2 * str2wire.c - read txt presentation of RRs
4 * (c) NLnet Labs, 2005-2006
6 * See the file LICENSE for the license
12 * Parses text to wireformat.
15 #include "ldns/str2wire.h"
16 #include "ldns/wire2str.h"
17 #include "ldns/sbuffer.h"
18 #include "ldns/parse.h"
19 #include "ldns/parseutil.h"
28 /** return an error */
29 #define RET_ERR(e, off) ((int)((e)|((off)<<LDNS_WIREPARSE_SHIFT)))
30 /** Move parse error but keep its ID */
31 #define RET_ERR_SHIFT(e, move) RET_ERR(LDNS_WIREPARSE_ERROR(e), LDNS_WIREPARSE_OFFSET(e)+(move));
32 #define LDNS_IP6ADDRLEN (128/8)
35 * No special care is taken, all dots are translated into
37 * @param rel: true if the domain is not absolute (not terminated in .).
38 * The output is then still terminated with a '0' rootlabel.
40 static int sldns_str2wire_dname_buf_rel(const char* str
, uint8_t* buf
,
41 size_t* olen
, int* rel
)
46 uint8_t *q
, *pq
, label_len
;
49 len
= strlen((char*)str
);
50 /* octet representation can make strings a lot longer than actual length */
51 if (len
> LDNS_MAX_DOMAINLEN
* 4) {
52 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW
, 0);
55 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW
, 0);
59 if (1 == len
&& *str
== '.') {
61 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
, 0);
64 return LDNS_WIREPARSE_ERR_OK
;
67 /* get on with the rest */
69 /* s is on the current character in the string
70 * pq points to where the labellength is going to go
71 * label_len keeps track of the current label's length
72 * q builds the dname inside the buf array
76 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
, 0);
80 for (s
= str
; *s
; s
++, q
++) {
82 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
, q
-buf
);
83 if (q
> buf
+ LDNS_MAX_DOMAINLEN
)
84 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW
, q
-buf
);
87 if (label_len
> LDNS_MAX_LABELLEN
) {
88 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
, q
-buf
);
91 return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL
, q
-buf
);
100 /* octet value or literal char */
102 if (!sldns_parse_escape(q
, &s
)) {
104 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE
, q
-buf
);
115 /* add root label if last char was not '.' */
118 if (q
>= buf
+ *olen
)
119 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
, q
-buf
);
120 if (q
> buf
+ LDNS_MAX_DOMAINLEN
) {
121 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW
, q
-buf
);
123 if (label_len
> LDNS_MAX_LABELLEN
) {
124 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
, q
-buf
);
126 if (label_len
== 0) { /* label_len 0 but not . at end? */
127 return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL
, q
-buf
);
129 len
+= label_len
+ 1;
136 return LDNS_WIREPARSE_ERR_OK
;
139 int sldns_str2wire_dname_buf(const char* str
, uint8_t* buf
, size_t* len
)
141 return sldns_str2wire_dname_buf_rel(str
, buf
, len
, NULL
);
144 int sldns_str2wire_dname_buf_origin(const char* str
, uint8_t* buf
, size_t* len
,
145 uint8_t* origin
, size_t origin_len
)
149 int s
= sldns_str2wire_dname_buf_rel(str
, buf
, &dlen
, &rel
);
152 if(rel
&& origin
&& dlen
> 0) {
153 if(dlen
+ origin_len
- 1 > LDNS_MAX_DOMAINLEN
)
154 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW
,
156 if(dlen
+ origin_len
- 1 > *len
)
157 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
159 memmove(buf
+dlen
-1, origin
, origin_len
);
160 *len
= dlen
+ origin_len
- 1;
163 return LDNS_WIREPARSE_ERR_OK
;
166 uint8_t* sldns_str2wire_dname(const char* str
, size_t* len
)
168 uint8_t dname
[LDNS_MAX_DOMAINLEN
+1];
169 *len
= sizeof(dname
);
170 if(sldns_str2wire_dname_buf(str
, dname
, len
) == 0) {
171 uint8_t* r
= (uint8_t*)malloc(*len
);
172 if(r
) return memcpy(r
, dname
, *len
);
178 /** read owner name */
180 rrinternal_get_owner(sldns_buffer
* strbuf
, uint8_t* rr
, size_t* len
,
181 size_t* dname_len
, uint8_t* origin
, size_t origin_len
, uint8_t* prev
,
182 size_t prev_len
, char* token
, size_t token_len
)
184 /* split the rr in its parts -1 signals trouble */
185 if(sldns_bget_token(strbuf
, token
, "\t\n ", token_len
) == -1) {
186 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX
,
187 sldns_buffer_position(strbuf
));
190 if(strcmp(token
, "@") == 0) {
193 *dname_len
= origin_len
;
196 *dname_len
= prev_len
;
199 /* default to root */
201 tocopy
= (uint8_t*)"\0";
203 if(*len
< *dname_len
)
204 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
