xref: /freebsd/contrib/unbound/sldns/str2wire.c (revision d65cd7a57bf0600b722afc770838a5d0c1c3a8e1)
1 /**
2  * str2wire.c - read txt presentation of RRs
3  *
4  * (c) NLnet Labs, 2005-2006
5  *
6  * See the file LICENSE for the license
7  */
8 
9 /**
10  * \file
11  *
12  * Parses text to wireformat.
13  */
14 #include "config.h"
15 #include "sldns/str2wire.h"
16 #include "sldns/wire2str.h"
17 #include "sldns/sbuffer.h"
18 #include "sldns/parse.h"
19 #include "sldns/parseutil.h"
20 #include <ctype.h>
21 #ifdef HAVE_TIME_H
22 #include <time.h>
23 #endif
24 #ifdef HAVE_NETDB_H
25 #include <netdb.h>
26 #endif
27 
28 /** return an error */
29 #define RET_ERR(e, off) ((int)((e)|((off)<<LDNS_WIREPARSE_SHIFT)))
30 /** Move parse error but keep its ID */
31 #define RET_ERR_SHIFT(e, move) RET_ERR(LDNS_WIREPARSE_ERROR(e), LDNS_WIREPARSE_OFFSET(e)+(move));
32 #define LDNS_IP6ADDRLEN      (128/8)
33 
34 /*
35  * No special care is taken, all dots are translated into
36  * label separators.
37  * @param rel: true if the domain is not absolute (not terminated in .).
38  * 	The output is then still terminated with a '0' rootlabel.
39  */
40 static int sldns_str2wire_dname_buf_rel(const char* str, uint8_t* buf,
41 	size_t* olen, int* rel)
42 {
43 	size_t len;
44 
45 	const char *s;
46 	uint8_t *q, *pq, label_len;
47 
48 	if(rel) *rel = 0;
49 	len = strlen((char*)str);
50 	/* octet representation can make strings a lot longer than actual length */
51 	if (len > LDNS_MAX_DOMAINLEN * 4) {
52 		return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, 0);
53 	}
54 	if (0 == len) {
55 		return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, 0);
56 	}
57 
58 	/* root label */
59 	if (1 == len && *str == '.') {
60 		if(*olen < 1)
61 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
62 		buf[0] = 0;
63 		*olen = 1;
64 		return LDNS_WIREPARSE_ERR_OK;
65 	}
66 
67 	/* get on with the rest */
68 
69 	/* s is on the current character in the string
70          * pq points to where the labellength is going to go
71          * label_len keeps track of the current label's length
72 	 * q builds the dname inside the buf array
73 	 */
74 	len = 0;
75 	if(*olen < 1)
76 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
77 	q = buf+1;
78 	pq = buf;
79 	label_len = 0;
80 	for (s = str; *s; s++, q++) {
81 		if (q >= buf + *olen)
82 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
83 		if (q >= buf + LDNS_MAX_DOMAINLEN)
84 			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
85 		switch (*s) {
86 		case '.':
87 			if (label_len > LDNS_MAX_LABELLEN) {
88 				return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
89 			}
90 			if (label_len == 0) {
91 				return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
92 			}
93 			len += label_len + 1;
94 			*q = 0;
95 			*pq = label_len;
96 			label_len = 0;
97 			pq = q;
98 			break;
99 		case '\\':
100 			/* octet value or literal char */
101 			s += 1;
102 			if (!sldns_parse_escape(q, &s)) {
103 				*q = 0;
104 				return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, q-buf);
105 			}
106 			s -= 1;
107 			label_len++;
108 			break;
109 		default:
110 			*q = (uint8_t)*s;
111 			label_len++;
112 		}
113 	}
114 
115 	/* add root label if last char was not '.' */
116 	if(label_len != 0) {
117 		if(rel) *rel = 1;
118 		if (q >= buf + *olen)
119 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
120 		if (q >= buf + LDNS_MAX_DOMAINLEN) {
121 			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
122 		}
123                 if (label_len > LDNS_MAX_LABELLEN) {
124                         return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
125                 }
126                 if (label_len == 0) { /* label_len 0 but not . at end? */
127                         return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
128                 }
129 		len += label_len + 1;
130 		*pq = label_len;
131 		*q = 0;
132 	}
133 	len++;
134 	*olen = len;
135 
136 	return LDNS_WIREPARSE_ERR_OK;
137 }
138 
139 int sldns_str2wire_dname_buf(const char* str, uint8_t* buf, size_t* len)
140 {
141 	return sldns_str2wire_dname_buf_rel(str, buf, len, NULL);
142 }
143 
144 int sldns_str2wire_dname_buf_origin(const char* str, uint8_t* buf, size_t* len,
145 	uint8_t* origin, size_t origin_len)
146 {
147 	size_t dlen = *len;
148 	int rel = 0;
149 	int s = sldns_str2wire_dname_buf_rel(str, buf, &dlen, &rel);
150 	if(s) return s;
151 
152 	if(rel && origin && dlen > 0) {
153 		if((unsigned)dlen >= 0x00ffffffU ||
154 			(unsigned)origin_len >= 0x00ffffffU)
155 			/* guard against integer overflow in addition */
156 			return RET_ERR(LDNS_WIREPARSE_ERR_GENERAL, *len);
157 		if(dlen + origin_len - 1 > LDNS_MAX_DOMAINLEN)
158 			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW,
159 				LDNS_MAX_DOMAINLEN);
160 		if(dlen + origin_len - 1 > *len)
161 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
162 				*len);
163 		memmove(buf+dlen-1, origin, origin_len);
164 		*len = dlen + origin_len - 1;
165 	} else
166 		*len = dlen;
167 	return LDNS_WIREPARSE_ERR_OK;
168 }
169 
170 uint8_t* sldns_str2wire_dname(const char* str, size_t* len)
171 {
172 	uint8_t dname[LDNS_MAX_DOMAINLEN+1];
173 	*len = sizeof(dname);
174 	if(sldns_str2wire_dname_buf(str, dname, len) == 0) {
175 		uint8_t* r;
176 		if(*len > sizeof(dname)) return NULL;
177 		r = (uint8_t*)malloc(*len);
178 		if(r) return memcpy(r, dname, *len);
179 	}
180 	*len = 0;
181 	return NULL;
182 }
183 
184 /** read owner name */
185 static int
186 rrinternal_get_owner(sldns_buffer* strbuf, uint8_t* rr, size_t* len,
187 	size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
188 	size_t prev_len, char* token, size_t token_len)
189 {
190 	/* split the rr in its parts -1 signals trouble */
191 	if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
192 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
193 			sldns_buffer_position(strbuf));
194 	}
195 
196 	if(token_len < 2) /* make sure there is space to read "@" or "" */
197 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
198 			sldns_buffer_position(strbuf));
199 	if(token[0]=='@' && token[1]=='\0') {
200 		uint8_t* tocopy;
201 		if (origin) {
202 			*dname_len = origin_len;
203 			tocopy = origin;
204 		} else if (prev) {
205 			*dname_len = prev_len;
206 			tocopy = prev;
207 		} else {
208 			/* default to root */
209 			*dname_len = 1;
210 			tocopy = (uint8_t*)"\0";
211 		}
212 		if(*len < *dname_len)
213 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
214 				sldns_buffer_position(strbuf));
215 		memmove(rr, tocopy, *dname_len);
216 	} else if(*token == '\0') {
217 		/* no ownername was given, try prev, if that fails
218 		 * origin, else default to root */
219 		uint8_t* tocopy;
220 		if(prev) {
221 			*dname_len = prev_len;
222 			tocopy = prev;
223 		} else if(origin) {
224 			*dname_len = origin_len;
225 			tocopy = origin;
226 		} else {
227 			*dname_len = 1;
228 			tocopy = (uint8_t*)"\0";
229 		}
230 		if(*len < *dname_len)
231 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
232 				sldns_buffer_position(strbuf));
233 		memmove(rr, tocopy, *dname_len);
234 	} else {
235 		size_t dlen = *len;
236 		int s = sldns_str2wire_dname_buf_origin(token, rr, &dlen,
237 			origin, origin_len);
238 		if(s) return RET_ERR_SHIFT(s,
239 			sldns_buffer_position(strbuf)-strlen(token));
240 		*dname_len = dlen;
241 	}
242 	return LDNS_WIREPARSE_ERR_OK;
243 }
244 
245 /** read ttl */
246 static int
247 rrinternal_get_ttl(sldns_buffer* strbuf, char* token, size_t token_len,
248 	int* not_there, uint32_t* ttl, uint32_t default_ttl)
249 {
250 	const char* endptr;
251 	if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
252 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TTL,
253 			sldns_buffer_position(strbuf));
254 	}
255 	*ttl = (uint32_t) sldns_str2period(token, &endptr);
256 
257 	if (strlen(token) > 0 && !isdigit((unsigned char)token[0])) {
258 		*not_there = 1;
259 		/* ah, it's not there or something */
260 		if (default_ttl == 0) {
261 			*ttl = LDNS_DEFAULT_TTL;
262 		} else {
263 			*ttl = default_ttl;
264 		}
265 	}
266 	return LDNS_WIREPARSE_ERR_OK;
267 }
268 
269 /** read class */
270 static int
271 rrinternal_get_class(sldns_buffer* strbuf, char* token, size_t token_len,
272 	int* not_there, uint16_t* cl)
273 {
274 	/* if 'not_there' then we got token from previous parse routine */
275 	if(!*not_there) {
276 		/* parse new token for class */
277 		if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
278 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_CLASS,
279 				sldns_buffer_position(strbuf));
280 		}
