVE_ARPA_INET_H
21 #include <arpa/inet.h>
22 #endif
23 #include <time.h>
24 
25 #include <errno.h>
26 #ifdef HAVE_NETDB_H
27 #include <netdb.h>
28 #endif
29 
30 #include <limits.h>
31 #ifdef HAVE_SYS_PARAM_H
32 #include <sys/param.h>
33 #endif
34 
35 ldns_status
36 ldns_str2rdf_int16(ldns_rdf **rd, const char *shortstr)
37 {
38 	char *end = NULL;
39 	uint16_t *r;
40 	r = LDNS_MALLOC(uint16_t);
41         if(!r) return LDNS_STATUS_MEM_ERR;
42 
43 	*r = htons((uint16_t)strtol((char *)shortstr, &end, 10));
44 
45 	if(*end != 0) {
46 		LDNS_FREE(r);
47 		return LDNS_STATUS_INVALID_INT;
48 	} else {
49 		*rd = ldns_rdf_new_frm_data(
50 			LDNS_RDF_TYPE_INT16, sizeof(uint16_t), r);
51 		LDNS_FREE(r);
52 		return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
53 	}
54 }
55 
56 ldns_status
57 ldns_str2rdf_time(ldns_rdf **rd, const char *time)
58 {
59 	/* convert a time YYYYDDMMHHMMSS to wireformat */
60 	uint16_t *r = NULL;
61 	struct tm tm;
62 	uint32_t l;
63 	char *end;
64 
65 	/* Try to scan the time... */
66 	r = (uint16_t*)LDNS_MALLOC(uint32_t);
67         if(!r) return LDNS_STATUS_MEM_ERR;
68 
69 	memset(&tm, 0, sizeof(tm));
70 
71 	if (strlen(time) == 14 &&
72 	    sscanf(time, "%4d%2d%2d%2d%2d%2d", &tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour, &tm.tm_min, &tm.tm_sec) == 6
73 	   ) {
74 	   	tm.tm_year -= 1900;
75 	   	tm.tm_mon--;
76 	   	/* Check values */
77 		if (tm.tm_year < 70) {
78 			goto bad_format;
79 		}
80 		if (tm.tm_mon < 0 || tm.tm_mon > 11) {
81 			goto bad_format;
82 		}
83 		if (tm.tm_mday < 1 || tm.tm_mday > 31) {
84 			goto bad_format;
85 		}
86 
87 		if (tm.tm_hour < 0 || tm.tm_hour > 23) {
88 			goto bad_format;
89 		}
90 
91 		if (tm.tm_min < 0 || tm.tm_min > 59) {
92 			goto bad_format;
93 		}
94 
95 		if (tm.tm_sec < 0 || tm.tm_sec > 59) {
96 			goto bad_format;
97 		}
98 
99 		l = htonl(ldns_mktime_from_utc(&tm));
100 		memcpy(r, &l, sizeof(uint32_t));
101 		*rd = ldns_rdf_new_frm_data(
102 			LDNS_RDF_TYPE_TIME, sizeof(uint32_t), r);
103 		LDNS_FREE(r);
104 		return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
105 	} else {
106 		/* handle it as 32 bits timestamp */
107 		l = htonl((uint32_t)strtol((char*)time, &end, 10));
108 		if(*end != 0) {
109 			LDNS_FREE(r);
110 			return LDNS_STATUS_ERR;
111 		} else {
112 			memcpy(r, &l, sizeof(uint32_t));
113 			*rd = ldns_rdf_new_frm_data(
114 				LDNS_RDF_TYPE_INT32, sizeof(uint32_t), r);
115 			LDNS_FREE(r);
116 		        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
117 		}
118 	}
119 
120 	bad_format:
121 	LDNS_FREE(r);
122 	return LDNS_STATUS_INVALID_TIME;
123 }
124 
125 ldns_status
126 ldns_str2rdf_nsec3_salt(ldns_rdf **rd, const char *salt_str)
127 {
128 	uint8_t salt_length;
129 	int c;
130 	int salt_length_str;
131 
132 	uint8_t *salt;
133 	uint8_t *data;
134 	if(rd == NULL) {
135 		return LDNS_STATUS_NULL;
136 	}
137 
138 	salt_length_str = (int)strlen(salt_str);
139 	if (salt_length_str == 1 && salt_str[0] == '-') {
140 		salt_length_str = 0;
141 	} else if (salt_length_str % 2 != 0) {
142 		return LDNS_STATUS_INVALID_HEX;
143 	}
144 	if (salt_length_str > 512) {
145 		return LDNS_STATUS_INVALID_HEX;
146 	}
147 
148 	salt = LDNS_XMALLOC(uint8_t, salt_length_str / 2);
149         if(!salt) {
150                 return LDNS_STATUS_MEM_ERR;
151         }
152 	for (c = 0; c < salt_length_str; c += 2) {
153 		if (isxdigit((int) salt_str[c]) && isxdigit((int) salt_str[c+1])) {
154 			salt[c/2] = (uint8_t) ldns_hexdigit_to_int(salt_str[c]) * 16 +
155 					  ldns_hexdigit_to_int(salt_str[c+1]);
156 		} else {
157 			LDNS_FREE(salt);
158 			return LDNS_STATUS_INVALID_HEX;
159 		}
160 	}
161 	salt_length = (uint8_t) (salt_length_str / 2);
162 
163 	data = LDNS_XMALLOC(uint8_t, 1 + salt_length);
164         if(!data) {
165 	        LDNS_FREE(salt);
166                 return LDNS_STATUS_MEM_ERR;
167         }
168 	data[0] = salt_length;
169 	memcpy(&data[1], salt, salt_length);
170 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_NSEC3_SALT, 1 + salt_length, data);
171 	LDNS_FREE(data);
172 	LDNS_FREE(salt);
173 
174 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
175 }
176 
177 ldns_status
178 ldns_str2rdf_period(ldns_rdf **rd,const char *period)
179 {
180         uint32_t p;
181         const char *end;
182 
183         /* Allocate required space... */
184         p = ldns_str2period(period, &end);
185 
186         if (*end != 0) {
187 		return LDNS_STATUS_ERR;
188         } else {
189                 p = (uint32_t) htonl(p);
190 		*rd = ldns_rdf_new_frm_data(
191 			LDNS_RDF_TYPE_PERIOD, sizeof(uint32_t), &p);
192         }
193 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
194 }
195 
196 ldns_status
197 ldns_str2rdf_int32(ldns_rdf **rd, const char *longstr)
198 {
199 	char *end;
200 	uint16_t *r = NULL;
201 	uint32_t l;
202 
203 	r = (uint16_t*)LDNS_MALLOC(uint32_t);
204         if(!r) return LDNS_STATUS_MEM_ERR;
205 	errno = 0; /* must set to zero before call,
206 			note race condition on errno */
207 	if(*longstr == '-')
208 		l = htonl((uint32_t)strtol((char*)longstr, &end, 10));
209 	else	l = htonl((uint32_t)strtoul((char*)longstr, &end, 10));
210 
211 	if(*end != 0) {