205 sldns_buffer_position(strbuf
));
206 memmove(rr
, tocopy
, *dname_len
);
207 } else if(strlen(token
) == 0) {
208 /* no ownername was given, try prev, if that fails
209 * origin, else default to root */
212 *dname_len
= prev_len
;
215 *dname_len
= origin_len
;
219 tocopy
= (uint8_t*)"\0";
221 if(*len
< *dname_len
)
222 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
223 sldns_buffer_position(strbuf
));
224 memmove(rr
, tocopy
, *dname_len
);
227 int s
= sldns_str2wire_dname_buf_origin(token
, rr
, &dlen
,
229 if(s
) return RET_ERR_SHIFT(s
,
230 sldns_buffer_position(strbuf
)-strlen(token
));
233 return LDNS_WIREPARSE_ERR_OK
;
238 rrinternal_get_ttl(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
239 int* not_there
, uint32_t* ttl
, uint32_t default_ttl
)
242 if(sldns_bget_token(strbuf
, token
, "\t\n ", token_len
) == -1) {
243 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TTL
,
244 sldns_buffer_position(strbuf
));
246 *ttl
= (uint32_t) sldns_str2period(token
, &endptr
);
248 if (strlen(token
) > 0 && !isdigit((unsigned char)token
[0])) {
250 /* ah, it's not there or something */
251 if (default_ttl
== 0) {
252 *ttl
= LDNS_DEFAULT_TTL
;
257 return LDNS_WIREPARSE_ERR_OK
;
262 rrinternal_get_class(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
263 int* not_there
, uint16_t* cl
)
265 /* if 'not_there' then we got token from previous parse routine */
267 /* parse new token for class */
268 if(sldns_bget_token(strbuf
, token
, "\t\n ", token_len
) == -1) {
269 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_CLASS
,
270 sldns_buffer_position(strbuf
));
272 } else *not_there
= 0;
273 *cl
= sldns_get_rr_class_by_name(token
);
274 /* class can be left out too, assume IN, current token must be type */
275 if(*cl
== 0 && strcmp(token
, "CLASS0") != 0) {
277 *cl
= LDNS_RR_CLASS_IN
;
279 return LDNS_WIREPARSE_ERR_OK
;
284 rrinternal_get_type(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
285 int* not_there
, uint16_t* tp
)
287 /* if 'not_there' then we got token from previous parse routine */
289 /* parse new token for type */
290 if(sldns_bget_token(strbuf
, token
, "\t\n ", token_len
) == -1) {
291 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE
,
292 sldns_buffer_position(strbuf
));
295 *tp
= sldns_get_rr_type_by_name(token
);
296 if(*tp
== 0 && strcmp(token
, "TYPE0") != 0) {
297 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE
,
298 sldns_buffer_position(strbuf
));
300 return LDNS_WIREPARSE_ERR_OK
;
303 /** put type, class, ttl into rr buffer */
305 rrinternal_write_typeclassttl(sldns_buffer
* strbuf
, uint8_t* rr
, size_t len
,
306 size_t dname_len
, uint16_t tp
, uint16_t cl
, uint32_t ttl
, int question
)
309 /* question is : name, type, class */
310 if(dname_len
+ 4 > len
)
311 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
312 sldns_buffer_position(strbuf
));
313 sldns_write_uint16(rr
+dname_len
, tp
);
314 sldns_write_uint16(rr
+dname_len
+2, cl
);
315 return LDNS_WIREPARSE_ERR_OK
;
318 /* type(2), class(2), ttl(4), rdatalen(2 (later)) = 10 */
319 if(dname_len
+ 10 > len
)
320 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
321 sldns_buffer_position(strbuf
));
322 sldns_write_uint16(rr
+dname_len
, tp
);
323 sldns_write_uint16(rr
+dname_len
+2, cl
);
324 sldns_write_uint32(rr
+dname_len
+4, ttl
);
325 sldns_write_uint16(rr
+dname_len
+8, 0); /* rdatalen placeholder */
326 return LDNS_WIREPARSE_ERR_OK
;
329 /** find delimiters for type */
331 rrinternal_get_delims(sldns_rdf_type rdftype
, uint16_t r_cnt
, uint16_t r_max
)
334 case LDNS_RDF_TYPE_B64
:
335 case LDNS_RDF_TYPE_HEX
: /* These rdf types may con- */
336 case LDNS_RDF_TYPE_LOC
: /* tain whitespace, only if */
337 case LDNS_RDF_TYPE_WKS
: /* it is the last rd field. */
338 case LDNS_RDF_TYPE_IPSECKEY
:
339 case LDNS_RDF_TYPE_NSEC
: if (r_cnt
== r_max
- 1) {
348 /* Syntactic sugar for sldns_rr_new_frm_str_internal */
350 sldns_rdf_type_maybe_quoted(sldns_rdf_type rdf_type
)
352 return rdf_type
== LDNS_RDF_TYPE_STR
||
353 rdf_type
== LDNS_RDF_TYPE_LONG_STR
;
356 /** see if rdata is quoted */
358 rrinternal_get_quoted(sldns_buffer
* strbuf
, const char** delimiters
,
359 sldns_rdf_type rdftype
)
361 if(sldns_rdf_type_maybe_quoted(rdftype
) &&
362 sldns_buffer_remaining(strbuf
) > 0) {
365 while(sldns_buffer_remaining(strbuf
) > 0 &&
366 *(sldns_buffer_current(strbuf
)) == ' ') {