281 	} else *not_there = 0;
282 	*cl = sldns_get_rr_class_by_name(token);
283 	/* class can be left out too, assume IN, current token must be type */
284 	if(*cl == 0 && strcmp(token, "CLASS0") != 0) {
285 		*not_there = 1;
286 		*cl = LDNS_RR_CLASS_IN;
287 	}
288 	return LDNS_WIREPARSE_ERR_OK;
289 }
290 
291 /** read type */
292 static int
293 rrinternal_get_type(sldns_buffer* strbuf, char* token, size_t token_len,
294 	int* not_there, uint16_t* tp)
295 {
296 	/* if 'not_there' then we got token from previous parse routine */
297 	if(!*not_there) {
298 		/* parse new token for type */
299 		if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
300 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
301 				sldns_buffer_position(strbuf));
302 		}
303 	}
304 	*tp = sldns_get_rr_type_by_name(token);
305 	if(*tp == 0 && strcmp(token, "TYPE0") != 0) {
306 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
307 			sldns_buffer_position(strbuf));
308 	}
309 	return LDNS_WIREPARSE_ERR_OK;
310 }
311 
312 /** put type, class, ttl into rr buffer */
313 static int
314 rrinternal_write_typeclassttl(sldns_buffer* strbuf, uint8_t* rr, size_t len,
315 	size_t dname_len, uint16_t tp, uint16_t cl, uint32_t ttl, int question)
316 {
317 	if(question) {
318 		/* question is : name, type, class */
319 		if(dname_len + 4 > len)
320 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
321 				sldns_buffer_position(strbuf));
322 		sldns_write_uint16(rr+dname_len, tp);
323 		sldns_write_uint16(rr+dname_len+2, cl);
324 		return LDNS_WIREPARSE_ERR_OK;
325 	}
326 
327 	/* type(2), class(2), ttl(4), rdatalen(2 (later)) = 10 */
328 	if(dname_len + 10 > len)
329 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
330 			sldns_buffer_position(strbuf));
331 	sldns_write_uint16(rr+dname_len, tp);
332 	sldns_write_uint16(rr+dname_len+2, cl);
333 	sldns_write_uint32(rr+dname_len+4, ttl);
334 	sldns_write_uint16(rr+dname_len+8, 0); /* rdatalen placeholder */
335 	return LDNS_WIREPARSE_ERR_OK;
336 }
337 
338 /** find delimiters for type */
339 static const char*
340 rrinternal_get_delims(sldns_rdf_type rdftype, size_t r_cnt, size_t r_max)
341 {
342 	switch(rdftype) {
343 	case LDNS_RDF_TYPE_B64        :
344 	case LDNS_RDF_TYPE_HEX        : /* These rdf types may con- */
345 	case LDNS_RDF_TYPE_LOC        : /* tain whitespace, only if */
346 	case LDNS_RDF_TYPE_WKS        : /* it is the last rd field. */
347 	case LDNS_RDF_TYPE_IPSECKEY   :
348 	case LDNS_RDF_TYPE_NSEC       :	if (r_cnt == r_max - 1) {
349 						return "\n";
350 					}
351 					break;
352 	default                       :	break;
353 	}
354 	return "\n\t ";
355 }
356 
357 /* Syntactic sugar for sldns_rr_new_frm_str_internal */
358 static int
359 sldns_rdf_type_maybe_quoted(sldns_rdf_type rdf_type)
360 {
361 	return  rdf_type == LDNS_RDF_TYPE_STR ||
362 		rdf_type == LDNS_RDF_TYPE_LONG_STR;
363 }
364 
365 /** see if rdata is quoted */
366 static int
367 rrinternal_get_quoted(sldns_buffer* strbuf, const char** delimiters,
368 	sldns_rdf_type rdftype)
369 {
370 	if(sldns_rdf_type_maybe_quoted(rdftype) &&
371 		sldns_buffer_remaining(strbuf) > 0) {
372 
373 		/* skip spaces */
374 		while(sldns_buffer_remaining(strbuf) > 0 &&
375 			*(sldns_buffer_current(strbuf)) == ' ') {
376 			sldns_buffer_skip(strbuf, 1);
377 		}
378 
379 		if(sldns_buffer_remaining(strbuf) > 0 &&
380 			*(sldns_buffer_current(strbuf)) == '\"') {
381 			*delimiters = "\"\0";
382 			sldns_buffer_skip(strbuf, 1);
383 			return 1;
384 		}
385 	}
386 	return 0;
387 }
388 
389 /** spool hex data into rdata */
390 static int
391 rrinternal_spool_hex(char* token, uint8_t* rr, size_t rr_len,
392 	size_t rr_cur_len, size_t* cur_hex_data_size, size_t hex_data_size)
393 {
394 	char* p = token;
395 	while(*p) {
396 		if(isspace((unsigned char)*p)) {
397 			p++;
398 			continue;
399 		}
400 		if(!isxdigit((unsigned char)*p))
401 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
402 				p-token);
403 		if(*cur_hex_data_size >= hex_data_size)
404 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
405 				p-token);
406 		/* extra robust check */
407 		if(rr_cur_len+(*cur_hex_data_size)/2 >= rr_len)
408 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
409 				p-token);
410 		/* see if 16s or 1s */
411 		if( ((*cur_hex_data_size)&1) == 0) {
412 			rr[rr_cur_len+(*cur_hex_data_size)/2] =
413 				(uint8_t)sldns_hexdigit_to_int(*p)*16;
414 		} else {
415 			rr[rr_cur_len+(*cur_hex_data_size)/2] +=
416 				(uint8_t)sldns_hexdigit_to_int(*p);
417 		}
418 		p++;
419 		(*cur_hex_data_size)++;
420 	}
421 	return LDNS_WIREPARSE_ERR_OK;
422 }
423 
424 /** read unknown rr type format */
425 static int
426 rrinternal_parse_unknown(sldns_buffer* strbuf, char* token, size_t token_len,
427         uint8_t* rr, size_t* rr_len, size_t* rr_cur_len, size_t pre_data_pos)
428 {
429 	const char* delim = "\n\t ";
430 	size_t hex_data_size, cur_hex_data_size;
431 	/* go back to before \#
432 	 * and skip it while setting delimiters better
433 	 */
434 	sldns_buffer_set_position(strbuf, pre_data_pos);
435 	if(sldns_bget_token(strbuf, token, delim, token_len) == -1)
436 		return LDNS_WIREPARSE_ERR_GENERAL; /* should not fail */
437 	/* read rdata octet length */
438 	if(sldns_bget_token(strbuf, token, delim, token_len) == -1) {
439 		/* something goes very wrong here */
440 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
441 			sldns_buffer_position(strbuf));
442 	}
443 	hex_data_size = (size_t)atoi(token);
444 	if(hex_data_size > LDNS_MAX_RDFLEN ||
445 		*rr_cur_len + hex_data_size > *rr_len) {
446 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
447 			sldns_buffer_position(strbuf));
448 	}
449 	/* copy hex chars into hex str (2 chars per byte) */
450 	hex_data_size *= 2;
451 	cur_hex_data_size = 0;
452 	while(cur_hex_data_size < hex_data_size) {
453 		int status;
454 		ssize_t c = sldns_bget_token(strbuf, token, delim, token_len);
455 		if((status = rrinternal_spool_hex(token, rr, *rr_len,
456 			*rr_cur_len, &cur_hex_data_size, hex_data_size)) != 0)
457 			return RET_ERR_SHIFT(status,
458 				sldns_buffer_position(strbuf)-strlen(token));
459 		if(c == -1) {
460 			if(cur_hex_data_size != hex_data_size)
461 				return RET_ERR(
462 					LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
463 					sldns_buffer_position(strbuf));
464 			break;
465 		}
466 	}
467 	*rr_cur_len += hex_data_size/2;
468 	return LDNS_WIREPARSE_ERR_OK;
469 }
470 
471 /** parse normal RR rdata element */
472 static int
473 rrinternal_parse_rdf(sldns_buffer* strbuf, char* token, size_t token_len,
474 	uint8_t* rr, size_t rr_len, size_t* rr_cur_len, sldns_rdf_type rdftype,
475 	uint16_t rr_type, size_t r_cnt, size_t r_max, size_t dname_len,
476 	uint8_t* origin, size_t origin_len)
477 {
478 	size_t len;
479 	int status;
480 
481 	switch(rdftype) {
482 	case LDNS_RDF_TYPE_DNAME:
483 		/* check if the origin should be used or concatenated */
484 		if(strcmp(token, "@") == 0) {
485 			uint8_t* tocopy;
486 			size_t copylen;
487 			if(origin) {
488 				copylen = origin_len;
489 				tocopy = origin;
490 			} else if(rr_type == LDNS_RR_TYPE_SOA) {
491 				copylen = dname_len;
492 				tocopy = rr; /* copy rr owner name */
493 			} else {
494 				copylen = 1;
495 				tocopy = (uint8_t*)"\0";
496 			}
497 			if((*rr_cur_len) + copylen > rr_len)
498 				return RET_ERR(
499 					LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
500 					sldns_buffer_position(strbuf));
501 			memmove(rr+*rr_cur_len, tocopy, copylen);
502 			(*rr_cur_len) += copylen;
503 		} else {
504 			size_t dlen = rr_len - (*rr_cur_len);
505 			int s = sldns_str2wire_dname_buf_origin(token,
506 				rr+*rr_cur_len, &dlen, origin, origin_len);
507 			if(s) return RET_ERR_SHIFT(s,
508 				sldns_buffer_position(strbuf)-strlen(token));
509 			(*rr_cur_len) += dlen;
510 		}
511 		return LDNS_WIREPARSE_ERR_OK;
512 
513 	case LDNS_RDF_TYPE_HEX:
514 	case LDNS_RDF_TYPE_B64:
515 		/* When this is the last rdata field, then the
516 		 * rest should be read in (cause then these
517 		 * rdf types may contain spaces). */
518 		if(r_cnt == r_max - 1) {
519 			size_t tlen = strlen(token);
520 			(void)sldns_bget_token(strbuf, token+tlen, "\n",
521 				token_len - tlen);
522 		}
523 		break;
524 	default:
525 		break;
526 	}
527 
528 	len = rr_len - (*rr_cur_len);
529 	if((status=sldns_str2wire_rdf_buf(token, rr+(*rr_cur_len), &len,
530 		rdftype)) != 0)
531 		return RET_ERR_SHIFT(status,
532 			sldns_buffer_position(strbuf)-strlen(token));
533 	*rr_cur_len += len;
534 	return LDNS_WIREPARSE_ERR_OK;
535 }
536 
537 /**
538  * Parse one rdf token.  Takes care of quotes and parenthesis.