212 		LDNS_FREE(r);
213 		return LDNS_STATUS_ERR;
214      } else {
215 		if (errno == ERANGE) {
216 			LDNS_FREE(r);
217 			return LDNS_STATUS_SYNTAX_INTEGER_OVERFLOW;
218 		}
219 		memcpy(r, &l, sizeof(uint32_t));
220 		*rd = ldns_rdf_new_frm_data(
221 			LDNS_RDF_TYPE_INT32, sizeof(uint32_t), r);
222 		LDNS_FREE(r);
223 	        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
224 	}
225 }
226 
227 ldns_status
228 ldns_str2rdf_int8(ldns_rdf **rd, const char *bytestr)
229 {
230 	char *end;
231 	uint8_t *r = NULL;
232 
233 	r = LDNS_MALLOC(uint8_t);
234         if(!r) return LDNS_STATUS_MEM_ERR;
235 
236 	*r = (uint8_t)strtol((char*)bytestr, &end, 10);
237 
238         if(*end != 0) {
239 		LDNS_FREE(r);
240 		return LDNS_STATUS_ERR;
241         } else {
242 		*rd = ldns_rdf_new_frm_data(
243 			LDNS_RDF_TYPE_INT8, sizeof(uint8_t), r);
244 		LDNS_FREE(r);
245 	        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
246         }
247 }
248 
249 
250 /*
251  * Checks whether the escaped value at **s is an octal value or
252  * a 'normally' escaped character (and not eos)
253  *
254  * The string pointer at *s is increased by either 0 (on error), 1 (on
255  * normal escapes), or 3 (on octals)
256  *
257  * Returns the number of bytes read from the escaped string, or
258  * 0 on error
259  */
260 INLINE bool
261 parse_escape(uint8_t *ch_p, const char** str_p)
262 {
263 	uint16_t val;
264 
265 	if ((*str_p)[0] && isdigit((*str_p)[0])  &&
266 	    (*str_p)[1] && isdigit((*str_p)[1])  &&
267 	    (*str_p)[2] && isdigit((*str_p)[2]))  {
268 
269 		val = (uint16_t)(((*str_p)[0] - '0') * 100 +
270 				 ((*str_p)[1] - '0') *  10 +
271 				 ((*str_p)[2] - '0'));
272 
273 		if (val > 255) {
274 			goto error;
275 		}
276 		*ch_p = (uint8_t)val;
277 		*str_p += 3;
278 		return true;
279 
280 	} else if ((*str_p)[0] && !isdigit((*str_p)[0])) {
281 
282 		*ch_p = (uint8_t)*(*str_p)++;
283 		return true;
284 	}
285 error:
286 	*str_p = NULL;
287 	return false; /* LDNS_STATUS_SYNTAX_BAD_ESCAPE */
288 }
289 
290 INLINE bool
291 parse_char(uint8_t *ch_p, const char** str_p)
292 {
293 	switch (**str_p) {
294 
295 	case '\0':	return false;
296 
297 	case '\\':	*str_p += 1;
298 			return parse_escape(ch_p, str_p);
299 
300 	default:	*ch_p = (uint8_t)*(*str_p)++;
301 			return true;
302 	}
303 }
304 
305 /*
306  * No special care is taken, all dots are translated into
307  * label seperators.
308  * Could be made more efficient....we do 3 memcpy's in total...
309  */
310 ldns_status
311 ldns_str2rdf_dname(ldns_rdf **d, const char *str)
312 {
313 	size_t len;
314 
315 	const char *s;
316 	uint8_t *q, *pq, label_len;
317 	uint8_t buf[LDNS_MAX_DOMAINLEN + 1];
318 	*d = NULL;
319 
320 	len = strlen((char*)str);
321 	/* octet representation can make strings a lot longer than actual length */
322 	if (len > LDNS_MAX_DOMAINLEN * 4) {
323 		return LDNS_STATUS_DOMAINNAME_OVERFLOW;
324 	}
325 	if (0 == len) {
326 		return LDNS_STATUS_DOMAINNAME_UNDERFLOW;
327 	}
328 
329 	/* root label */
330 	if (1 == len && *str == '.') {
331 		*d = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, 1, "\0");
332 		return LDNS_STATUS_OK;
333 	}
334 
335 	/* get on with the rest */
336 
337 	/* s is on the current character in the string
338          * pq points to where the labellength is going to go
339          * label_len keeps track of the current label's length
340 	 * q builds the dname inside the buf array
341 	 */
342 	len = 0;
343 	q = buf+1;
344 	pq = buf;
345 	label_len = 0;
346 	for (s = str; *s; s++, q++) {
347 		if (q > buf + LDNS_MAX_DOMAINLEN) {
348 			return LDNS_STATUS_DOMAINNAME_OVERFLOW;
349 		}
350 		*q = 0;
351 		switch (*s) {
352 		case '.':
353 			if (label_len > LDNS_MAX_LABELLEN) {
354 				return LDNS_STATUS_LABEL_OVERFLOW;
355 			}
356 			if (label_len == 0) {
357 				return LDNS_STATUS_EMPTY_LABEL;
358 			}
359 			len += label_len + 1;
360 			*pq = label_len;
361 			label_len = 0;
362 			pq = q;
363 			break;
364 		case '\\':
365 			/* octet value or literal char */
366 			s += 1;
367 			if (! parse_escape(q, &s)) {
368 				return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
369 			}
370 			s -= 1;
371 			label_len++;
372 			break;
373 		default:
374 			*q = (uint8_t)*s;
375 			label_len++;
376 		}
377 	}
378 
379 	/* add root label if last char was not '.' */
380 	if (!ldns_dname_str_absolute(str)) {
381 		if (q > buf + LDNS_MAX_DOMAINLEN) {
382 			return LDNS_STATUS_DOMAINNAME_OVERFLOW;
383 		}
384                 if (label_len > LDNS_MAX_LABELLEN) {
385                         return LDNS_STATUS_LABEL_OVERFLOW;
386                 }
387                 if (label_len == 0) { /* label_len 0 but not . at end? */
388                         return LDNS_STATUS_EMPTY_LABEL;
389                 }
390 		len += label_len + 1;
391 		*pq = label_len;
392 		*q = 0;
393 	}
394 	len++;
395 
396 	*d = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, len, buf);
397 	return LDNS_STATUS_OK;
398 }
399 
400 ldns_status
401 ldns_str2rdf_a(ldns_rdf **rd, const char *str)
402 {
403 	in_addr_t address;
404         if (inet_pton(AF_INET, (char*)str, &address) != 1) {
405                 return LDNS_STATUS_INVALID_IP4;