367 sldns_buffer_skip(strbuf
, 1);
370 if(sldns_buffer_remaining(strbuf
) > 0 &&
371 *(sldns_buffer_current(strbuf
)) == '\"') {
372 *delimiters
= "\"\0";
373 sldns_buffer_skip(strbuf
, 1);
380 /** spool hex data into rdata */
382 rrinternal_spool_hex(char* token
, uint8_t* rr
, size_t rr_len
,
383 size_t rr_cur_len
, size_t* cur_hex_data_size
, size_t hex_data_size
)
387 if(isspace((unsigned char)*p
)) {
391 if(!isxdigit((unsigned char)*p
))
392 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA
,
394 if(*cur_hex_data_size
>= hex_data_size
)
395 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA
,
397 /* extra robust check */
398 if(rr_cur_len
+(*cur_hex_data_size
)/2 >= rr_len
)
399 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
401 /* see if 16s or 1s */
402 if( ((*cur_hex_data_size
)&1) == 0) {
403 rr
[rr_cur_len
+(*cur_hex_data_size
)/2] =
404 (uint8_t)sldns_hexdigit_to_int(*p
)*16;
406 rr
[rr_cur_len
+(*cur_hex_data_size
)/2] +=
407 (uint8_t)sldns_hexdigit_to_int(*p
);
410 (*cur_hex_data_size
)++;
412 return LDNS_WIREPARSE_ERR_OK
;
415 /** read unknown rr type format */
417 rrinternal_parse_unknown(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
418 uint8_t* rr
, size_t* rr_len
, size_t* rr_cur_len
, size_t pre_data_pos
)
420 const char* delim
= "\n\t ";
421 size_t hex_data_size
, cur_hex_data_size
;
422 /* go back to before \#
423 * and skip it while setting delimiters better
425 sldns_buffer_set_position(strbuf
, pre_data_pos
);
426 if(sldns_bget_token(strbuf
, token
, delim
, token_len
) == -1)
427 return LDNS_WIREPARSE_ERR_GENERAL
; /* should not fail */
428 /* read rdata octet length */
429 if(sldns_bget_token(strbuf
, token
, delim
, token_len
) == -1) {
430 /* something goes very wrong here */
431 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA
,
432 sldns_buffer_position(strbuf
));
434 hex_data_size
= (size_t)atoi(token
);
435 if(hex_data_size
> LDNS_MAX_RDFLEN
||
436 *rr_cur_len
+ hex_data_size
> *rr_len
) {
437 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
438 sldns_buffer_position(strbuf
));
440 /* copy hex chars into hex str (2 chars per byte) */
442 cur_hex_data_size
= 0;
443 while(cur_hex_data_size
< hex_data_size
) {
445 ssize_t c
= sldns_bget_token(strbuf
, token
, delim
, token_len
);
446 if((status
= rrinternal_spool_hex(token
, rr
, *rr_len
,
447 *rr_cur_len
, &cur_hex_data_size
, hex_data_size
)) != 0)
448 return RET_ERR_SHIFT(status
,
449 sldns_buffer_position(strbuf
)-strlen(token
));
451 if(cur_hex_data_size
!= hex_data_size
)
453 LDNS_WIREPARSE_ERR_SYNTAX_RDATA
,
454 sldns_buffer_position(strbuf
));
458 *rr_cur_len
+= hex_data_size
/2;
459 return LDNS_WIREPARSE_ERR_OK
;
462 /** parse normal RR rdata element */
464 rrinternal_parse_rdf(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
465 uint8_t* rr
, size_t rr_len
, size_t* rr_cur_len
, sldns_rdf_type rdftype
,
466 uint16_t rr_type
, uint16_t r_cnt
, uint16_t r_max
, size_t dname_len
,
467 uint8_t* origin
, size_t origin_len
)
473 case LDNS_RDF_TYPE_DNAME
:
474 /* check if the origin should be used or concatenated */
475 if(strcmp(token
, "@") == 0) {
479 copylen
= origin_len
;
481 } else if(rr_type
== LDNS_RR_TYPE_SOA
) {
483 tocopy
= rr
; /* copy rr owner name */
486 tocopy
= (uint8_t*)"\0";
488 if((*rr_cur_len
) + copylen
> rr_len
)
490 LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
491 sldns_buffer_position(strbuf
));
492 memmove(rr
+*rr_cur_len
, tocopy
, copylen
);
493 (*rr_cur_len
) += copylen
;
495 size_t dlen
= rr_len
- (*rr_cur_len
);
496 int s
= sldns_str2wire_dname_buf_origin(token
,
497 rr
+*rr_cur_len
, &dlen
, origin
, origin_len
);
498 if(s
) return RET_ERR_SHIFT(s
,
499 sldns_buffer_position(strbuf
)-strlen(token
));
500 (*rr_cur_len
) += dlen
;
502 return LDNS_WIREPARSE_ERR_OK
;
504 case LDNS_RDF_TYPE_HEX
:
505 case LDNS_RDF_TYPE_B64
:
506 /* When this is the last rdata field, then the
507 * rest should be read in (cause then these
508 * rdf types may contain spaces). */
509 if(r_cnt
== r_max
- 1) {
510 size_t tlen
= strlen(token
);
511 (void)sldns_bget_token(strbuf
, token
+tlen
, "\n",
519 len
= rr_len
- (*rr_cur_len
);
520 if((status
=sldns_str2wire_rdf_buf(token
, rr
+(*rr_cur_len
), &len
,
522 return RET_ERR_SHIFT(status
,
523 sldns_buffer_position(strbuf
)-strlen(token
));
525 return LDNS_WIREPARSE_ERR_OK
;
529 * Parse one rdf token. Takes care of quotes and parenthesis.