539  */
540 static int
541 sldns_parse_rdf_token(sldns_buffer* strbuf, char* token, size_t token_len,
542 	int* quoted, int* parens, size_t* pre_data_pos,
543 	const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
544 {
545 	size_t slen;
546 
547 	/* skip spaces */
548 	while(sldns_buffer_remaining(strbuf) > 0 && !*quoted &&
549 		*(sldns_buffer_current(strbuf)) == ' ') {
550 		sldns_buffer_skip(strbuf, 1);
551 	}
552 
553 	*pre_data_pos = sldns_buffer_position(strbuf);
554 	if(sldns_bget_token_par(strbuf, token, (*quoted)?"\"":delimiters,
555 		token_len, parens, (*quoted)?NULL:" \t") == -1) {
556 		return 0;
557 	}
558 	slen = strlen(token);
559 	/* check if not quoted yet, and we have encountered quotes */
560 	if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
561 		slen >= 2 &&
562 		(token[0] == '"' || token[0] == '\'') &&
563 		(token[slen-1] == '"' || token[slen-1] == '\'')) {
564 		/* move token two smaller (quotes) with endnull */
565 		memmove(token, token+1, slen-2);
566 		token[slen-2] = 0;
567 		slen -= 2;
568 		*quoted = 1;
569 	} else if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
570 		slen >= 2 &&
571 		(token[0] == '"' || token[0] == '\'')) {
572 		/* got the start quote (remove it) but read remainder
573 		 * of quoted string as well into remainder of token */
574 		memmove(token, token+1, slen-1);
575 		token[slen-1] = 0;
576 		slen -= 1;
577 		*quoted = 1;
578 		/* rewind buffer over skipped whitespace */
579 		while(sldns_buffer_position(strbuf) > 0 &&
580 			(sldns_buffer_current(strbuf)[-1] == ' ' ||
581 			sldns_buffer_current(strbuf)[-1] == '\t')) {
582 			sldns_buffer_skip(strbuf, -1);
583 		}
584 		if(sldns_bget_token_par(strbuf, token+slen,
585 			"\"", token_len-slen,
586 			parens, NULL) == -1) {
587 			return 0;
588 		}
589 		slen = strlen(token);
590 	}
591 	*token_strlen = slen;
592 	return 1;
593 }
594 
595 /** Add space and one more rdf token onto the existing token string. */
596 static int
597 sldns_affix_token(sldns_buffer* strbuf, char* token, size_t* token_len,
598 	int* quoted, int* parens, size_t* pre_data_pos,
599 	const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
600 {
601 	size_t addlen = *token_len - *token_strlen;
602 	size_t addstrlen = 0;
603 
604 	/* add space */
605 	if(addlen < 1) return 0;
606 	token[*token_strlen] = ' ';
607 	token[++(*token_strlen)] = 0;
608 
609 	/* read another token */
610 	addlen = *token_len - *token_strlen;
611 	if(!sldns_parse_rdf_token(strbuf, token+*token_strlen, addlen, quoted,
612 		parens, pre_data_pos, delimiters, rdftype, &addstrlen))
613 		return 0;
614 	(*token_strlen) += addstrlen;
615 	return 1;
616 }
617 
618 /** parse rdata from string into rr buffer(-remainder after dname). */
619 static int
620 rrinternal_parse_rdata(sldns_buffer* strbuf, char* token, size_t token_len,
621 	uint8_t* rr, size_t* rr_len, size_t dname_len, uint16_t rr_type,
622 	uint8_t* origin, size_t origin_len)
623 {
624 	const sldns_rr_descriptor *desc = sldns_rr_descript((uint16_t)rr_type);
625 	size_t r_cnt, r_min, r_max;
626 	size_t rr_cur_len = dname_len + 10, pre_data_pos, token_strlen;
627 	int was_unknown_rr_format = 0, parens = 0, status, quoted;
628 	const char* delimiters;
629 	sldns_rdf_type rdftype;
630 	/* a desc is always returned */
631 	if(!desc) return LDNS_WIREPARSE_ERR_GENERAL;
632 	r_max = sldns_rr_descriptor_maximum(desc);
633 	r_min = sldns_rr_descriptor_minimum(desc);
634 	/* robust check */
635 	if(rr_cur_len > *rr_len)
636 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
637 			sldns_buffer_position(strbuf));
638 
639 	/* because number of fields can be variable, we can't rely on
640 	 * _maximum() only */
641 	for(r_cnt=0; r_cnt < r_max; r_cnt++) {
642 		rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
643 		delimiters = rrinternal_get_delims(rdftype, r_cnt, r_max);
644 		quoted = rrinternal_get_quoted(strbuf, &delimiters, rdftype);
645 
646 		if(!sldns_parse_rdf_token(strbuf, token, token_len, &quoted,
647 			&parens, &pre_data_pos, delimiters, rdftype,
648 			&token_strlen))
649 			break;
650 
651 		/* rfc3597 specifies that any type can be represented
652 		 * with \# method, which can contain spaces...
653 		 * it does specify size though... */
654 
655 		/* unknown RR data */
656 		if(token_strlen>=2 && strncmp(token, "\\#", 2) == 0 &&
657 			!quoted && (token_strlen == 2 || token[2]==' ')) {
658 			was_unknown_rr_format = 1;
659 			if((status=rrinternal_parse_unknown(strbuf, token,
660 				token_len, rr, rr_len, &rr_cur_len,
661 				pre_data_pos)) != 0)
662 				return status;
663 		} else if(token_strlen > 0 || quoted) {
664 			if(rdftype == LDNS_RDF_TYPE_HIP) {
665 				/* affix the HIT and PK fields, with a space */
666 				if(!sldns_affix_token(strbuf, token,
667 					&token_len, &quoted, &parens,
668 					&pre_data_pos, delimiters,
669 					rdftype, &token_strlen))
670 					break;
671 				if(!sldns_affix_token(strbuf, token,
672 					&token_len, &quoted, &parens,
673 					&pre_data_pos, delimiters,
674 					rdftype, &token_strlen))
675 					break;
676 			} else if(rdftype == LDNS_RDF_TYPE_INT16_DATA &&
677 				strcmp(token, "0")!=0) {
678 				/* affix len and b64 fields */
679 				if(!sldns_affix_token(strbuf, token,
680 					&token_len, &quoted, &parens,
681 					&pre_data_pos, delimiters,
682 					rdftype, &token_strlen))
683 					break;
684 			}
685 
686 			/* normal RR */
687 			if((status=rrinternal_parse_rdf(strbuf, token,
688 				token_len, rr, *rr_len, &rr_cur_len, rdftype,
689 				rr_type, r_cnt, r_max, dname_len, origin,
690 				origin_len)) != 0) {
691 				return status;
692 			}
693 		}
694 	}
695 	if(!was_unknown_rr_format && r_cnt+1 < r_min) {
696 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE,
697 			sldns_buffer_position(strbuf));
698 	}
699 	while(parens != 0) {
700 		/* read remainder, must be "" */
701 		if(sldns_bget_token_par(strbuf, token, "\n", token_len,
702 			&parens, " \t") == -1) {
703 			if(parens != 0)
704 				return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
705 					sldns_buffer_position(strbuf));
706 			break;
707 		}
708 		if(strcmp(token, "") != 0)
709 			return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
710 				sldns_buffer_position(strbuf));
711 	}
712 	/* write rdata length */
713 	sldns_write_uint16(rr+dname_len+8, (uint16_t)(rr_cur_len-dname_len-10));
714 	*rr_len = rr_cur_len;
715 	return LDNS_WIREPARSE_ERR_OK;
716 }
717 
718 /*
719  * trailing spaces are allowed
720  * leading spaces are not allowed
721  * allow ttl to be optional
722  * class is optional too
723  * if ttl is missing, and default_ttl is 0, use DEF_TTL
724  * allow ttl to be written as 1d3h
725  * So the RR should look like. e.g.