406         } else {
407 		*rd = ldns_rdf_new_frm_data(
408 			LDNS_RDF_TYPE_A, sizeof(address), &address);
409         }
410 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
411 }
412 
413 ldns_status
414 ldns_str2rdf_aaaa(ldns_rdf **rd, const char *str)
415 {
416 	uint8_t address[LDNS_IP6ADDRLEN + 1];
417 
418 	if (inet_pton(AF_INET6, (char*)str, address) != 1) {
419 		return LDNS_STATUS_INVALID_IP6;
420 	} else {
421 		*rd = ldns_rdf_new_frm_data(
422 			LDNS_RDF_TYPE_AAAA, sizeof(address) - 1, &address);
423 	}
424 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
425 }
426 
427 ldns_status
428 ldns_str2rdf_str(ldns_rdf **rd, const char *str)
429 {
430 	uint8_t *data, *dp, ch = 0;
431 	size_t length;
432 
433 	/* Worst case space requirement. We'll realloc to actual size later. */
434 	dp = data = LDNS_XMALLOC(uint8_t, strlen(str) > 255 ? 256 : (strlen(str) + 1));
435 	if (! data) {
436 		return LDNS_STATUS_MEM_ERR;
437 	}
438 
439 	/* Fill data (up to 255 characters) */
440 	while (parse_char(&ch, &str)) {
441 		if (dp - data >= 255) {
442 			LDNS_FREE(data);
443 			return LDNS_STATUS_INVALID_STR;
444 		}
445 		*++dp = ch;
446 	}
447 	if (! str) {
448 		return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
449 	}
450 	length = (size_t)(dp - data);
451 	/* Fix last length byte */
452 	data[0] = (uint8_t)length;
453 
454 	/* Lose the overmeasure */
455 	data = LDNS_XREALLOC(dp = data, uint8_t, length + 1);
456 	if (! data) {
457 		LDNS_FREE(dp);
458 		return LDNS_STATUS_MEM_ERR;
459 	}
460 
461 	/* Create rdf */
462 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_STR, length + 1, data);
463 	if (! *rd) {
464 		LDNS_FREE(data);
465 		return LDNS_STATUS_MEM_ERR;
466 	}
467 	return LDNS_STATUS_OK;
468 }
469 
470 ldns_status
471 ldns_str2rdf_apl(ldns_rdf **rd, const char *str)
472 {
473 	const char *my_str = str;
474 
475 	char *my_ip_str;
476 	size_t ip_str_len;
477 
478 	uint16_t family;
479 	bool negation;
480 	uint8_t afdlength = 0;
481 	uint8_t *afdpart;
482 	uint8_t prefix;
483 
484 	uint8_t *data;
485 
486 	size_t i = 0;
487 
488 	/* [!]afi:address/prefix */
489 	if (strlen(my_str) < 2
490 			|| strchr(my_str, ':') == NULL
491 			|| strchr(my_str, '/') == NULL
492 			|| strchr(my_str, ':') > strchr(my_str, '/')) {
493 		return LDNS_STATUS_INVALID_STR;
494 	}
495 
496 	if (my_str[0] == '!') {
497 		negation = true;
498 		my_str += 1;
499 	} else {
500 		negation = false;
501 	}
502 
503 	family = (uint16_t) atoi(my_str);
504 
505 	my_str = strchr(my_str, ':') + 1;
506 
507 	/* need ip addr and only ip addr for inet_pton */
508 	ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
509 	my_ip_str = LDNS_XMALLOC(char, ip_str_len + 1);
510         if(!my_ip_str) return LDNS_STATUS_MEM_ERR;
511 	strncpy(my_ip_str, my_str, ip_str_len + 1);
512 	my_ip_str[ip_str_len] = '\0';
513 
514 	if (family == 1) {
515 		/* ipv4 */
516 		afdpart = LDNS_XMALLOC(uint8_t, 4);
517                 if(!afdpart) {
518                         LDNS_FREE(my_ip_str);
519                         return LDNS_STATUS_MEM_ERR;
520                 }
521 		if (inet_pton(AF_INET, my_ip_str, afdpart) == 0) {
522                         LDNS_FREE(my_ip_str);
523                         LDNS_FREE(afdpart);
524 			return LDNS_STATUS_INVALID_STR;
525 		}
526 		for (i = 0; i < 4; i++) {
527 			if (afdpart[i] != 0) {
528 				afdlength = i + 1;
529 			}
530 		}
531 	} else if (family == 2) {
532 		/* ipv6 */
533 		afdpart = LDNS_XMALLOC(uint8_t, 16);
534                 if(!afdpart) {
535                         LDNS_FREE(my_ip_str);
536                         return LDNS_STATUS_MEM_ERR;
537                 }
538 		if (inet_pton(AF_INET6, my_ip_str, afdpart) == 0) {
539                         LDNS_FREE(my_ip_str);
540                         LDNS_FREE(afdpart);
541 			return LDNS_STATUS_INVALID_STR;
542 		}
543 		for (i = 0; i < 16; i++) {
544 			if (afdpart[i] != 0) {
545 				afdlength = i + 1;
546 			}
547 		}
548 	} else {
549 		/* unknown family */
550 		LDNS_FREE(my_ip_str);
551 		return LDNS_STATUS_INVALID_STR;
552 	}
553 
554 	my_str = strchr(my_str, '/') + 1;
555 	prefix = (uint8_t) atoi(my_str);
556 
557 	data = LDNS_XMALLOC(uint8_t, 4 + afdlength);
558         if(!data) {
559 		LDNS_FREE(afdpart);
560 		LDNS_FREE(my_ip_str);
561 		return LDNS_STATUS_INVALID_STR;
562         }
563 	ldns_write_uint16(data, family);
564 	data[2] = prefix;
565 	data[3] = afdlength;
566 	if (negation) {
567 		/* set bit 1 of byte 3 */
568 		data[3] = data[3] | 0x80;
569 	}
570 
571 	memcpy(data + 4, afdpart, afdlength);
572 
573 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_APL, afdlength + 4, data);
574 	LDNS_FREE(afdpart);
575 	LDNS_FREE(data);
576 	LDNS_FREE(my_ip_str);
577 
578 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
579 }
580 
581 ldns_status
582 ldns_str2rdf_b64(ldns_rdf **rd, const char *str)
583 {
584 	uint8_t *buffer;
585 	int16_t i;
586 
587 	buffer = LDNS_XMALLOC(uint8_t, ldns_b64_ntop_calculate_size(strlen(str)));
588         if(!buffer) {
589                 return LDNS_STATUS_MEM_ERR;
590         }
591 
592 	i = (uint16_t)ldns_b64_pton((const char*)str, buffer,
593 						   ldns_b64_ntop_calculate_size(strlen(str)));