532 sldns_parse_rdf_token(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
533 int* quoted
, int* parens
, size_t* pre_data_pos
,
534 const char* delimiters
, sldns_rdf_type rdftype
, size_t* token_strlen
)
539 while(sldns_buffer_remaining(strbuf
) > 0 && !*quoted
&&
540 *(sldns_buffer_current(strbuf
)) == ' ') {
541 sldns_buffer_skip(strbuf
, 1);
544 *pre_data_pos
= sldns_buffer_position(strbuf
);
545 if(sldns_bget_token_par(strbuf
, token
, (*quoted
)?"\"":delimiters
,
546 token_len
, parens
, (*quoted
)?NULL
:" \t") == -1) {
549 slen
= strlen(token
);
550 /* check if not quoted yet, and we have encountered quotes */
551 if(!*quoted
&& sldns_rdf_type_maybe_quoted(rdftype
) &&
553 (token
[0] == '"' || token
[0] == '\'') &&
554 (token
[slen
-1] == '"' || token
[slen
-1] == '\'')) {
555 /* move token two smaller (quotes) with endnull */
556 memmove(token
, token
+1, slen
-2);
560 } else if(!*quoted
&& sldns_rdf_type_maybe_quoted(rdftype
) &&
562 (token
[0] == '"' || token
[0] == '\'')) {
563 /* got the start quote (remove it) but read remainder
564 * of quoted string as well into remainder of token */
565 memmove(token
, token
+1, slen
-1);
569 /* rewind buffer over skipped whitespace */
570 while(sldns_buffer_position(strbuf
) > 0 &&
571 (sldns_buffer_current(strbuf
)[-1] == ' ' ||
572 sldns_buffer_current(strbuf
)[-1] == '\t')) {
573 sldns_buffer_skip(strbuf
, -1);
575 if(sldns_bget_token_par(strbuf
, token
+slen
,
576 "\"", token_len
-slen
,
577 parens
, NULL
) == -1) {
580 slen
= strlen(token
);
582 *token_strlen
= slen
;
586 /** Add space and one more rdf token onto the existing token string. */
588 sldns_affix_token(sldns_buffer
* strbuf
, char* token
, size_t* token_len
,
589 int* quoted
, int* parens
, size_t* pre_data_pos
,
590 const char* delimiters
, sldns_rdf_type rdftype
, size_t* token_strlen
)
592 size_t addlen
= *token_len
- *token_strlen
;
593 size_t addstrlen
= 0;
596 if(addlen
< 1) return 0;
597 token
[*token_strlen
] = ' ';
598 token
[++(*token_strlen
)] = 0;
600 /* read another token */
601 addlen
= *token_len
- *token_strlen
;
602 if(!sldns_parse_rdf_token(strbuf
, token
+*token_strlen
, addlen
, quoted
,
603 parens
, pre_data_pos
, delimiters
, rdftype
, &addstrlen
))
605 (*token_strlen
) += addstrlen
;
609 /** parse rdata from string into rr buffer(-remainder after dname). */
611 rrinternal_parse_rdata(sldns_buffer
* strbuf
, char* token
, size_t token_len
,
612 uint8_t* rr
, size_t* rr_len
, size_t dname_len
, uint16_t rr_type
,
613 uint8_t* origin
, size_t origin_len
)
615 const sldns_rr_descriptor
*desc
= sldns_rr_descript((uint16_t)rr_type
);
616 uint16_t r_cnt
, r_min
, r_max
;
617 size_t rr_cur_len
= dname_len
+ 10, pre_data_pos
, token_strlen
;
618 int was_unknown_rr_format
= 0, parens
= 0, status
, quoted
;
619 const char* delimiters
;
620 sldns_rdf_type rdftype
;
621 /* a desc is always returned */
622 if(!desc
) return LDNS_WIREPARSE_ERR_GENERAL
;
623 r_max
= sldns_rr_descriptor_maximum(desc
);
624 r_min
= sldns_rr_descriptor_minimum(desc
);
626 if(rr_cur_len
> *rr_len
)
627 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
628 sldns_buffer_position(strbuf
));
630 /* because number of fields can be variable, we can't rely on
632 for(r_cnt
=0; r_cnt
< r_max
; r_cnt
++) {
633 rdftype
= sldns_rr_descriptor_field_type(desc
, r_cnt
);
634 delimiters
= rrinternal_get_delims(rdftype
, r_cnt
, r_max
);
635 quoted
= rrinternal_get_quoted(strbuf
, &delimiters
, rdftype
);
637 if(!sldns_parse_rdf_token(strbuf
, token
, token_len
, "ed
,
638 &parens
, &pre_data_pos
, delimiters
, rdftype
,
642 /* rfc3597 specifies that any type can be represented
643 * with \# method, which can contain spaces...
644 * it does specify size though... */
646 /* unknown RR data */
647 if(token_strlen
>=2 && strncmp(token
, "\\#", 2) == 0 &&
648 !quoted
&& (token_strlen
== 2 || token
[2]==' ')) {
649 was_unknown_rr_format
= 1;
650 if((status
=rrinternal_parse_unknown(strbuf
, token
,
651 token_len
, rr
, rr_len
, &rr_cur_len
,
654 } else if(token_strlen
> 0 || quoted
) {
655 if(rdftype
== LDNS_RDF_TYPE_HIP
) {
656 /* affix the HIT and PK fields, with a space */
657 if(!sldns_affix_token(strbuf
, token
,
658 &token_len
, "ed
, &parens
,
659 &pre_data_pos
, delimiters
,
660 rdftype
, &token_strlen
))
662 if(!sldns_affix_token(strbuf
, token
,
663 &token_len
, "ed
, &parens
,
664 &pre_data_pos
, delimiters
,
665 rdftype
, &token_strlen
))
670 if((status
=rrinternal_parse_rdf(strbuf
, token
,
671 token_len
, rr
, *rr_len
, &rr_cur_len
, rdftype
,
672 rr_type
, r_cnt
, r_max
, dname_len
, origin
,
678 if(!was_unknown_rr_format
&& r_cnt
+1 < r_min
) {
679 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE
,
680 sldns_buffer_position(strbuf
));
683 /* read remainder, must be "" */
684 if(sldns_bget_token_par(strbuf
, token
, "\n", token_len
,
685 &parens
, " \t") == -1) {
687 return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS
,
688 sldns_buffer_position(strbuf
));
691 if(strcmp(token
, "") != 0)
692 return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS
,
693 sldns_buffer_position(strbuf
));
695 /* write rdata length */
696 sldns_write_uint16(rr
+dname_len
+8, rr_cur_len
-dname_len
-10);
697 *rr_len
= rr_cur_len
;
698 return LDNS_WIREPARSE_ERR_OK
;
702 * trailing spaces are allowed
703 * leading spaces are not allowed
704 * allow ttl to be optional
705 * class is optional too
706 * if ttl is missing, and default_ttl is 0, use DEF_TTL
707 * allow ttl to be written as 1d3h
708 * So the RR should look like. e.g.