726  * miek.nl. 3600 IN MX 10 elektron.atoom.net
727  * or
728  * miek.nl. 1h IN MX 10 elektron.atoom.net
729  * or
730  * miek.nl. IN MX 10 elektron.atoom.net
731  */
732 static int
733 sldns_str2wire_rr_buf_internal(const char* str, uint8_t* rr, size_t* len,
734 	size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
735 	size_t origin_len, uint8_t* prev, size_t prev_len, int question)
736 {
737 	int status;
738 	int not_there = 0;
739 	char token[LDNS_MAX_RDFLEN+1];
740 	uint32_t ttl = 0;
741 	uint16_t tp = 0, cl = 0;
742 	size_t ddlen = 0;
743 
744 	/* string in buffer */
745 	sldns_buffer strbuf;
746 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
747 	if(!dname_len) dname_len = &ddlen;
748 
749 	/* parse the owner */
750 	if((status=rrinternal_get_owner(&strbuf, rr, len, dname_len, origin,
751 		origin_len, prev, prev_len, token, sizeof(token))) != 0)
752 		return status;
753 
754 	/* parse the [ttl] [class] <type> */
755 	if((status=rrinternal_get_ttl(&strbuf, token, sizeof(token),
756 		&not_there, &ttl, default_ttl)) != 0)
757 		return status;
758 	if((status=rrinternal_get_class(&strbuf, token, sizeof(token),
759 		&not_there, &cl)) != 0)
760 		return status;
761 	if((status=rrinternal_get_type(&strbuf, token, sizeof(token),
762 		&not_there, &tp)) != 0)
763 		return status;
764 	/* put ttl, class, type into the rr result */
765 	if((status=rrinternal_write_typeclassttl(&strbuf, rr, *len, *dname_len, tp, cl,
766 		ttl, question)) != 0)
767 		return status;
768 	/* for a question-RR we are done, no rdata */
769 	if(question) {
770 		*len = *dname_len + 4;
771 		return LDNS_WIREPARSE_ERR_OK;
772 	}
773 
774 	/* rdata */
775 	if((status=rrinternal_parse_rdata(&strbuf, token, sizeof(token),
776 		rr, len, *dname_len, tp, origin, origin_len)) != 0)
777 		return status;
778 
779 	return LDNS_WIREPARSE_ERR_OK;
780 }
781 
782 int sldns_str2wire_rr_buf(const char* str, uint8_t* rr, size_t* len,
783 	size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
784 	size_t origin_len, uint8_t* prev, size_t prev_len)
785 {
786 	return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
787 		default_ttl, origin, origin_len, prev, prev_len, 0);
788 }
789 
790 int sldns_str2wire_rr_question_buf(const char* str, uint8_t* rr, size_t* len,
791 	size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
792 	size_t prev_len)
793 {
794 	return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
795 		0, origin, origin_len, prev, prev_len, 1);
796 }
797 
798 uint16_t sldns_wirerr_get_type(uint8_t* rr, size_t len, size_t dname_len)
799 {
800 	if(len < dname_len+2)
801 		return 0;
802 	return sldns_read_uint16(rr+dname_len);
803 }
804 
805 uint16_t sldns_wirerr_get_class(uint8_t* rr, size_t len, size_t dname_len)
806 {
807 	if(len < dname_len+4)
808 		return 0;
809 	return sldns_read_uint16(rr+dname_len+2);
810 }
811 
812 uint32_t sldns_wirerr_get_ttl(uint8_t* rr, size_t len, size_t dname_len)
813 {
814 	if(len < dname_len+8)
815 		return 0;
816 	return sldns_read_uint32(rr+dname_len+4);
817 }
818 
819 uint16_t sldns_wirerr_get_rdatalen(uint8_t* rr, size_t len, size_t dname_len)
820 {
821 	if(len < dname_len+10)
822 		return 0;
823 	return sldns_read_uint16(rr+dname_len+8);
824 }
825 
826 uint8_t* sldns_wirerr_get_rdata(uint8_t* rr, size_t len, size_t dname_len)
827 {
828 	if(len < dname_len+10)
829 		return NULL;
830 	return rr+dname_len+10;
831 }
832 
833 uint8_t* sldns_wirerr_get_rdatawl(uint8_t* rr, size_t len, size_t dname_len)
834 {
835 	if(len < dname_len+10)
836 		return NULL;
837 	return rr+dname_len+8;
838 }
839 
840 const char* sldns_get_errorstr_parse(int e)
841 {
842 	sldns_lookup_table *lt;
843 	lt = sldns_lookup_by_id(sldns_wireparse_errors, LDNS_WIREPARSE_ERROR(e));
844 	return lt?lt->name:"unknown error";
845 }
846 
847 /* Strip whitespace from the start and the end of <line>.  */
848 char *
849 sldns_strip_ws(char *line)
850 {
851         char *s = line, *e;
852 
853         for (s = line; *s && isspace((unsigned char)*s); s++)
854                 ;
855         for (e = strchr(s, 0); e > s+2 && isspace((unsigned char)e[-1]) && e[-2] != '\\'; e--)
856                 ;
857         *e = 0;
858         return s;
859 }
860 
861 int sldns_fp2wire_rr_buf(FILE* in, uint8_t* rr, size_t* len, size_t* dname_len,
862 	struct sldns_file_parse_state* parse_state)
863 {
864 	char line[LDNS_RR_BUF_SIZE+1];
865 	ssize_t size;
866 
867 	/* read an entire line in from the file */
868 	if((size = sldns_fget_token_l(in, line, LDNS_PARSE_SKIP_SPACE,
869 		LDNS_RR_BUF_SIZE, parse_state?&parse_state->lineno:NULL))
870 		== -1) {
871 		/* if last line was empty, we are now at feof, which is not
872 		 * always a parse error (happens when for instance last line
873 		 * was a comment)
874 		 */
875 		return LDNS_WIREPARSE_ERR_SYNTAX;
876 	}
877 
878 	/* we can have the situation, where we've read ok, but still got
879 	 * no bytes to play with, in this case size is 0 */
880 	if(size == 0) {
881 		if(*len > 0)
882 			rr[0] = 0;
883 		*len = 0;
884 		*dname_len = 0;
885 		return LDNS_WIREPARSE_ERR_OK;
886 	}
887 
888 	if(strncmp(line, "$ORIGIN", 7) == 0 && isspace((unsigned char)line[7])) {
889 		int s;
890 		strlcpy((char*)rr, line, *len);
891 		*len = 0;
892 		*dname_len = 0;
893 		if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
894 		parse_state->origin_len = sizeof(parse_state->origin);
895 		s = sldns_str2wire_dname_buf(sldns_strip_ws(line+8),
896 			parse_state->origin, &parse_state->origin_len);
897 		if(s) parse_state->origin_len = 0;
898 		return s;
899 	} else if(strncmp(line, "$TTL", 4) == 0 && isspace((unsigned char)line[4])) {
900 		const char* end = NULL;
901 		strlcpy((char*)rr, line, *len);
902 		*len = 0;
903 		*dname_len = 0;
904 		if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
905 		parse_state->default_ttl = sldns_str2period(
906 			sldns_strip_ws(line+5), &end);
907 	} else if (strncmp(line, "$INCLUDE", 8) == 0) {
908 		strlcpy((char*)rr, line, *len);
909 		*len = 0;
910 		*dname_len = 0;
911 		return LDNS_WIREPARSE_ERR_INCLUDE;
912 	} else if (strncmp(line, "$", 1) == 0) {
913 		strlcpy((char*)rr, line, *len);
914 		*len = 0;
915 		*dname_len = 0;
916 		return LDNS_WIREPARSE_ERR_INCLUDE;
917 	} else {
918 		int r = sldns_str2wire_rr_buf(line, rr, len, dname_len,
919 			parse_state?parse_state->default_ttl:0,
920 			(parse_state&&parse_state->origin_len)?
921 				parse_state->origin:NULL,
922 			parse_state?parse_state->origin_len:0,
923 			(parse_state&&parse_state->prev_rr_len)?
924 				parse_state->prev_rr:NULL,
925 			parse_state?parse_state->prev_rr_len:0);
926 		if(r == LDNS_WIREPARSE_ERR_OK && (*dname_len) != 0 &&
927 			parse_state &&
928 			(*dname_len) <= sizeof(parse_state->prev_rr)) {
929 			memmove(parse_state->prev_rr, rr, *dname_len);
930 			parse_state->prev_rr_len = (*dname_len);
931 		}
932 		return r;
933 	}
934 	return LDNS_WIREPARSE_ERR_OK;
935 }
936 
937 int sldns_str2wire_rdf_buf(const char* str, uint8_t* rd, size_t* len,
938 	sldns_rdf_type rdftype)
939 {
940 	switch (rdftype) {
941 	case LDNS_RDF_TYPE_DNAME:
942 		return sldns_str2wire_dname_buf(str, rd, len);
943 	case LDNS_RDF_TYPE_INT8:
944 		return sldns_str2wire_int8_buf(str, rd, len);
945 	case LDNS_RDF_TYPE_INT16:
946 		return sldns_str2wire_int16_buf(str, rd, len);
947 	case LDNS_RDF_TYPE_INT32:
948 		return sldns_str2wire_int32_buf(str, rd, len);
949 	case LDNS_RDF_TYPE_A:
950 		return sldns_str2wire_a_buf(str, rd, len);
951 	case LDNS_RDF_TYPE_AAAA:
952 		return sldns_str2wire_aaaa_buf(str, rd, len);
953 	case LDNS_RDF_TYPE_STR:
954 		return sldns_str2wire_str_buf(str, rd, len);
955 	case LDNS_RDF_TYPE_APL:
956 		return sldns_str2wire_apl_buf(str, rd, len);
957 	case LDNS_RDF_TYPE_B64:
958 		return sldns_str2wire_b64_buf(str, rd, len);
959 	case LDNS_RDF_TYPE_B32_EXT:
960 		return sldns_str2wire_b32_ext_buf(str, rd, len);
961 	case LDNS_RDF_TYPE_HEX:
962 		return sldns_str2wire_hex_buf(str, rd, len);
963 	case LDNS_RDF_TYPE_NSEC:
964 		return sldns_str2wire_nsec_buf(str, rd, len);
965 	case LDNS_RDF_TYPE_TYPE:
966 		return sldns_str2wire_type_buf(str, rd, len);
967 	case LDNS_RDF_TYPE_CLASS:
968 		return sldns_str2wire_class_buf(str, rd, len);
969 	case LDNS_RDF_TYPE_CERT_ALG:
970 		return sldns_str2wire_cert_alg_buf(str, rd, len);
971 	case LDNS_RDF_TYPE_ALG:
972 		return sldns_str2wire_alg_buf(str, rd, len);
973 	case LDNS_RDF_TYPE_TIME:
974 		return sldns_str2wire_time_buf(str, rd, len);
975 	case LDNS_RDF_TYPE_PERIOD:
976 		return sldns_str2wire_period_buf(str, rd, len);
977 	case LDNS_RDF_TYPE_TSIGTIME:
978 		return sldns_str2wire_tsigtime_buf(str, rd, len);
979 	case LDNS_RDF_TYPE_LOC:
980 		return sldns_str2wire_loc_buf(str, rd, len);
981 	case LDNS_RDF_TYPE_WKS:
982 		return sldns_str2wire_wks_buf(str, rd, len);
983 	case LDNS_RDF_TYPE_NSAP:
984 		return sldns_str2wire_nsap_buf(str, rd, len);
985 	case LDNS_RDF_TYPE_ATMA:
986 		return sldns_str2wire_atma_buf(str, rd, len);