594 	if (-1 == i) {
595 		LDNS_FREE(buffer);
596 		return LDNS_STATUS_INVALID_B64;
597 	} else {
598 		*rd = ldns_rdf_new_frm_data(
599 			LDNS_RDF_TYPE_B64, (uint16_t) i, buffer);
600 	}
601 	LDNS_FREE(buffer);
602 
603 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
604 }
605 
606 ldns_status
607 ldns_str2rdf_b32_ext(ldns_rdf **rd, const char *str)
608 {
609 	uint8_t *buffer;
610 	int i;
611 	/* first byte contains length of actual b32 data */
612 	uint8_t len = ldns_b32_pton_calculate_size(strlen(str));
613 	buffer = LDNS_XMALLOC(uint8_t, len + 1);
614         if(!buffer) {
615                 return LDNS_STATUS_MEM_ERR;
616         }
617 	buffer[0] = len;
618 
619 	i = ldns_b32_pton_extended_hex((const char*)str, strlen(str), buffer + 1,
620 							 ldns_b32_ntop_calculate_size(strlen(str)));
621 	if (i < 0) {
622                 LDNS_FREE(buffer);
623 		return LDNS_STATUS_INVALID_B32_EXT;
624 	} else {
625 		*rd = ldns_rdf_new_frm_data(
626 			LDNS_RDF_TYPE_B32_EXT, (uint16_t) i + 1, buffer);
627 	}
628 	LDNS_FREE(buffer);
629 
630 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
631 }
632 
633 ldns_status
634 ldns_str2rdf_hex(ldns_rdf **rd, const char *str)
635 {
636 	uint8_t *t, *t_orig;
637 	int i;
638 	size_t len;
639 
640 	len = strlen(str);
641 
642 	if (len > LDNS_MAX_RDFLEN * 2) {
643 		return LDNS_STATUS_LABEL_OVERFLOW;
644 	} else {
645 		t = LDNS_XMALLOC(uint8_t, (len / 2) + 1);
646                 if(!t) {
647                         return LDNS_STATUS_MEM_ERR;
648                 }
649 		t_orig = t;
650 		/* Now process octet by octet... */
651 		while (*str) {
652 			*t = 0;
653 			if (isspace((int) *str)) {
654 				str++;
655 			} else {
656 				for (i = 16; i >= 1; i -= 15) {
657 					while (*str && isspace((int) *str)) { str++; }
658 					if (*str) {
659 						if (isxdigit((int) *str)) {
660 							*t += ldns_hexdigit_to_int(*str) * i;
661 						} else {
662                                                         LDNS_FREE(t_orig);
663 							return LDNS_STATUS_ERR;
664 						}
665 						++str;
666 					}
667 				}
668 				++t;
669 			}
670 		}
671 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_HEX,
672 		                            (size_t) (t - t_orig),
673 		                            t_orig);
674 		LDNS_FREE(t_orig);
675 	}
676 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
677 }
678 
679 ldns_status
680 ldns_str2rdf_nsec(ldns_rdf **rd, const char *str)
681 {
682 	const char *delimiters = "\n\t ";
683 	char *token = LDNS_XMALLOC(char, LDNS_MAX_RDFLEN);
684 	ldns_buffer *str_buf;
685 	ssize_t c;
686 	uint16_t cur_type;
687 	size_t type_count = 0;
688 	ldns_rr_type type_list[65536];
689 	if(!token) return LDNS_STATUS_MEM_ERR;
690 	if(rd == NULL) {
691 		LDNS_FREE(token);
692 		return LDNS_STATUS_NULL;
693 	}
694 
695 	str_buf = LDNS_MALLOC(ldns_buffer);
696 	if(!str_buf) {
697 		LDNS_FREE(token);
698 		return LDNS_STATUS_MEM_ERR;
699 	}
700 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
701 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
702 		LDNS_FREE(str_buf);
703 		LDNS_FREE(token);
704 		return LDNS_STATUS_MEM_ERR;
705 	}
706 
707 	while ((c = ldns_bget_token(str_buf, token, delimiters, LDNS_MAX_RDFLEN)) != -1 && c != 0) {
708                 if(type_count >= sizeof(type_list)) {
709 		        LDNS_FREE(str_buf);
710 		        LDNS_FREE(token);
711                         return LDNS_STATUS_ERR;
712                 }
713 		cur_type = ldns_get_rr_type_by_name(token);
714 		type_list[type_count] = cur_type;
715 		type_count++;
716 	}
717 
718 	*rd = ldns_dnssec_create_nsec_bitmap(type_list,
719 	                                     type_count,
720 	                                     LDNS_RR_TYPE_NSEC);
721 
722 	LDNS_FREE(token);
723 	ldns_buffer_free(str_buf);
724 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
725 }
726 
727 ldns_status
728 ldns_str2rdf_type(ldns_rdf **rd, const char *str)
729 {
730 	uint16_t type;
731 	type = htons(ldns_get_rr_type_by_name(str));
732 	/* ldns_rr_type is a 16 bit value */
733 	*rd = ldns_rdf_new_frm_data(
734 		LDNS_RDF_TYPE_TYPE, sizeof(uint16_t), &type);
735 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
736 }
737 
738 ldns_status
739 ldns_str2rdf_class(ldns_rdf **rd, const char *str)
740 {
741 	uint16_t klass;
742 	klass = htons(ldns_get_rr_class_by_name(str));
743 	/* class is 16 bit */
744 	*rd = ldns_rdf_new_frm_data(
745 		LDNS_RDF_TYPE_CLASS, sizeof(uint16_t), &klass);
746 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
747 }
748 
749 /* An certificate alg field can either be specified as a 8 bits number
750  * or by its symbolic name. Handle both
751  */
752 ldns_status
753 ldns_str2rdf_cert_alg(ldns_rdf **rd, const char *str)
754 {
755 	ldns_lookup_table *lt;
756 	ldns_status st;
757 	uint8_t idd[2];
758 	lt = ldns_lookup_by_name(ldns_cert_algorithms, str);
759 	st = LDNS_STATUS_OK;
760 
761 	if (lt) {
762 		ldns_write_uint16(idd, (uint16_t) lt->id);
763 		*rd = ldns_rdf_new_frm_data(
764 			LDNS_RDF_TYPE_INT16, sizeof(uint16_t), idd);
765 		if (!*rd) {
766 			st = LDNS_STATUS_ERR;
767 		}
768 	} else {
769 		/* try as-is (a number) */
770 		st = ldns_str2rdf_int16(rd, str);