709 * miek.nl. 3600 IN MX 10 elektron.atoom.net
711 * miek.nl. 1h IN MX 10 elektron.atoom.net
713 * miek.nl. IN MX 10 elektron.atoom.net
716 sldns_str2wire_rr_buf_internal(const char* str
, uint8_t* rr
, size_t* len
,
717 size_t* dname_len
, uint32_t default_ttl
, uint8_t* origin
,
718 size_t origin_len
, uint8_t* prev
, size_t prev_len
, int question
)
722 char token
[LDNS_MAX_RDFLEN
+1];
724 uint16_t tp
= 0, cl
= 0;
727 /* string in buffer */
729 sldns_buffer_init_frm_data(&strbuf
, (uint8_t*)str
, strlen(str
));
730 if(!dname_len
) dname_len
= &ddlen
;
732 /* parse the owner */
733 if((status
=rrinternal_get_owner(&strbuf
, rr
, len
, dname_len
, origin
,
734 origin_len
, prev
, prev_len
, token
, sizeof(token
))) != 0)
737 /* parse the [ttl] [class] <type> */
738 if((status
=rrinternal_get_ttl(&strbuf
, token
, sizeof(token
),
739 ¬_there
, &ttl
, default_ttl
)) != 0)
741 if((status
=rrinternal_get_class(&strbuf
, token
, sizeof(token
),
742 ¬_there
, &cl
)) != 0)
744 if((status
=rrinternal_get_type(&strbuf
, token
, sizeof(token
),
745 ¬_there
, &tp
)) != 0)
747 /* put ttl, class, type into the rr result */
748 if((status
=rrinternal_write_typeclassttl(&strbuf
, rr
, *len
, *dname_len
, tp
, cl
,
749 ttl
, question
)) != 0)
751 /* for a question-RR we are done, no rdata */
753 *len
= *dname_len
+ 4;
754 return LDNS_WIREPARSE_ERR_OK
;
758 if((status
=rrinternal_parse_rdata(&strbuf
, token
, sizeof(token
),
759 rr
, len
, *dname_len
, tp
, origin
, origin_len
)) != 0)
762 return LDNS_WIREPARSE_ERR_OK
;
765 int sldns_str2wire_rr_buf(const char* str
, uint8_t* rr
, size_t* len
,
766 size_t* dname_len
, uint32_t default_ttl
, uint8_t* origin
,
767 size_t origin_len
, uint8_t* prev
, size_t prev_len
)
769 return sldns_str2wire_rr_buf_internal(str
, rr
, len
, dname_len
,
770 default_ttl
, origin
, origin_len
, prev
, prev_len
, 0);
773 int sldns_str2wire_rr_question_buf(const char* str
, uint8_t* rr
, size_t* len
,
774 size_t* dname_len
, uint8_t* origin
, size_t origin_len
, uint8_t* prev
,
777 return sldns_str2wire_rr_buf_internal(str
, rr
, len
, dname_len
,
778 0, origin
, origin_len
, prev
, prev_len
, 1);
781 uint16_t sldns_wirerr_get_type(uint8_t* rr
, size_t len
, size_t dname_len
)
783 if(len
< dname_len
+2)
785 return sldns_read_uint16(rr
+dname_len
);
788 uint16_t sldns_wirerr_get_class(uint8_t* rr
, size_t len
, size_t dname_len
)
790 if(len
< dname_len
+4)
792 return sldns_read_uint16(rr
+dname_len
+2);
795 uint32_t sldns_wirerr_get_ttl(uint8_t* rr
, size_t len
, size_t dname_len
)
797 if(len
< dname_len
+8)
799 return sldns_read_uint32(rr
+dname_len
+4);
802 uint16_t sldns_wirerr_get_rdatalen(uint8_t* rr
, size_t len
, size_t dname_len
)
804 if(len
< dname_len
+10)
806 return sldns_read_uint16(rr
+dname_len
+8);
809 uint8_t* sldns_wirerr_get_rdata(uint8_t* rr
, size_t len
, size_t dname_len
)
811 if(len
< dname_len
+10)
813 return rr
+dname_len
+10;
816 uint8_t* sldns_wirerr_get_rdatawl(uint8_t* rr
, size_t len
, size_t dname_len
)
818 if(len
< dname_len
+10)
820 return rr
+dname_len
+8;
823 const char* sldns_get_errorstr_parse(int e
)
825 sldns_lookup_table
*lt
;
826 lt
= sldns_lookup_by_id(sldns_wireparse_errors
, LDNS_WIREPARSE_ERROR(e
));
827 return lt
?lt
->name
:"unknown error";
830 /* Strip whitespace from the start and the end of <line>. */
832 sldns_strip_ws(char *line
)
836 for (s
= line
; *s
&& isspace((unsigned char)*s
); s
++)
838 for (e
= strchr(s
, 0); e
> s
+2 && isspace((unsigned char)e
[-1]) && e
[-2] != '\\'; e
--)
844 int sldns_fp2wire_rr_buf(FILE* in
, uint8_t* rr
, size_t* len
, size_t* dname_len
,
845 struct sldns_file_parse_state
* parse_state
)
847 char line
[LDNS_RR_BUF_SIZE
+1];
850 /* read an entire line in from the file */
851 if((size
= sldns_fget_token_l(in
, line
, LDNS_PARSE_SKIP_SPACE
,
852 LDNS_RR_BUF_SIZE
, parse_state
?&parse_state
->lineno
:NULL
))
854 /* if last line was empty, we are now at feof, which is not
855 * always a parse error (happens when for instance last line
858 return LDNS_WIREPARSE_ERR_SYNTAX
;
861 /* we can have the situation, where we've read ok, but still got
862 * no bytes to play with, in this case size is 0 */
866 return LDNS_WIREPARSE_ERR_OK
;
869 if(strncmp(line
, "$ORIGIN", 7) == 0 && isspace((unsigned char)line
[7])) {
873 if(!parse_state
) return LDNS_WIREPARSE_ERR_OK
;
874 parse_state
->origin_len
= sizeof(parse_state
->origin
);
875 s
= sldns_str2wire_dname_buf(sldns_strip_ws(line
+8),
876 parse_state
->origin
, &parse_state
->origin_len
);
877 if(s
) parse_state
->origin_len
= 0;
879 } else if(strncmp(line
, "$TTL", 4) == 0 && isspace((unsigned char)line
[4])) {
880 const char* end
= NULL
;
883 if(!parse_state
) return LDNS_WIREPARSE_ERR_OK
;
884 parse_state
->default_ttl
= sldns_str2period(
885 sldns_strip_ws(line
+5), &end
);
886 } else if (strncmp(line
, "$INCLUDE", 8) == 0) {
889 return LDNS_WIREPARSE_ERR_INCLUDE
;
891 return sldns_str2wire_rr_buf(line
, rr
, len
, dname_len
,
892 parse_state
?parse_state
->default_ttl
:0,
893 (parse_state
&&parse_state
->origin_len
)?