987 	case LDNS_RDF_TYPE_IPSECKEY:
988 		return sldns_str2wire_ipseckey_buf(str, rd, len);
989 	case LDNS_RDF_TYPE_NSEC3_SALT:
990 		return sldns_str2wire_nsec3_salt_buf(str, rd, len);
991 	case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
992 		return sldns_str2wire_b32_ext_buf(str, rd, len);
993 	case LDNS_RDF_TYPE_ILNP64:
994 		return sldns_str2wire_ilnp64_buf(str, rd, len);
995 	case LDNS_RDF_TYPE_EUI48:
996 		return sldns_str2wire_eui48_buf(str, rd, len);
997 	case LDNS_RDF_TYPE_EUI64:
998 		return sldns_str2wire_eui64_buf(str, rd, len);
999 	case LDNS_RDF_TYPE_TAG:
1000 		return sldns_str2wire_tag_buf(str, rd, len);
1001 	case LDNS_RDF_TYPE_LONG_STR:
1002 		return sldns_str2wire_long_str_buf(str, rd, len);
1003 	case LDNS_RDF_TYPE_TSIGERROR:
1004 		return sldns_str2wire_tsigerror_buf(str, rd, len);
1005 	case LDNS_RDF_TYPE_HIP:
1006 		return sldns_str2wire_hip_buf(str, rd, len);
1007 	case LDNS_RDF_TYPE_INT16_DATA:
1008 		return sldns_str2wire_int16_data_buf(str, rd, len);
1009 	case LDNS_RDF_TYPE_UNKNOWN:
1010 	case LDNS_RDF_TYPE_SERVICE:
1011 		return LDNS_WIREPARSE_ERR_NOT_IMPL;
1012 	case LDNS_RDF_TYPE_NONE:
1013 	default:
1014 		break;
1015 	}
1016 	return LDNS_WIREPARSE_ERR_GENERAL;
1017 }
1018 
1019 int sldns_str2wire_int8_buf(const char* str, uint8_t* rd, size_t* len)
1020 {
1021 	char* end;
1022 	uint8_t r = (uint8_t)strtol((char*)str, &end, 10);
1023 	if(*end != 0)
1024 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1025 	if(*len < 1)
1026 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1027 	rd[0] = r;
1028 	*len = 1;
1029 	return LDNS_WIREPARSE_ERR_OK;
1030 }
1031 
1032 int sldns_str2wire_int16_buf(const char* str, uint8_t* rd, size_t* len)
1033 {
1034 	char* end;
1035 	uint16_t r = (uint16_t)strtol((char*)str, &end, 10);
1036 	if(*end != 0)
1037 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1038 	if(*len < 2)
1039 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1040 	sldns_write_uint16(rd, r);
1041 	*len = 2;
1042 	return LDNS_WIREPARSE_ERR_OK;
1043 }
1044 
1045 int sldns_str2wire_int32_buf(const char* str, uint8_t* rd, size_t* len)
1046 {
1047 	char* end;
1048 	uint32_t r;
1049 	errno = 0; /* must set to zero before call,
1050 			note race condition on errno */
1051 	if(*str == '-')
1052 		r = (uint32_t)strtol((char*)str, &end, 10);
1053 	else	r = (uint32_t)strtoul((char*)str, &end, 10);
1054 	if(*end != 0)
1055 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1056 	if(errno == ERANGE)
1057 		return LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW;
1058 	if(*len < 4)
1059 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1060 	sldns_write_uint32(rd, r);
1061 	*len = 4;
1062 	return LDNS_WIREPARSE_ERR_OK;
1063 }
1064 
1065 int sldns_str2wire_a_buf(const char* str, uint8_t* rd, size_t* len)
1066 {
1067 	struct in_addr address;
1068 	if(inet_pton(AF_INET, (char*)str, &address) != 1)
1069 		return LDNS_WIREPARSE_ERR_SYNTAX_IP4;
1070 	if(*len < sizeof(address))
1071 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1072 	memmove(rd, &address, sizeof(address));
1073 	*len = sizeof(address);
1074 	return LDNS_WIREPARSE_ERR_OK;
1075 }
1076 
1077 int sldns_str2wire_aaaa_buf(const char* str, uint8_t* rd, size_t* len)
1078 {
1079 #ifdef AF_INET6
1080 	uint8_t address[LDNS_IP6ADDRLEN + 1];
1081 	if(inet_pton(AF_INET6, (char*)str, address) != 1)
1082 		return LDNS_WIREPARSE_ERR_SYNTAX_IP6;
1083 	if(*len < LDNS_IP6ADDRLEN)
1084 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1085 	memmove(rd, address, LDNS_IP6ADDRLEN);
1086 	*len = LDNS_IP6ADDRLEN;
1087 	return LDNS_WIREPARSE_ERR_OK;
1088 #else
1089 	return LDNS_WIREPARSE_ERR_NOT_IMPL;
1090 #endif
1091 }
1092 
1093 int sldns_str2wire_str_buf(const char* str, uint8_t* rd, size_t* len)
1094 {
1095 	uint8_t ch = 0;
1096 	size_t sl = 0;
1097 	const char* s = str;
1098 	/* skip length byte */
1099 	if(*len < 1)
1100 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1101 
1102 	/* read characters */
1103 	while(sldns_parse_char(&ch, &s)) {
1104 		if(sl >= 255)
1105 			return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR, s-str);
1106 		if(*len < sl+2)
1107 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1108 				s-str);
1109 		rd[++sl] = ch;
1110 	}
1111 	if(!s)
1112 		return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
1113 	rd[0] = (uint8_t)sl;
1114 	*len = sl+1;
1115 	return LDNS_WIREPARSE_ERR_OK;
1116 }
1117 
1118 int sldns_str2wire_apl_buf(const char* str, uint8_t* rd, size_t* len)
1119 {
1120 	const char *my_str = str;
1121 
1122 	char my_ip_str[64];
1123 	size_t ip_str_len;
1124 
1125 	uint16_t family;
1126 	int negation;
1127 	size_t adflength = 0;
1128 	uint8_t data[16+4];
1129 	uint8_t prefix;
1130 	size_t i;
1131 
1132 	if(*my_str == '\0') {
1133 		/* empty APL element, no data, no string */
1134 		*len = 0;
1135 		return LDNS_WIREPARSE_ERR_OK;
1136 	}
1137 
1138 	/* [!]afi:address/prefix */
1139 	if (strlen(my_str) < 2
1140 			|| strchr(my_str, ':') == NULL
1141 			|| strchr(my_str, '/') == NULL
1142 			|| strchr(my_str, ':') > strchr(my_str, '/')) {
1143 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1144 	}
1145 
1146 	if (my_str[0] == '!') {
1147 		negation = 1;
1148 		my_str += 1;
1149 	} else {
1150 		negation = 0;
1151 	}
1152 
1153 	family = (uint16_t) atoi(my_str);
1154 
1155 	my_str = strchr(my_str, ':') + 1;
1156 
1157 	/* need ip addr and only ip addr for inet_pton */
1158 	ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
1159 	if(ip_str_len+1 > sizeof(my_ip_str))
1160 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1161 	(void)strlcpy(my_ip_str, my_str, sizeof(my_ip_str));
1162 	my_ip_str[ip_str_len] = 0;
1163 
1164 	if (family == 1) {
1165 		/* ipv4 */
1166 		if(inet_pton(AF_INET, my_ip_str, data+4) == 0)
1167 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1168 		for (i = 0; i < 4; i++) {
1169 			if (data[i+4] != 0) {
1170 				adflength = i + 1;
1171 			}
1172 		}
1173 	} else if (family == 2) {
1174 		/* ipv6 */
1175 		if (inet_pton(AF_INET6, my_ip_str, data+4) == 0)
1176 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1177 		for (i = 0; i < 16; i++) {
1178 			if (data[i+4] != 0) {
1179 				adflength = i + 1;
1180 			}
1181 		}
1182 	} else {
1183 		/* unknown family */
1184 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1185 	}
1186 
1187 	my_str = strchr(my_str, '/') + 1;
1188 	prefix = (uint8_t) atoi(my_str);
1189 
1190 	sldns_write_uint16(data, family);
1191 	data[2] = prefix;
1192 	data[3] = (uint8_t)adflength;
1193 	if (negation) {
1194 		/* set bit 1 of byte 3 */
1195 		data[3] = data[3] | 0x80;
1196 	}
1197 
1198 	if(*len < 4+adflength)
1199 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1200 	memmove(rd, data, 4+adflength);
1201 	*len = 4+adflength;
1202 	return LDNS_WIREPARSE_ERR_OK;
1203 }
1204 
1205 int sldns_str2wire_b64_buf(const char* str, uint8_t* rd, size_t* len)
1206 {
1207 	size_t sz = sldns_b64_pton_calculate_size(strlen(str));
1208 	int n;
1209 	if(strcmp(str, "0") == 0) {
1210 		*len = 0;
1211 		return LDNS_WIREPARSE_ERR_OK;
1212 	}
1213 	if(*len < sz)
1214 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1215 	n = sldns_b64_pton(str, rd, *len);
1216 	if(n < 0)
1217 		return LDNS_WIREPARSE_ERR_SYNTAX_B64;
1218 	*len = (size_t)n;
1219 	return LDNS_WIREPARSE_ERR_OK;
1220 }
1221 
1222 int sldns_str2wire_b32_ext_buf(const char* str, uint8_t* rd, size_t* len)
1223 {
1224 	size_t slen = strlen(str);
1225 	size_t sz = sldns_b32_pton_calculate_size(slen);
1226 	int n;
1227 	if(*len < 1+sz)
1228 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1229 	rd[0] = (uint8_t)sz;
1230 	n = sldns_b32_pton_extended_hex(str, slen, rd+1, *len-1);
1231 	if(n < 0)
1232 		return LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT;
1233 	*len = (size_t)n+1;
1234 	return LDNS_WIREPARSE_ERR_OK;
1235 }
1236 
1237 /** see if the string ends, or ends in whitespace */
1238 static int
1239 sldns_is_last_of_string(const char* str)
1240 {
1241 	if(*str == 0) return 1;
1242 	while(isspace((unsigned char)*str))
1243 		str++;
1244 	if(*str == 0) return 1;
1245 	return 0;
1246 }
1247 
1248 int sldns_str2wire_hex_buf(const char* str, uint8_t* rd, size_t* len)
1249 {
1250 	const char* s = str;
1251 	size_t dlen = 0; /* number of hexdigits parsed */
1252 	while(*s) {
1253 		if(isspace((unsigned char)*s)) {
1254 			s++;
1255 			continue;
1256 		}
1257 		if(dlen == 0 && *s == '0' && sldns_is_last_of_string(s+1)) {
1258 			*len = 0;
1259 			return LDNS_WIREPARSE_ERR_OK;
1260 		}
1261 		if(!isxdigit((unsigned char)*s))
1262 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1263 		if(*len < dlen/2 + 1)
1264 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1265 				s-str);
1266 		if((dlen&1)==0)
1267 			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1268 		else	rd[dlen/2] += (uint8_t)sldns_hexdigit_to_int(*s++);
1269 		dlen++;
1270 	}
1271 	if((dlen&1)!=0)