771 		if (st == LDNS_STATUS_OK &&
772 		    ldns_rdf2native_int16(*rd) == 0) {
773 			st = LDNS_STATUS_CERT_BAD_ALGORITHM;
774 		}
775 	}
776 
777 	return st;
778 }
779 
780 /* An alg field can either be specified as a 8 bits number
781  * or by its symbolic name. Handle both
782  */
783 ldns_status
784 ldns_str2rdf_alg(ldns_rdf **rd, const char *str)
785 {
786 	ldns_lookup_table *lt;
787 	ldns_status st;
788 
789 	lt = ldns_lookup_by_name(ldns_algorithms, str);
790 	st = LDNS_STATUS_OK;
791 
792 	if (lt) {
793 		/* it was given as a integer */
794 		*rd = ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, (uint8_t) lt->id);
795 		if (!*rd) {
796 			st = LDNS_STATUS_ERR;
797 		}
798 	} else {
799 		/* try as-is (a number) */
800 		st = ldns_str2rdf_int8(rd, str);
801 	}
802 	return st;
803 }
804 
805 ldns_status
806 ldns_str2rdf_unknown( ATTR_UNUSED(ldns_rdf **rd)
807 		    , ATTR_UNUSED(const char *str)
808 		    )
809 {
810 	/* this should be caught in an earlier time (general str2host for
811 	   rr's */
812 	return LDNS_STATUS_NOT_IMPL;
813 }
814 
815 ldns_status
816 ldns_str2rdf_service( ATTR_UNUSED(ldns_rdf **rd)
817 		    , ATTR_UNUSED(const char *str)
818 		    )
819 {
820 	/* is this used? is this actually WKS? or SRV? */
821 	return LDNS_STATUS_NOT_IMPL;
822 }
823 
824 static int
825 loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
826 {
827 	/* read <digits>[.<digits>][mM] */
828 	/* into mantissa exponent format for LOC type */
829 	uint32_t meters = 0, cm = 0, val;
830 	while (isblank(*my_str)) {
831 		my_str++;
832 	}
833 	meters = (uint32_t)strtol(my_str, &my_str, 10);
834 	if (*my_str == '.') {
835 		my_str++;
836 		cm = (uint32_t)strtol(my_str, &my_str, 10);
837 	}
838 	if (meters >= 1) {
839 		*e = 2;
840 		val = meters;
841 	} else	{
842 		*e = 0;
843 		val = cm;
844 	}
845 	while(val >= 10) {
846 		(*e)++;
847 		val /= 10;
848 	}
849 	*m = (uint8_t)val;
850 
851 	if (*e > 9)
852 		return 0;
853 	if (*my_str == 'm' || *my_str == 'M') {
854 		my_str++;
855 	}
856 	*endstr = my_str;
857 	return 1;
858 }
859 
860 ldns_status
861 ldns_str2rdf_loc(ldns_rdf **rd, const char *str)
862 {
863 	uint32_t latitude = 0;
864 	uint32_t longitude = 0;
865 	uint32_t altitude = 0;
866 
867 	uint8_t *data;
868 	uint32_t equator = (uint32_t) ldns_power(2, 31);
869 
870 	uint32_t h = 0;
871 	uint32_t m = 0;
872 	uint8_t size_b = 1, size_e = 2;
873 	uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
874 	uint8_t vert_pre_b = 1, vert_pre_e = 3;
875 
876 	double s = 0.0;
877 	bool northerness;
878 	bool easterness;
879 
880 	char *my_str = (char *) str;
881 
882 	/* only support version 0 */
883 	if (isdigit((int) *my_str)) {
884 		h = (uint32_t) strtol(my_str, &my_str, 10);
885 	} else {
886 		return LDNS_STATUS_INVALID_STR;
887 	}
888 
889 	while (isblank((int) *my_str)) {
890 		my_str++;
891 	}
892 
893 	if (isdigit((int) *my_str)) {
894 		m = (uint32_t) strtol(my_str, &my_str, 10);
895 	} else if (*my_str == 'N' || *my_str == 'S') {
896 		goto north;
897 	} else {
898 		return LDNS_STATUS_INVALID_STR;
899 	}
900 
901 	while (isblank((int) *my_str)) {
902 		my_str++;
903 	}
904 
905 	if (isdigit((int) *my_str)) {
906 		s = strtod(my_str, &my_str);
907 	}
908 north:
909 	while (isblank((int) *my_str)) {
910 		my_str++;
911 	}
912 
913 	if (*my_str == 'N') {
914 		northerness = true;
915 	} else if (*my_str == 'S') {
916 		northerness = false;
917 	} else {
918 		return LDNS_STATUS_INVALID_STR;
919 	}
920 
921 	my_str++;
922 
923 	/* store number */
924 	s = 1000.0 * s;
925 	/* add a little to make floor in conversion a round */
926 	s += 0.0005;
927 	latitude = (uint32_t) s;
928 	latitude += 1000 * 60 * m;
929 	latitude += 1000 * 60 * 60 * h;
930 	if (northerness) {
931 		latitude = equator + latitude;
932 	} else {
933 		latitude = equator - latitude;
934 	}
935 	while (isblank(*my_str)) {
936 		my_str++;
937 	}
938 
939 	if (isdigit((int) *my_str)) {
940 		h = (uint32_t) strtol(my_str, &my_str, 10);
941 	} else {
942 		return LDNS_STATUS_INVALID_STR;
943 	}
944 
945 	while (isblank((int) *my_str)) {
946 		my_str++;
947 	}
948 
949 	if (isdigit((int) *my_str)) {
950 		m = (uint32_t) strtol(my_str, &my_str, 10);
951 	} else if (*my_str == 'E' || *my_str == 'W') {
952 		goto east;
953 	} else {
954 		return LDNS_STATUS_INVALID_STR;
955 	}
956 
957 	while (isblank(*my_str)) {
958 		my_str++;
959 	}
960 
961 	if (isdigit((int) *my_str)) {
962 		s = strtod(my_str, &my_str);
963 	}
964 
965 east:
966 	while (isblank(*my_str)) {
967 		my_str++;
968 	}
969 
970 	if (*my_str == 'E') {
971 		easterness = true;
972 	} else if (*my_str == 'W') {
973 		easterness = false;
974 	} else {
975 		return LDNS_STATUS_INVALID_STR;
976 	}
977 
978 	my_str++;
979 
980 	/* store number */
981 	s *= 1000.0;
982 	/* add a little to make floor in conversion a round */
983 	s += 0.0005;
984 	longitude = (uint32_t) s;
985 	longitude += 1000 * 60 * m;
986 	longitude += 1000 * 60 * 60 * h;
987 
988 	if (easterness) {
989 		longitude += equator;
990 	} else {
991 		longitude = equator - longitude;
992 	}
993 
994 	altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
995 		10000000.0 + 0.5);