894 parse_state
->origin
:NULL
,
895 parse_state
->origin_len
,
896 (parse_state
&&parse_state
->prev_rr_len
)?
897 parse_state
->prev_rr
:NULL
,
898 parse_state
->prev_rr_len
);
900 return LDNS_WIREPARSE_ERR_OK
;
903 int sldns_str2wire_rdf_buf(const char* str
, uint8_t* rd
, size_t* len
,
904 sldns_rdf_type rdftype
)
907 case LDNS_RDF_TYPE_DNAME
:
908 return sldns_str2wire_dname_buf(str
, rd
, len
);
909 case LDNS_RDF_TYPE_INT8
:
910 return sldns_str2wire_int8_buf(str
, rd
, len
);
911 case LDNS_RDF_TYPE_INT16
:
912 return sldns_str2wire_int16_buf(str
, rd
, len
);
913 case LDNS_RDF_TYPE_INT32
:
914 return sldns_str2wire_int32_buf(str
, rd
, len
);
915 case LDNS_RDF_TYPE_A
:
916 return sldns_str2wire_a_buf(str
, rd
, len
);
917 case LDNS_RDF_TYPE_AAAA
:
918 return sldns_str2wire_aaaa_buf(str
, rd
, len
);
919 case LDNS_RDF_TYPE_STR
:
920 return sldns_str2wire_str_buf(str
, rd
, len
);
921 case LDNS_RDF_TYPE_APL
:
922 return sldns_str2wire_apl_buf(str
, rd
, len
);
923 case LDNS_RDF_TYPE_B64
:
924 return sldns_str2wire_b64_buf(str
, rd
, len
);
925 case LDNS_RDF_TYPE_B32_EXT
:
926 return sldns_str2wire_b32_ext_buf(str
, rd
, len
);
927 case LDNS_RDF_TYPE_HEX
:
928 return sldns_str2wire_hex_buf(str
, rd
, len
);
929 case LDNS_RDF_TYPE_NSEC
:
930 return sldns_str2wire_nsec_buf(str
, rd
, len
);
931 case LDNS_RDF_TYPE_TYPE
:
932 return sldns_str2wire_type_buf(str
, rd
, len
);
933 case LDNS_RDF_TYPE_CLASS
:
934 return sldns_str2wire_class_buf(str
, rd
, len
);
935 case LDNS_RDF_TYPE_CERT_ALG
:
936 return sldns_str2wire_cert_alg_buf(str
, rd
, len
);
937 case LDNS_RDF_TYPE_ALG
:
938 return sldns_str2wire_alg_buf(str
, rd
, len
);
939 case LDNS_RDF_TYPE_TIME
:
940 return sldns_str2wire_time_buf(str
, rd
, len
);
941 case LDNS_RDF_TYPE_PERIOD
:
942 return sldns_str2wire_period_buf(str
, rd
, len
);
943 case LDNS_RDF_TYPE_LOC
:
944 return sldns_str2wire_loc_buf(str
, rd
, len
);
945 case LDNS_RDF_TYPE_WKS
:
946 return sldns_str2wire_wks_buf(str
, rd
, len
);
947 case LDNS_RDF_TYPE_NSAP
:
948 return sldns_str2wire_nsap_buf(str
, rd
, len
);
949 case LDNS_RDF_TYPE_ATMA
:
950 return sldns_str2wire_atma_buf(str
, rd
, len
);
951 case LDNS_RDF_TYPE_IPSECKEY
:
952 return sldns_str2wire_ipseckey_buf(str
, rd
, len
);
953 case LDNS_RDF_TYPE_NSEC3_SALT
:
954 return sldns_str2wire_nsec3_salt_buf(str
, rd
, len
);
955 case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER
:
956 return sldns_str2wire_b32_ext_buf(str
, rd
, len
);
957 case LDNS_RDF_TYPE_ILNP64
:
958 return sldns_str2wire_ilnp64_buf(str
, rd
, len
);
959 case LDNS_RDF_TYPE_EUI48
:
960 return sldns_str2wire_eui48_buf(str
, rd
, len
);
961 case LDNS_RDF_TYPE_EUI64
:
962 return sldns_str2wire_eui64_buf(str
, rd
, len
);
963 case LDNS_RDF_TYPE_TAG
:
964 return sldns_str2wire_tag_buf(str
, rd
, len
);
965 case LDNS_RDF_TYPE_LONG_STR
:
966 return sldns_str2wire_long_str_buf(str
, rd
, len
);
967 case LDNS_RDF_TYPE_HIP
:
968 return sldns_str2wire_hip_buf(str
, rd
, len
);
969 case LDNS_RDF_TYPE_INT16_DATA
:
970 return sldns_str2wire_int16_data_buf(str
, rd
, len
);
971 case LDNS_RDF_TYPE_UNKNOWN
:
972 case LDNS_RDF_TYPE_SERVICE
:
973 return LDNS_WIREPARSE_ERR_NOT_IMPL
;
974 case LDNS_RDF_TYPE_NONE
:
978 return LDNS_WIREPARSE_ERR_GENERAL
;
981 int sldns_str2wire_int8_buf(const char* str
, uint8_t* rd
, size_t* len
)
984 uint8_t r
= (uint8_t)strtol((char*)str
, &end
, 10);
986 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT
, end
-(char*)str
);
988 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
991 return LDNS_WIREPARSE_ERR_OK
;
994 int sldns_str2wire_int16_buf(const char* str
, uint8_t* rd
, size_t* len
)
997 uint16_t r
= (uint16_t)strtol((char*)str
, &end
, 10);
999 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT
, end
-(char*)str
);
1001 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1002 sldns_write_uint16(rd
, r
);
1004 return LDNS_WIREPARSE_ERR_OK
;
1007 int sldns_str2wire_int32_buf(const char* str
, uint8_t* rd
, size_t* len
)