1272 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1273 	*len = dlen/2;
1274 	return LDNS_WIREPARSE_ERR_OK;
1275 }
1276 
1277 int sldns_str2wire_nsec_buf(const char* str, uint8_t* rd, size_t* len)
1278 {
1279 	const char *delim = "\n\t ";
1280 	char token[64]; /* for a type name */
1281 	size_t type_count = 0;
1282 	int block;
1283 	size_t used = 0;
1284 	uint16_t maxtype = 0;
1285 	uint8_t typebits[8192]; /* 65536 bits */
1286 	uint8_t window_in_use[256];
1287 
1288 	/* string in buffer */
1289 	sldns_buffer strbuf;
1290 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1291 
1292 	/* parse the types */
1293 	memset(typebits, 0, sizeof(typebits));
1294 	memset(window_in_use, 0, sizeof(window_in_use));
1295 	while(sldns_buffer_remaining(&strbuf) > 0 &&
1296 		sldns_bget_token(&strbuf, token, delim, sizeof(token)) != -1) {
1297 		uint16_t t = sldns_get_rr_type_by_name(token);
1298 		if(token[0] == 0)
1299 			continue;
1300 		if(t == 0 && strcmp(token, "TYPE0") != 0)
1301 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
1302 				sldns_buffer_position(&strbuf));
1303 		typebits[t/8] |= (0x80>>(t%8));
1304 		window_in_use[t/256] = 1;
1305 		type_count++;
1306 		if(t > maxtype) maxtype = t;
1307 	}
1308 
1309 	/* empty NSEC bitmap */
1310 	if(type_count == 0) {
1311 		*len = 0;
1312 		return LDNS_WIREPARSE_ERR_OK;
1313 	}
1314 
1315 	/* encode windows {u8 windowblock, u8 bitmaplength, 0-32u8 bitmap},
1316 	 * block is 0-255 upper octet of types, length if 0-32. */
1317 	for(block = 0; block <= (int)maxtype/256; block++) {
1318 		int i, blocklen = 0;
1319 		if(!window_in_use[block])
1320 			continue;
1321 		for(i=0; i<32; i++) {
1322 			if(typebits[block*32+i] != 0)
1323 				blocklen = i+1;
1324 		}
1325 		if(blocklen == 0)
1326 			continue; /* empty window should have been !in_use */
1327 		if(used+blocklen+2 > *len)
1328 			return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1329 		rd[used+0] = (uint8_t)block;
1330 		rd[used+1] = (uint8_t)blocklen;
1331 		for(i=0; i<blocklen; i++) {
1332 			rd[used+2+i] = typebits[block*32+i];
1333 		}
1334 		used += blocklen+2;
1335 	}
1336 	*len = used;
1337 	return LDNS_WIREPARSE_ERR_OK;
1338 }
1339 
1340 int sldns_str2wire_type_buf(const char* str, uint8_t* rd, size_t* len)
1341 {
1342 	uint16_t t = sldns_get_rr_type_by_name(str);
1343 	if(t == 0 && strcmp(str, "TYPE0") != 0)
1344 		return LDNS_WIREPARSE_ERR_SYNTAX_TYPE;
1345 	if(*len < 2)
1346 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1347 	sldns_write_uint16(rd, t);
1348 	*len = 2;
1349 	return LDNS_WIREPARSE_ERR_OK;
1350 }
1351 
1352 int sldns_str2wire_class_buf(const char* str, uint8_t* rd, size_t* len)
1353 {
1354 	uint16_t c = sldns_get_rr_class_by_name(str);
1355 	if(c == 0 && strcmp(str, "CLASS0") != 0)
1356 		return LDNS_WIREPARSE_ERR_SYNTAX_CLASS;
1357 	if(*len < 2)
1358 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1359 	sldns_write_uint16(rd, c);
1360 	*len = 2;
1361 	return LDNS_WIREPARSE_ERR_OK;
1362 }
1363 
1364 /* An certificate alg field can either be specified as a 8 bits number
1365  * or by its symbolic name. Handle both */
1366 int sldns_str2wire_cert_alg_buf(const char* str, uint8_t* rd, size_t* len)
1367 {
1368 	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_cert_algorithms,
1369 		str);
1370 	if(*len < 2)
1371 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1372 	if(lt) {
1373 		sldns_write_uint16(rd, (uint16_t)lt->id);
1374 	} else {
1375 		int s = sldns_str2wire_int16_buf(str, rd, len);
1376 		if(s) return s;
1377 		if(sldns_read_uint16(rd) == 0)
1378 			return LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM;
1379 	}
1380 	*len = 2;
1381 	return LDNS_WIREPARSE_ERR_OK;
1382 }
1383 
1384 /* An alg field can either be specified as a 8 bits number
1385  * or by its symbolic name. Handle both */
1386 int sldns_str2wire_alg_buf(const char* str, uint8_t* rd, size_t* len)
1387 {
1388 	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_algorithms, str);
1389 	if(*len < 1)
1390 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1391 	if(lt) {
1392 		rd[0] = (uint8_t)lt->id;
1393 		*len = 1;
1394 	} else {
1395 		/* try as-is (a number) */
1396 		return sldns_str2wire_int8_buf(str, rd, len);
1397 	}
1398 	return LDNS_WIREPARSE_ERR_OK;
1399 }
1400 
1401 int sldns_str2wire_tsigerror_buf(const char* str, uint8_t* rd, size_t* len)
1402 {
1403 	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_tsig_errors, str);
1404 	if(*len < 2)
1405 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1406 	if(lt) {
1407 		sldns_write_uint16(rd, (uint16_t)lt->id);
1408 		*len = 2;
1409 	} else {
1410 		/* try as-is (a number) */
1411 		return sldns_str2wire_int16_buf(str, rd, len);
1412 	}
1413 	return LDNS_WIREPARSE_ERR_OK;
1414 }
1415 
1416 int sldns_str2wire_time_buf(const char* str, uint8_t* rd, size_t* len)
1417 {
1418 	/* convert a time YYYYDDMMHHMMSS to wireformat */
1419 	struct tm tm;
1420 	if(*len < 4)
1421 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1422 
1423 	/* Try to scan the time... */
1424 	memset(&tm, 0, sizeof(tm));
1425 	if (strlen(str) == 14 && sscanf(str, "%4d%2d%2d%2d%2d%2d",
1426 		&tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour,
1427 		&tm.tm_min, &tm.tm_sec) == 6) {
1428 	   	tm.tm_year -= 1900;
1429 	   	tm.tm_mon--;
1430 	   	/* Check values */
1431 		if (tm.tm_year < 70)
1432 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1433 		if (tm.tm_mon < 0 || tm.tm_mon > 11)
1434 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1435 		if (tm.tm_mday < 1 || tm.tm_mday > 31)
1436 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1437 		if (tm.tm_hour < 0 || tm.tm_hour > 23)
1438 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1439 		if (tm.tm_min < 0 || tm.tm_min > 59)
1440 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1441 		if (tm.tm_sec < 0 || tm.tm_sec > 59)
1442 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1443 
1444 		sldns_write_uint32(rd, (uint32_t)sldns_mktime_from_utc(&tm));
1445 	} else {
1446 		/* handle it as 32 bits timestamp */
1447 		char *end;
1448 		uint32_t l = (uint32_t)strtol((char*)str, &end, 10);
1449 		if(*end != 0)
1450 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME,
1451 				end-(char*)str);
1452 		sldns_write_uint32(rd, l);
1453 	}
1454 	*len = 4;
1455 	return LDNS_WIREPARSE_ERR_OK;
1456 }
1457 
1458 int sldns_str2wire_tsigtime_buf(const char* str, uint8_t* rd, size_t* len)
1459 {
1460 	char* end;
1461 	uint64_t t = (uint64_t)strtol((char*)str, &end, 10);
1462 	uint16_t high;
1463 	uint32_t low;
1464 	if(*end != 0)
1465 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME, end-str);
1466 	if(*len < 6)
1467 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1468 	high = (uint16_t)(t>>32);
1469 	low = (uint32_t)(t);
1470 	sldns_write_uint16(rd, high);
1471 	sldns_write_uint32(rd+2, low);
1472 	*len = 6;
1473 	return LDNS_WIREPARSE_ERR_OK;
1474 }
1475 
1476 int sldns_str2wire_period_buf(const char* str, uint8_t* rd, size_t* len)
1477 {
1478 	const char* end;
1479 	uint32_t p = sldns_str2period(str, &end);
1480 	if(*end != 0)
1481 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, end-str);
1482 	if(*len < 4)
1483 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1484 	sldns_write_uint32(rd, p);
1485 	*len = 4;
1486 	return LDNS_WIREPARSE_ERR_OK;
1487 }
1488 
1489 /** read "<digits>[.<digits>][mM]" into mantissa exponent format for LOC type */
1490 static int
1491 loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
1492 {
1493 	uint32_t meters = 0, cm = 0, val;
1494 	while (isblank((unsigned char)*my_str)) {
1495 		my_str++;
1496 	}
1497 	meters = (uint32_t)strtol(my_str, &my_str, 10);
1498 	if (*my_str == '.') {
1499 		my_str++;
1500 		cm = (uint32_t)strtol(my_str, &my_str, 10);
1501 	}
1502 	if (meters >= 1) {
1503 		*e = 2;
1504 		val = meters;
1505 	} else	{
1506 		*e = 0;
1507 		val = cm;
1508 	}
1509 	while(val >= 10) {
1510 		(*e)++;
1511 		val /= 10;
1512 	}
1513 	*m = (uint8_t)val;
1514 
1515 	if (*e > 9)
1516 		return 0;
1517 	if (*my_str == 'm' || *my_str == 'M') {
1518 		my_str++;
1519 	}
1520 	*endstr = my_str;
1521 	return 1;
1522 }
1523 
1524 int sldns_str2wire_loc_buf(const char* str, uint8_t* rd, size_t* len)
1525 {
1526 	uint32_t latitude = 0;
1527 	uint32_t longitude = 0;
1528 	uint32_t altitude = 0;
1529 
1530 	uint32_t equator = (uint32_t)1<<31; /* 2**31 */
1531 
1532 	/* only support version 0 */
1533 	uint32_t h = 0;
1534 	uint32_t m = 0;
1535 	uint8_t size_b = 1, size_e = 2;
1536 	uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
1537 	uint8_t vert_pre_b = 1, vert_pre_e = 3;
1538 
1539 	double s = 0.0;
1540 	int northerness;
1541 	int easterness;
1542 
1543 	char *my_str = (char *) str;
1544 
1545 	if (isdigit((unsigned char) *my_str)) {
1546 		h = (uint32_t) strtol(my_str, &my_str, 10);
1547 	} else {
1548 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1549 	}
1550 