996 	if (*my_str == 'm' || *my_str == 'M') {
997 		my_str++;
998 	}
999 
1000 	if (strlen(my_str) > 0) {
1001 		if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1002 			return LDNS_STATUS_INVALID_STR;
1003 	}
1004 
1005 	if (strlen(my_str) > 0) {
1006 		if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1007 			return LDNS_STATUS_INVALID_STR;
1008 	}
1009 
1010 	if (strlen(my_str) > 0) {
1011 		if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1012 			return LDNS_STATUS_INVALID_STR;
1013 	}
1014 
1015 	data = LDNS_XMALLOC(uint8_t, 16);
1016         if(!data) {
1017                 return LDNS_STATUS_MEM_ERR;
1018         }
1019 	data[0] = 0;
1020 	data[1] = 0;
1021 	data[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1022 	data[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1023 	data[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1024 	ldns_write_uint32(data + 4, latitude);
1025 	ldns_write_uint32(data + 8, longitude);
1026 	ldns_write_uint32(data + 12, altitude);
1027 
1028 	*rd = ldns_rdf_new_frm_data(
1029 		LDNS_RDF_TYPE_LOC, 16, data);
1030 
1031 	LDNS_FREE(data);
1032 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
1033 }
1034 
1035 ldns_status
1036 ldns_str2rdf_wks(ldns_rdf **rd, const char *str)
1037 {
1038 	uint8_t *bitmap = NULL;
1039 	uint8_t *data;
1040 	int bm_len = 0;
1041 
1042 	struct protoent *proto = NULL;
1043 	struct servent *serv = NULL;
1044 	int serv_port;
1045 
1046 	ldns_buffer *str_buf;
1047 
1048 	char *proto_str = NULL;
1049 	char *token;
1050 	if(strlen(str) == 0)
1051 		token = LDNS_XMALLOC(char, 50);
1052 	else 	token = LDNS_XMALLOC(char, strlen(str)+2);
1053 	if(!token) return LDNS_STATUS_MEM_ERR;
1054 
1055 	str_buf = LDNS_MALLOC(ldns_buffer);
1056 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1057 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1058 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1059 		LDNS_FREE(str_buf);
1060 		LDNS_FREE(token);
1061 		return LDNS_STATUS_MEM_ERR;
1062 	}
1063 
1064 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1065 		if (!proto_str) {
1066 			proto_str = strdup(token);
1067 			if (!proto_str) {
1068 				LDNS_FREE(bitmap);
1069 				LDNS_FREE(token);
1070 	                        ldns_buffer_free(str_buf);
1071 				return LDNS_STATUS_INVALID_STR;
1072 			}
1073 		} else {
1074 			serv = getservbyname(token, proto_str);
1075 			if (serv) {
1076 				serv_port = (int) ntohs((uint16_t) serv->s_port);
1077 			} else {
1078 				serv_port = atoi(token);
1079 			}
1080 			if (serv_port / 8 >= bm_len) {
1081 				uint8_t *b2 = LDNS_XREALLOC(bitmap, uint8_t, (serv_port / 8) + 1);
1082                                 if(!b2) {
1083 					LDNS_FREE(bitmap);
1084 				        LDNS_FREE(token);
1085 	                                ldns_buffer_free(str_buf);
1086 				        free(proto_str);
1087 				        return LDNS_STATUS_INVALID_STR;
1088                                 }
1089 				bitmap = b2;
1090 				/* set to zero to be sure */
1091 				for (; bm_len <= serv_port / 8; bm_len++) {
1092 					bitmap[bm_len] = 0;
1093 				}
1094 			}
1095 			ldns_set_bit(bitmap + (serv_port / 8), 7 - (serv_port % 8), true);
1096 		}
1097 	}
1098 
1099 	if (!proto_str || !bitmap) {
1100 		LDNS_FREE(bitmap);
1101 		LDNS_FREE(token);
1102 	        ldns_buffer_free(str_buf);
1103 	        free(proto_str);
1104 		return LDNS_STATUS_INVALID_STR;
1105 	}
1106 
1107 	data = LDNS_XMALLOC(uint8_t, bm_len + 1);
1108         if(!data) {
1109 	        LDNS_FREE(token);
1110 	        ldns_buffer_free(str_buf);
1111 	        LDNS_FREE(bitmap);
1112 	        free(proto_str);
1113 	        return LDNS_STATUS_INVALID_STR;
1114         }
1115     if (proto_str)
1116 		proto = getprotobyname(proto_str);
1117 	if (proto) {
1118 		data[0] = (uint8_t) proto->p_proto;
1119 	} else if (proto_str) {
1120 		data[0] = (uint8_t) atoi(proto_str);
1121 	}
1122 	memcpy(data + 1, bitmap, (size_t) bm_len);
1123 
1124 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_WKS, (uint16_t) (bm_len + 1), data);
1125 
1126 	LDNS_FREE(data);
1127 	LDNS_FREE(token);
1128 	ldns_buffer_free(str_buf);
1129 	LDNS_FREE(bitmap);
1130 	free(proto_str);
1131 #ifdef HAVE_ENDSERVENT
1132 	endservent();
1133 #endif
1134 #ifdef HAVE_ENDPROTOENT
1135 	endprotoent();
1136 #endif
1137 
1138 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1139 
1140 	return LDNS_STATUS_OK;
1141 }
1142 
1143 ldns_status
1144 ldns_str2rdf_nsap(ldns_rdf **rd, const char *str)
1145 {
1146     size_t len, i;
1147     char* nsap_str = (char*) str;
1148 
1149 	/* just a hex string with optional dots? */
1150 	if (str[0] != '0' || str[1] != 'x') {
1151 		return LDNS_STATUS_INVALID_STR;
1152 	} else {
1153 		len = strlen(str);
1154 		for (i=0; i < len; i++) {
1155 			if (nsap_str[i] == '.')
1156 				nsap_str[i] = ' ';
1157         }
1158 		return ldns_str2rdf_hex(rd, str+2);
1159 	}
1160 }
1161 
1162 ldns_status
1163 ldns_str2rdf_atma(ldns_rdf **rd, const char *str)
1164 {
1165     size_t len, i;
1166     char* atma_str = (char*) str;
1167 	ldns_status status;
1168 
1169 	/* just a hex string with optional dots? */
1170 	len = strlen(str);
1171 	for (i=0; i < len; i++) {
1172 		if (atma_str[i] == '.')