1011 errno
= 0; /* must set to zero before call,
1012 note race condition on errno */
1014 r
= (uint32_t)strtol((char*)str
, &end
, 10);
1015 else r
= (uint32_t)strtoul((char*)str
, &end
, 10);
1017 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT
, end
-(char*)str
);
1019 return LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW
;
1021 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1022 sldns_write_uint32(rd
, r
);
1024 return LDNS_WIREPARSE_ERR_OK
;
1027 int sldns_str2wire_a_buf(const char* str
, uint8_t* rd
, size_t* len
)
1029 struct in_addr address
;
1030 if(inet_pton(AF_INET
, (char*)str
, &address
) != 1)
1031 return LDNS_WIREPARSE_ERR_SYNTAX_IP4
;
1032 if(*len
< sizeof(address
))
1033 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1034 memmove(rd
, &address
, sizeof(address
));
1035 *len
= sizeof(address
);
1036 return LDNS_WIREPARSE_ERR_OK
;
1039 int sldns_str2wire_aaaa_buf(const char* str
, uint8_t* rd
, size_t* len
)
1042 uint8_t address
[LDNS_IP6ADDRLEN
+ 1];
1043 if(inet_pton(AF_INET6
, (char*)str
, address
) != 1)
1044 return LDNS_WIREPARSE_ERR_SYNTAX_IP6
;
1045 if(*len
< LDNS_IP6ADDRLEN
)
1046 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1047 memmove(rd
, address
, LDNS_IP6ADDRLEN
);
1048 *len
= LDNS_IP6ADDRLEN
;
1049 return LDNS_WIREPARSE_ERR_OK
;
1051 return LDNS_WIREPARSE_ERR_NOT_IMPL
;
1055 int sldns_str2wire_str_buf(const char* str
, uint8_t* rd
, size_t* len
)
1059 const char* s
= str
;
1060 /* skip length byte */
1062 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1064 /* read characters */
1065 while(sldns_parse_char(&ch
, &s
)) {
1067 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
, s
-str
);
1069 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
1074 return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE
;
1075 rd
[0] = (uint8_t)sl
;
1077 return LDNS_WIREPARSE_ERR_OK
;
1080 int sldns_str2wire_apl_buf(const char* str
, uint8_t* rd
, size_t* len
)
1082 const char *my_str
= str
;
1089 size_t adflength
= 0;
1094 if(strlen(my_str
) == 0) {
1095 /* empty APL element, no data, no string */
1097 return LDNS_WIREPARSE_ERR_OK
;
1100 /* [!]afi:address/prefix */
1101 if (strlen(my_str
) < 2
1102 || strchr(my_str
, ':') == NULL
1103 || strchr(my_str
, '/') == NULL
1104 || strchr(my_str
, ':') > strchr(my_str
, '/')) {
1105 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1108 if (my_str
[0] == '!') {
1115 family
= (uint16_t) atoi(my_str
);
1117 my_str
= strchr(my_str
, ':') + 1;
1119 /* need ip addr and only ip addr for inet_pton */
1120 ip_str_len
= (size_t) (strchr(my_str
, '/') - my_str
);
1121 if(ip_str_len
+1 > sizeof(my_ip_str
))
1122 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1123 (void)strlcpy(my_ip_str
, my_str
, sizeof(my_ip_str
));
1124 my_ip_str
[ip_str_len
] = 0;
1128 if(inet_pton(AF_INET
, my_ip_str
, data
+4) == 0)
1129 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1130 for (i
= 0; i
< 4; i
++) {
1131 if (data
[i
+4] != 0) {
1135 } else if (family
== 2) {
1137 if (inet_pton(AF_INET6
, my_ip_str
, data
+4) == 0)
1138 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1139 for (i
= 0; i
< 16; i
++) {
1140 if (data
[i
+4] != 0) {
1145 /* unknown family */
1146 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1149 my_str
= strchr(my_str
, '/') + 1;
1150 prefix
= (uint8_t) atoi(my_str
);
1152 sldns_write_uint16(data
, family
);
1154 data
[3] = (uint8_t)adflength
;
1156 /* set bit 1 of byte 3 */
1157 data
[3] = data
[3] | 0x80;
1160 if(*len
< 4+adflength
)
1161 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1162 memmove(rd
, data
, 4+adflength
);
1164 return LDNS_WIREPARSE_ERR_OK
;
1167 int sldns_str2wire_b64_buf(const char* str
, uint8_t* rd
, size_t* len
)
1169 size_t sz
= sldns_b64_pton_calculate_size(strlen(str
));
1172 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1173 n
= sldns_b64_pton(str
, rd
, *len
);
1175 return LDNS_WIREPARSE_ERR_SYNTAX_B64
;
1177 return LDNS_WIREPARSE_ERR_OK
;