1551 	while (isblank((unsigned char) *my_str)) {
1552 		my_str++;
1553 	}
1554 
1555 	if (isdigit((unsigned char) *my_str)) {
1556 		m = (uint32_t) strtol(my_str, &my_str, 10);
1557 	} else if (*my_str == 'N' || *my_str == 'S') {
1558 		goto north;
1559 	} else {
1560 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1561 	}
1562 
1563 	while (isblank((unsigned char) *my_str)) {
1564 		my_str++;
1565 	}
1566 
1567 	if (isdigit((unsigned char) *my_str)) {
1568 		s = strtod(my_str, &my_str);
1569 	}
1570 
1571 	/* skip blanks before northerness */
1572 	while (isblank((unsigned char) *my_str)) {
1573 		my_str++;
1574 	}
1575 
1576 north:
1577 	if (*my_str == 'N') {
1578 		northerness = 1;
1579 	} else if (*my_str == 'S') {
1580 		northerness = 0;
1581 	} else {
1582 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1583 	}
1584 
1585 	my_str++;
1586 
1587 	/* store number */
1588 	s = 1000.0 * s;
1589 	/* add a little to make floor in conversion a round */
1590 	s += 0.0005;
1591 	latitude = (uint32_t) s;
1592 	latitude += 1000 * 60 * m;
1593 	latitude += 1000 * 60 * 60 * h;
1594 	if (northerness) {
1595 		latitude = equator + latitude;
1596 	} else {
1597 		latitude = equator - latitude;
1598 	}
1599 	while (isblank((unsigned char)*my_str)) {
1600 		my_str++;
1601 	}
1602 
1603 	if (isdigit((unsigned char) *my_str)) {
1604 		h = (uint32_t) strtol(my_str, &my_str, 10);
1605 	} else {
1606 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1607 	}
1608 
1609 	while (isblank((unsigned char) *my_str)) {
1610 		my_str++;
1611 	}
1612 
1613 	if (isdigit((unsigned char) *my_str)) {
1614 		m = (uint32_t) strtol(my_str, &my_str, 10);
1615 	} else if (*my_str == 'E' || *my_str == 'W') {
1616 		goto east;
1617 	} else {
1618 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1619 	}
1620 
1621 	while (isblank((unsigned char)*my_str)) {
1622 		my_str++;
1623 	}
1624 
1625 	if (isdigit((unsigned char) *my_str)) {
1626 		s = strtod(my_str, &my_str);
1627 	}
1628 
1629 	/* skip blanks before easterness */
1630 	while (isblank((unsigned char)*my_str)) {
1631 		my_str++;
1632 	}
1633 
1634 east:
1635 	if (*my_str == 'E') {
1636 		easterness = 1;
1637 	} else if (*my_str == 'W') {
1638 		easterness = 0;
1639 	} else {
1640 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1641 	}
1642 
1643 	my_str++;
1644 
1645 	/* store number */
1646 	s *= 1000.0;
1647 	/* add a little to make floor in conversion a round */
1648 	s += 0.0005;
1649 	longitude = (uint32_t) s;
1650 	longitude += 1000 * 60 * m;
1651 	longitude += 1000 * 60 * 60 * h;
1652 
1653 	if (easterness) {
1654 		longitude += equator;
1655 	} else {
1656 		longitude = equator - longitude;
1657 	}
1658 
1659 	altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
1660 		10000000.0 + 0.5);
1661 	if (*my_str == 'm' || *my_str == 'M') {
1662 		my_str++;
1663 	}
1664 
1665 	if (strlen(my_str) > 0) {
1666 		if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1667 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1668 	}
1669 
1670 	if (strlen(my_str) > 0) {
1671 		if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1672 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1673 	}
1674 
1675 	if (strlen(my_str) > 0) {
1676 		if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1677 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1678 	}
1679 
1680 	if(*len < 16)
1681 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1682 	rd[0] = 0;
1683 	rd[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1684 	rd[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1685 	rd[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1686 	sldns_write_uint32(rd + 4, latitude);
1687 	sldns_write_uint32(rd + 8, longitude);
1688 	sldns_write_uint32(rd + 12, altitude);
1689 	*len = 16;
1690 	return LDNS_WIREPARSE_ERR_OK;
1691 }
1692 
1693 static void
1694 ldns_tolower_str(char* s)
1695 {
1696 	if(s) {
1697 		while(*s) {
1698 			*s = (char)tolower((unsigned char)*s);
1699 			s++;
1700 		}
1701 	}
1702 }
1703 
1704 int sldns_str2wire_wks_buf(const char* str, uint8_t* rd, size_t* len)
1705 {
1706 	int rd_len = 1;
1707 	int have_proto = 0;
1708 	char token[50], proto_str[50];
1709 	sldns_buffer strbuf;
1710 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1711 	proto_str[0]=0;
1712 
1713 	/* check we have one byte for proto */
1714 	if(*len < 1)
1715 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1716 
1717 	while(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) > 0) {
1718 		ldns_tolower_str(token);
1719 		if(!have_proto) {
1720 			struct protoent *p = getprotobyname(token);
1721 			have_proto = 1;
1722 			if(p) rd[0] = (uint8_t)p->p_proto;
1723 			else if(strcasecmp(token, "tcp")==0) rd[0]=6;
1724 			else if(strcasecmp(token, "udp")==0) rd[0]=17;
1725 			else rd[0] = (uint8_t)atoi(token);
1726 			(void)strlcpy(proto_str, token, sizeof(proto_str));
1727 		} else {
1728 			int serv_port;
1729 			struct servent *serv = getservbyname(token, proto_str);
1730 			if(serv) serv_port=(int)ntohs((uint16_t)serv->s_port);
1731 			else if(strcasecmp(token, "domain")==0) serv_port=53;
1732 			else {
1733 				serv_port = atoi(token);
1734 				if(serv_port == 0 && strcmp(token, "0") != 0) {
1735 #ifdef HAVE_ENDSERVENT
1736 					endservent();
1737 #endif
1738 #ifdef HAVE_ENDPROTOENT
1739 					endprotoent();
1740 #endif
1741 					return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1742 						sldns_buffer_position(&strbuf));
1743 				}
1744 				if(serv_port < 0 || serv_port > 65535) {
1745 #ifdef HAVE_ENDSERVENT
1746 					endservent();
1747 #endif
1748 #ifdef HAVE_ENDPROTOENT
1749 					endprotoent();
1750 #endif
1751 					return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1752 						sldns_buffer_position(&strbuf));
1753 				}
1754 			}
1755 			if(rd_len < 1+serv_port/8+1) {
1756 				/* bitmap is larger, init new bytes at 0 */
1757 				if(*len < 1+(size_t)serv_port/8+1) {
1758 #ifdef HAVE_ENDSERVENT
1759 					endservent();
1760 #endif
1761 #ifdef HAVE_ENDPROTOENT
1762 					endprotoent();
1763 #endif
1764 					return RET_ERR(
1765 					LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1766 					sldns_buffer_position(&strbuf));
1767 				}
1768 				memset(rd+rd_len, 0, 1+(size_t)serv_port/8+1-rd_len);
1769 				rd_len = 1+serv_port/8+1;
1770 			}
1771 			rd[1+ serv_port/8] |= (1 << (7 - serv_port % 8));
1772 		}
1773 	}
1774 	*len = (size_t)rd_len;
1775 
1776 #ifdef HAVE_ENDSERVENT
1777 	endservent();
1778 #endif
1779 #ifdef HAVE_ENDPROTOENT
1780 	endprotoent();
1781 #endif
1782 	return LDNS_WIREPARSE_ERR_OK;
1783 }
1784 
1785 int sldns_str2wire_nsap_buf(const char* str, uint8_t* rd, size_t* len)
1786 {
1787 	const char* s = str;
1788 	size_t slen;
1789 	size_t dlen = 0; /* number of hexdigits parsed */
1790 
1791 	/* just a hex string with optional dots? */
1792 	if (s[0] != '0' || s[1] != 'x')
1793 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1794 	s += 2;
1795 	slen = strlen(s);
1796 	if(slen > LDNS_MAX_RDFLEN*2)
1797 		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1798 	while(*s) {
1799 		if(isspace((unsigned char)*s) || *s == '.') {
1800 			s++;
1801 			continue;
1802 		}
1803 		if(!isxdigit((unsigned char)*s))
1804 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1805 		if(*len < dlen/2 + 1)
1806 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1807 				s-str);
1808 		if((dlen&1)==0)
1809 			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1810 		else	rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1811 		dlen++;
1812 	}
1813 	if((dlen&1)!=0)
1814 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1815 	*len = dlen/2;
1816 	return LDNS_WIREPARSE_ERR_OK;
1817 }
1818 
1819 int sldns_str2wire_atma_buf(const char* str, uint8_t* rd, size_t* len)
1820 {
1821 	const char* s = str;
1822 	size_t slen = strlen(str);
1823 	size_t dlen = 0; /* number of hexdigits parsed */
1824 
1825 	/* just a hex string with optional dots? */
1826 	/* notimpl e.164 format */
1827 	if(slen > LDNS_MAX_RDFLEN*2)
1828 		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1829 	while(*s) {
1830 		if(isspace((unsigned char)*s) || *s == '.') {
1831 			s++;
1832 			continue;
1833 		}
1834 		if(!isxdigit((unsigned char)*s))
1835 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1836 		if(*len < dlen/2 + 1)
1837 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1838 				s-str);
1839 		if((dlen&1)==0)
1840 			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1841 		else	rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1842 		dlen++;
1843 	}
1844 	if((dlen&1)!=0)
1845 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1846 	*len = dlen/2;
1847 	return LDNS_WIREPARSE_ERR_OK;
1848 }
1849 
1850 int sldns_str2wire_ipseckey_buf(const char* str, uint8_t* rd, size_t* len)
1851 {
1852 	size_t gwlen = 0, keylen = 0;
1853 	int s;
1854 	uint8_t gwtype;
1855 	char token[512];
1856 	sldns_buffer strbuf;