1173 			atma_str[i] = ' ';
1174 	}
1175 	status = ldns_str2rdf_hex(rd, str);
1176     if (status != LDNS_STATUS_OK) {
1177 		; /* probably in e.164 format than */
1178 	}
1179 	return status;
1180 }
1181 
1182 ldns_status
1183 ldns_str2rdf_ipseckey(ldns_rdf **rd, const char *str)
1184 {
1185 	uint8_t precedence = 0;
1186 	uint8_t gateway_type = 0;
1187 	uint8_t algorithm = 0;
1188 	char* gateway = NULL;
1189 	char* publickey = NULL;
1190 	uint8_t *data;
1191 	ldns_buffer *str_buf;
1192 	char *token;
1193 	int token_count = 0;
1194 	int ipseckey_len = 0;
1195 	ldns_rdf* gateway_rdf = NULL;
1196 	ldns_rdf* publickey_rdf = NULL;
1197 	ldns_status status = LDNS_STATUS_OK;
1198 
1199 	if(strlen(str) == 0)
1200 		token = LDNS_XMALLOC(char, 256);
1201 	else	token = LDNS_XMALLOC(char, strlen(str)+2);
1202 	if(!token) return LDNS_STATUS_MEM_ERR;
1203 
1204 	str_buf = LDNS_MALLOC(ldns_buffer);
1205 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1206 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1207 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1208 		LDNS_FREE(str_buf);
1209 		LDNS_FREE(token);
1210 		return LDNS_STATUS_MEM_ERR;
1211 	}
1212 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1213 		switch (token_count) {
1214 				case 0:
1215 					precedence = (uint8_t)atoi(token);
1216 					break;
1217 				case 1:
1218 					gateway_type = (uint8_t)atoi(token);
1219 					break;
1220 				case 2:
1221 					algorithm = (uint8_t)atoi(token);
1222 					break;
1223 				case 3:
1224 					gateway = strdup(token);
1225 					if (!gateway || (gateway_type == 0 &&
1226 							(token[0] != '.' || token[1] != '\0'))) {
1227 						LDNS_FREE(gateway);
1228 						LDNS_FREE(token);
1229 						ldns_buffer_free(str_buf);
1230 						return LDNS_STATUS_INVALID_STR;
1231 					}
1232 					break;
1233 				case 4:
1234 					publickey = strdup(token);
1235 					break;
1236 				default:
1237 					LDNS_FREE(token);
1238 					ldns_buffer_free(str_buf);
1239 					return LDNS_STATUS_INVALID_STR;
1240 					break;
1241 		}
1242 		token_count++;
1243 	}
1244 
1245 	if (!gateway || !publickey) {
1246 		if (gateway)
1247 			LDNS_FREE(gateway);
1248 		if (publickey)
1249 			LDNS_FREE(publickey);
1250 		LDNS_FREE(token);
1251 		ldns_buffer_free(str_buf);
1252 		return LDNS_STATUS_INVALID_STR;
1253 	}
1254 
1255 	if (gateway_type == 1) {
1256 		status = ldns_str2rdf_a(&gateway_rdf, gateway);
1257 	} else if (gateway_type == 2) {
1258 		status = ldns_str2rdf_aaaa(&gateway_rdf, gateway);
1259 	} else if (gateway_type == 3) {
1260 		status = ldns_str2rdf_dname(&gateway_rdf, gateway);
1261 	}
1262 
1263 	if (status != LDNS_STATUS_OK) {
1264 		if (gateway)
1265 			LDNS_FREE(gateway);
1266 		if (publickey)
1267 			LDNS_FREE(publickey);
1268 		LDNS_FREE(token);
1269 		ldns_buffer_free(str_buf);
1270 		return LDNS_STATUS_INVALID_STR;
1271 	}
1272 
1273 	status = ldns_str2rdf_b64(&publickey_rdf, publickey);
1274 
1275 	if (status != LDNS_STATUS_OK) {
1276 		if (gateway)
1277 			LDNS_FREE(gateway);
1278 		if (publickey)
1279 			LDNS_FREE(publickey);
1280 		LDNS_FREE(token);
1281 		ldns_buffer_free(str_buf);
1282 		if (gateway_rdf) ldns_rdf_free(gateway_rdf);
1283 		return LDNS_STATUS_INVALID_STR;
1284 	}
1285 
1286 	/* now copy all into one ipseckey rdf */
1287 	if (gateway_type)
1288 		ipseckey_len = 3 + (int)ldns_rdf_size(gateway_rdf) + (int)ldns_rdf_size(publickey_rdf);
1289 	else
1290 		ipseckey_len = 3 + (int)ldns_rdf_size(publickey_rdf);
1291 
1292 	data = LDNS_XMALLOC(uint8_t, ipseckey_len);
1293 	if(!data) {
1294 		if (gateway)
1295 			LDNS_FREE(gateway);
1296 		if (publickey)
1297 			LDNS_FREE(publickey);
1298 		LDNS_FREE(token);
1299 		ldns_buffer_free(str_buf);
1300 		if (gateway_rdf) ldns_rdf_free(gateway_rdf);
1301 		if (publickey_rdf) ldns_rdf_free(publickey_rdf);
1302 		return LDNS_STATUS_MEM_ERR;
1303 	}
1304 
1305 	data[0] = precedence;
1306 	data[1] = gateway_type;
1307 	data[2] = algorithm;
1308 
1309 	if (gateway_type) {
1310 		memcpy(data + 3,
1311 			ldns_rdf_data(gateway_rdf), ldns_rdf_size(gateway_rdf));
1312 		memcpy(data + 3 + ldns_rdf_size(gateway_rdf),
1313 			ldns_rdf_data(publickey_rdf), ldns_rdf_size(publickey_rdf));
1314 	} else {
1315 		memcpy(data + 3,
1316 			ldns_rdf_data(publickey_rdf), ldns_rdf_size(publickey_rdf));
1317 	}
1318 
1319 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_IPSECKEY, (uint16_t) ipseckey_len, data);
1320 
1321 	if (gateway)
1322 		LDNS_FREE(gateway);
1323 	if (publickey)
1324 		LDNS_FREE(publickey);
1325 	LDNS_FREE(token);
1326 	ldns_buffer_free(str_buf);
1327 	ldns_rdf_free(gateway_rdf);
1328 	ldns_rdf_free(publickey_rdf);
1329 	LDNS_FREE(data);
1330 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1331 	return LDNS_STATUS_OK;
1332 }
1333 
1334 ldns_status
1335 ldns_str2rdf_ilnp64(ldns_rdf **rd, const char *str)
1336 {
1337 	unsigned int a, b, c, d;
1338 	uint16_t shorts[4];
1339 	int l;
1340 
1341 	if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1342 			l != (int)strlen(str) || /* more data to read */
1343 			strpbrk(str, "+-")       /* signed hexes */
1344 			) {
1345 		return LDNS_STATUS_INVALID_ILNP64;
1346 	} else {
1347 		shorts[0] = htons(a);
1348 		shorts[1] = htons(b);
1349 		shorts[2] = htons(c);
1350 		shorts[3] = htons(d);
1351 		*rd = ldns_rdf_new_frm_data(
1352 			LDNS_RDF_TYPE_ILNP64, 4 * sizeof(uint16_t), &shorts);
1353 	}
1354 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1355 }
1356 
1357 ldns_status
1358 ldns_str2rdf_eui48(ldns_rdf **rd, const char *str)
1359 {
1360 	unsigned int a, b, c, d, e, f;
1361 	uint8_t bytes[6];
1362 	int l;
1363 
1364 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1365 			&a, &b, &c, &d, &e, &f, &l) != 6 ||
1366 			l != (int)strlen(str) || /* more data to read */
1367 			strpbrk(str, "+-")       /* signed hexes */
1368 			) {
1369 		return LDNS_STATUS_INVALID_EUI48;
1370 	} else {
1371 		bytes[0] = a;
1372 		bytes[1] = b;
1373 		bytes[2] = c;
1374 		bytes[3] = d;
1375 		bytes[4] = e;
1376 		bytes[5] = f;
1377 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_EUI48, 6, &bytes);
1378 	}
1379 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1380 }
1381 
1382 ldns_status
1383 ldns_str2rdf_eui64(ldns_rdf **rd, const char *str)
1384 {
1385 	unsigned int a, b, c, d, e, f, g, h;
1386 	uint8_t bytes[8];
1387 	int l;
1388 
1389 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
1390 			&a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
1391 			l != (int)strlen(str) || /* more data to read */
1392 			strpbrk(str, "+-")       /* signed hexes */
1393 			) {
1394 		return LDNS_STATUS_INVALID_EUI64;
1395 	} else {
1396 		bytes[0] = a;
1397 		bytes[1] = b;
1398 		bytes[2] = c;
1399 		bytes[3] = d;
1400 		bytes[4] = e;
1401 		bytes[5] = f;
1402 		bytes[6] = g;
1403 		bytes[7] = h;
1404 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_EUI64, 8, &bytes);
1405 	}
1406 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1407 }
1408 
1409 ldns_status
1410 ldns_str2rdf_tag(ldns_rdf **rd, const char *str)
1411 {
1412 	uint8_t *data;
1413 	const char* ptr;
1414 
1415 	if (strlen(str) > 255) {
1416 		return LDNS_STATUS_INVALID_TAG;
1417 	}
1418 	for (ptr = str; *ptr; ptr++) {
1419 		if (! isalnum(*ptr)) {
1420 			return LDNS_STATUS_INVALID_TAG;
1421 		}
1422 	}
1423 	data = LDNS_XMALLOC(uint8_t, strlen(str) + 1);
1424         if (!data) {
1425 		return LDNS_STATUS_MEM_ERR;
1426 	}
1427 	data[0] = strlen(str);
1428 	memcpy(data + 1, str, strlen(str));
1429 
1430 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_TAG, strlen(str) + 1, data);
1431 	if (!*rd) {
1432 		LDNS_FREE(data);
1433 		return LDNS_STATUS_MEM_ERR;
1434 	}
1435 	return LDNS_STATUS_OK;
1436 }
1437 
1438 ldns_status
1439 ldns_str2rdf_long_str(ldns_rdf **rd, const char *str)
1440 {
1441 	uint8_t *data, *dp, ch = 0;
1442 	size_t length;
1443 
1444 	/* Worst case space requirement. We'll realloc to actual size later. */
1445 	dp = data = LDNS_XMALLOC(uint8_t, strlen(str));
1446         if (! data) {
1447 		return LDNS_STATUS_MEM_ERR;
1448 	}
1449 
1450 	/* Fill data with parsed bytes */
1451 	while (parse_char(&ch, &str)) {
1452 		*dp++ = ch;
1453 		if (dp - data > LDNS_MAX_RDFLEN) {
1454 			LDNS_FREE(data);
1455 			return LDNS_STATUS_INVALID_STR;
1456 		}
1457 	}
1458 	if (! str) {
1459 		return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1460 	}
1461 	length = (size_t)(dp - data);
1462 
1463 	/* Lose the overmeasure */
1464 	data = LDNS_XREALLOC(dp = data, uint8_t, length);
1465 	if (! data) {
1466 		LDNS_FREE(dp);
1467 		return LDNS_STATUS_MEM_ERR;
1468 	}
1469 
1470 	/* Create rdf */
1471 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_LONG_STR, length, data);
1472 	if (! *rd) {
1473 		LDNS_FREE(data);
1474 		return LDNS_STATUS_MEM_ERR;
1475 	}
1476 	return LDNS_STATUS_OK;
1477 }
1478 
1479 ldns_status
1480 ldns_str2rdf_hip(ldns_rdf **rd, const char *str)
1481 {
1482 	const char *hit = strchr(str, ' ') + 1;
1483 	const char *pk  = hit == NULL ? NULL : strchr(hit, ' ') + 1;
1484 	size_t hit_size = hit == NULL ? 0
1485 	                : pk  == NULL ? strlen(hit) : (size_t) (pk - hit) - 1;
1486 	size_t  pk_size = pk  == NULL ? 0 : strlen(pk);
1487 	size_t hit_wire_size = (hit_size + 1) / 2;
1488 	size_t  pk_wire_size = ldns_b64_pton_calculate_size(pk_size);
1489 	size_t rdf_size = 4 + hit_wire_size + pk_wire_size;
1490 
1491 	char *endptr; /* utility var for strtol usage */
1492 	int algorithm = strtol(str, &endptr, 10);
1493 
1494 	uint8_t *data, *dp;
1495 	int hi, lo, written;
1496 
1497 	if (hit_size == 0 || pk_size == 0 || (hit_size + 1) / 2 > 255
1498 			|| rdf_size > LDNS_MAX_RDFLEN
1499 			|| algorithm < 0 || algorithm > 255
1500 			|| (errno != 0 && algorithm == 0) /* out of range */
1501 			|| endptr == str                  /* no digits    */) {
1502 
1503 		return LDNS_STATUS_SYNTAX_ERR;
1504 	}
1505 	if ((data = LDNS_XMALLOC(uint8_t, rdf_size)) == NULL) {
1506 
1507 		return LDNS_STATUS_MEM_ERR;
1508 	}
1509 	/* From RFC 5205 section 5. HIP RR Storage Format:
1510 	 *************************************************
1511 
1512 	0                   1                   2                   3
1513 	0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1514 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1515 	|  HIT length   | PK algorithm  |          PK length            |
1516 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1517 	|                                                               |
1518 	~                           HIT                                 ~
1519 	|                                                               |
1520 	+                     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1521 	|                     |                                         |
1522 	+-+-+-+-+-+-+-+-+-+-+-+                                         +
1523 	|                           Public Key                          |
1524 	~                                                               ~
1525 	|                                                               |
1526 	+                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1527 	|                               |                               |
1528 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
1529 	|                                                               |
1530 	~                       Rendezvous Servers                      ~
1531 	|                                                               |
1532 	+             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1533 	|             |
1534 	+-+-+-+-+-+-+-+                                                    */
1535 
1536 	data[0] = (uint8_t) hit_wire_size;
1537 	data[1] = (uint8_t) algorithm;
1538 
1539 	for (dp = data + 4; *hit && *hit != ' '; dp++) {
1540 
1541 		if ((hi = ldns_hexdigit_to_int(*hit++)) == -1 ||
1542 		    (lo = ldns_hexdigit_to_int(*hit++)) == -1) {
1543 
1544 			LDNS_FREE(data);
1545 			return LDNS_STATUS_INVALID_HEX;
1546 		}
1547 		*dp = (uint8_t) hi << 4 | lo;
1548 	}
1549 	if ((written = ldns_b64_pton(pk, dp, pk_wire_size)) <= 0) {
1550 
1551 		LDNS_FREE(data);
1552 		return LDNS_STATUS_INVALID_B64;
1553 	}
1554 
1555 	/* Because ldns_b64_pton_calculate_size isn't always correct:
1556 	 * (we have to fix it at some point)
1557 	 */
1558 	pk_wire_size = (uint16_t) written;
1559 	ldns_write_uint16(data + 2, pk_wire_size);
1560 	rdf_size = 4 + hit_wire_size + pk_wire_size;
1561 
1562 	/* Create rdf */
1563 	if (! (*rd = ldns_rdf_new(LDNS_RDF_TYPE_HIP, rdf_size, data))) {
1564 
1565 		LDNS_FREE(data);
1566 		return LDNS_STATUS_MEM_ERR;
1567 	}
1568 	return LDNS_STATUS_OK;
1569 }
1570