1857 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1858 
1859 	if(*len < 3)
1860 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1861 	/* precedence */
1862 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1863 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1864 			sldns_buffer_position(&strbuf));
1865 	rd[0] = (uint8_t)atoi(token);
1866 	/* gateway_type */
1867 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1868 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1869 			sldns_buffer_position(&strbuf));
1870 	rd[1] = (uint8_t)atoi(token);
1871 	gwtype = rd[1];
1872 	/* algorithm */
1873 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1874 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1875 			sldns_buffer_position(&strbuf));
1876 	rd[2] = (uint8_t)atoi(token);
1877 
1878 	/* gateway */
1879 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1880 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1881 			sldns_buffer_position(&strbuf));
1882 	if(gwtype == 0) {
1883 		/* NOGATEWAY */
1884 		if(strcmp(token, ".") != 0)
1885 			return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1886 				sldns_buffer_position(&strbuf));
1887 		gwlen = 0;
1888 	} else if(gwtype == 1) {
1889 		/* IP4 */
1890 		gwlen = *len - 3;
1891 		s = sldns_str2wire_a_buf(token, rd+3, &gwlen);
1892 		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1893 	} else if(gwtype == 2) {
1894 		/* IP6 */
1895 		gwlen = *len - 3;
1896 		s = sldns_str2wire_aaaa_buf(token, rd+3, &gwlen);
1897 		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1898 	} else if(gwtype == 3) {
1899 		/* DNAME */
1900 		gwlen = *len - 3;
1901 		s = sldns_str2wire_dname_buf(token, rd+3, &gwlen);
1902 		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1903 	} else {
1904 		/* unknown gateway type */
1905 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1906 			sldns_buffer_position(&strbuf));
1907 	}
1908 	/* double check for size */
1909 	if(*len < 3 + gwlen)
1910 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1911 			sldns_buffer_position(&strbuf));
1912 
1913 	/* publickey in remainder of strbuf */
1914 	keylen = *len - 3 - gwlen;
1915 	s = sldns_str2wire_b64_buf((const char*)sldns_buffer_current(&strbuf),
1916 		rd+3+gwlen, &keylen);
1917 	if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1918 
1919 	*len = 3 + gwlen + keylen;
1920 	return LDNS_WIREPARSE_ERR_OK;
1921 }
1922 
1923 int sldns_str2wire_nsec3_salt_buf(const char* str, uint8_t* rd, size_t* len)
1924 {
1925 	int i, salt_length_str = (int)strlen(str);
1926 	if (salt_length_str == 1 && str[0] == '-') {
1927 		salt_length_str = 0;
1928 	} else if (salt_length_str % 2 != 0) {
1929 		return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1930 	}
1931 	if (salt_length_str > 512)
1932 		return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1933 	if(*len < 1+(size_t)salt_length_str / 2)
1934 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1935 	rd[0] = (uint8_t) (salt_length_str / 2);
1936 	for (i = 0; i < salt_length_str; i += 2) {
1937 		if (isxdigit((unsigned char)str[i]) &&
1938 			isxdigit((unsigned char)str[i+1])) {
1939 			rd[1+i/2] = (uint8_t)(sldns_hexdigit_to_int(str[i])*16
1940 				+ sldns_hexdigit_to_int(str[i+1]));
1941 		} else {
1942 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, i);
1943 		}
1944 	}
1945 	*len = 1 + (size_t)rd[0];
1946 	return LDNS_WIREPARSE_ERR_OK;
1947 }
1948 
1949 int sldns_str2wire_ilnp64_buf(const char* str, uint8_t* rd, size_t* len)
1950 {
1951 	unsigned int a, b, c, d;
1952 	uint16_t shorts[4];
1953 	int l;
1954 	if(*len < sizeof(shorts))
1955 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1956 
1957 	if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1958 			l != (int)strlen(str) || /* more data to read */
1959 			strpbrk(str, "+-")       /* signed hexes */
1960 			)
1961 		return LDNS_WIREPARSE_ERR_SYNTAX_ILNP64;
1962 	shorts[0] = htons(a);
1963 	shorts[1] = htons(b);
1964 	shorts[2] = htons(c);
1965 	shorts[3] = htons(d);
1966 	memmove(rd, &shorts, sizeof(shorts));
1967 	*len = sizeof(shorts);
1968 	return LDNS_WIREPARSE_ERR_OK;
1969 }
1970 
1971 int sldns_str2wire_eui48_buf(const char* str, uint8_t* rd, size_t* len)
1972 {
1973 	unsigned int a, b, c, d, e, f;
1974 	int l;
1975 
1976 	if(*len < 6)
1977 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1978 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1979 			&a, &b, &c, &d, &e, &f, &l) != 6 ||
1980 			l != (int)strlen(str))
1981 		return LDNS_WIREPARSE_ERR_SYNTAX_EUI48;
1982 	rd[0] = a;
1983 	rd[1] = b;
1984 	rd[2] = c;
1985 	rd[3] = d;
1986 	rd[4] = e;
1987 	rd[5] = f;
1988 	*len = 6;
1989 	return LDNS_WIREPARSE_ERR_OK;
1990 }
1991 
1992 int sldns_str2wire_eui64_buf(const char* str, uint8_t* rd, size_t* len)
1993 {
1994 	unsigned int a, b, c, d, e, f, g, h;
1995 	int l;
1996 
1997 	if(*len < 8)
1998 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1999 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
2000 			&a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
2001 			l != (int)strlen(str))
2002 		return LDNS_WIREPARSE_ERR_SYNTAX_EUI64;
2003 	rd[0] = a;
2004 	rd[1] = b;
2005 	rd[2] = c;
2006 	rd[3] = d;
2007 	rd[4] = e;
2008 	rd[5] = f;
2009 	rd[6] = g;
2010 	rd[7] = h;
2011 	*len = 8;
2012 	return LDNS_WIREPARSE_ERR_OK;
2013 }
2014 
2015 int sldns_str2wire_tag_buf(const char* str, uint8_t* rd, size_t* len)
2016 {
2017 	size_t slen = strlen(str);
2018 	const char* ptr;
2019 
2020 	if (slen > 255)
2021 		return LDNS_WIREPARSE_ERR_SYNTAX_TAG;
2022 	if(*len < slen+1)
2023 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2024 	for (ptr = str; *ptr; ptr++) {
2025 		if(!isalnum((unsigned char)*ptr))
2026 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TAG, ptr-str);
2027 	}
2028 	rd[0] = (uint8_t)slen;
2029 	memmove(rd+1, str, slen);
2030 	*len = slen+1;
2031 	return LDNS_WIREPARSE_ERR_OK;
2032 }
2033 
2034 int sldns_str2wire_long_str_buf(const char* str, uint8_t* rd, size_t* len)
2035 {
2036 	uint8_t ch = 0;
2037 	const char* pstr = str;
2038 	size_t length = 0;
2039 
2040 	/* Fill data with parsed bytes */
2041 	while (sldns_parse_char(&ch, &pstr)) {
2042 		if(*len < length+1)
2043 			return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2044 		rd[length++] = ch;
2045 	}
2046 	if(!pstr)
2047 		return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
2048 	*len = length;
2049 	return LDNS_WIREPARSE_ERR_OK;
2050 }
2051 
2052 int sldns_str2wire_hip_buf(const char* str, uint8_t* rd, size_t* len)
2053 {
2054 	char* s, *end;
2055 	int e;
2056 	size_t hitlen, pklen = 0;
2057 	/* presentation format:
2058 	 * 	pk-algo HIThex pubkeybase64
2059 	 * wireformat:
2060 	 * 	hitlen[1byte] pkalgo[1byte] pubkeylen[2byte] [hit] [pubkey] */
2061 	if(*len < 4)
2062 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2063 
2064 	/* read PK algorithm */
2065 	rd[1] = (uint8_t)strtol((char*)str, &s, 10);
2066 	if(*s != ' ')
2067 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2068 	s++;
2069 	while(*s == ' ')
2070 		s++;
2071 
2072 	/* read HIT hex tag */
2073 	/* zero terminate the tag (replace later) */
2074 	end = strchr(s, ' ');
2075 	if(!end) return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX, s-(char*)str);
2076 	*end = 0;
2077 	hitlen = *len - 4;
2078 	if((e = sldns_str2wire_hex_buf(s, rd+4, &hitlen)) != 0) {
2079 		*end = ' ';
2080 		return RET_ERR_SHIFT(e, s-(char*)str);
2081 	}
2082 	if(hitlen > 255) {
2083 		*end = ' ';
2084 		return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+255*2);
2085 	}
2086 	rd[0] = (uint8_t)hitlen;
2087 	*end = ' ';
2088 	s = end+1;
2089 
2090 	/* read pubkey base64 sequence */
2091 	pklen = *len - 4 - hitlen;
2092 	if((e = sldns_str2wire_b64_buf(s, rd+4+hitlen, &pklen)) != 0)
2093 		return RET_ERR_SHIFT(e, s-(char*)str);
2094 	if(pklen > 65535)
2095 		return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+65535);
2096 	sldns_write_uint16(rd+2, (uint16_t)pklen);
2097 
2098 	*len = 4 + hitlen + pklen;
2099 	return LDNS_WIREPARSE_ERR_OK;
2100 }
2101 
2102 int sldns_str2wire_int16_data_buf(const char* str, uint8_t* rd, size_t* len)
2103 {
2104 	char* s;
2105 	int n;
2106 	n = strtol(str, &s, 10);
2107 	if(n < 0) /* negative number not allowed */
2108 		return LDNS_WIREPARSE_ERR_SYNTAX;
2109 	if(*len < ((size_t)n)+2)
2110 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2111 	if(n > 65535)
2112 		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
2113 
2114 	if(n == 0) {
2115 		sldns_write_uint16(rd, 0);
2116 		*len = 2;
2117 		return LDNS_WIREPARSE_ERR_OK;
2118 	}
2119 	if(*s != ' ')
2120 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2121 	s++;
2122 	while(*s == ' ')
2123 		s++;
2124 
2125 	n = sldns_b64_pton(s, rd+2, (*len)-2);
2126 	if(n < 0)
2127 		return LDNS_WIREPARSE_ERR_SYNTAX_B64;
2128 	sldns_write_uint16(rd, (uint16_t)n);
2129 	*len = ((size_t)n)+2;
2130 	return LDNS_WIREPARSE_ERR_OK;
2131 }
2132