1180 int sldns_str2wire_b32_ext_buf(const char* str
, uint8_t* rd
, size_t* len
)
1182 size_t slen
= strlen(str
);
1183 size_t sz
= sldns_b32_pton_calculate_size(slen
);
1186 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1187 rd
[0] = (uint8_t)sz
;
1188 n
= sldns_b32_pton_extended_hex(str
, slen
, rd
+1, *len
-1);
1190 return LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT
;
1192 return LDNS_WIREPARSE_ERR_OK
;
1195 int sldns_str2wire_hex_buf(const char* str
, uint8_t* rd
, size_t* len
)
1197 const char* s
= str
;
1198 size_t dlen
= 0; /* number of hexdigits parsed */
1200 if(isspace((unsigned char)*s
)) {
1204 if(!isxdigit((unsigned char)*s
))
1205 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, s
-str
);
1206 if(*len
< dlen
/2 + 1)
1207 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
1210 rd
[dlen
/2] = (uint8_t)sldns_hexdigit_to_int(*s
++) * 16;
1211 else rd
[dlen
/2] += (uint8_t)sldns_hexdigit_to_int(*s
++);
1215 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, s
-str
);
1217 return LDNS_WIREPARSE_ERR_OK
;
1220 int sldns_str2wire_nsec_buf(const char* str
, uint8_t* rd
, size_t* len
)
1222 const char *delim
= "\n\t ";
1223 char token
[64]; /* for a type name */
1224 size_t type_count
= 0;
1227 uint16_t maxtype
= 0;
1228 uint8_t typebits
[8192]; /* 65536 bits */
1229 uint8_t window_in_use
[256];
1231 /* string in buffer */
1232 sldns_buffer strbuf
;
1233 sldns_buffer_init_frm_data(&strbuf
, (uint8_t*)str
, strlen(str
));
1235 /* parse the types */
1236 memset(typebits
, 0, sizeof(typebits
));
1237 memset(window_in_use
, 0, sizeof(window_in_use
));
1238 while(sldns_buffer_remaining(&strbuf
) > 0 &&
1239 sldns_bget_token(&strbuf
, token
, delim
, sizeof(token
)) != -1) {
1240 uint16_t t
= sldns_get_rr_type_by_name(token
);
1243 if(t
== 0 && strcmp(token
, "TYPE0") != 0)
1244 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE
,
1245 sldns_buffer_position(&strbuf
));
1246 typebits
[t
/8] |= (0x80>>(t%8
));
1247 window_in_use
[t
/256] = 1;
1249 if(t
> maxtype
) maxtype
= t
;
1252 /* empty NSEC bitmap */
1253 if(type_count
== 0) {
1255 return LDNS_WIREPARSE_ERR_OK
;
1258 /* encode windows {u8 windowblock, u8 bitmaplength, 0-32u8 bitmap},
1259 * block is 0-255 upper octet of types, length if 0-32. */
1260 for(block
= 0; block
<= (int)maxtype
/256; block
++) {
1261 int i
, blocklen
= 0;
1262 if(!window_in_use
[block
])
1264 for(i
=0; i
<32; i
++) {
1265 if(typebits
[block
*32+i
] != 0)
1269 continue; /* empty window should have been !in_use */
1270 if(used
+blocklen
+2 > *len
)
1271 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1272 rd
[used
+0] = (uint8_t)block
;
1273 rd
[used
+1] = (uint8_t)blocklen
;
1274 for(i
=0; i
<blocklen
; i
++) {
1275 rd
[used
+2+i
] = typebits
[block
*32+i
];
1280 return LDNS_WIREPARSE_ERR_OK
;
1283 int sldns_str2wire_type_buf(const char* str
, uint8_t* rd
, size_t* len
)
1285 uint16_t t
= sldns_get_rr_type_by_name(str
);
1286 if(t
== 0 && strcmp(str
, "TYPE0") != 0)
1287 return LDNS_WIREPARSE_ERR_SYNTAX_TYPE
;
1289 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1290 sldns_write_uint16(rd
, t
);
1292 return LDNS_WIREPARSE_ERR_OK
;
1295 int sldns_str2wire_class_buf(const char* str
, uint8_t* rd
, size_t* len
)
1297 uint16_t c
= sldns_get_rr_class_by_name(str
);
1298 if(c
== 0 && strcmp(str
, "CLASS0") != 0)
1299 return LDNS_WIREPARSE_ERR_SYNTAX_CLASS
;
1301 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1302 sldns_write_uint16(rd
, c
);
1304 return LDNS_WIREPARSE_ERR_OK
;
1307 /* An certificate alg field can either be specified as a 8 bits number
1308 * or by its symbolic name. Handle both */
1309 int sldns_str2wire_cert_alg_buf(const char* str
, uint8_t* rd
, size_t* len
)
1311 sldns_lookup_table
*lt
= sldns_lookup_by_name(sldns_cert_algorithms
,
1314 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1316 sldns_write_uint16(rd
, (uint16_t)lt
->id
);
1318 int s
= sldns_str2wire_int16_buf(str
, rd
, len
);
1320 if(sldns_read_uint16(rd
) == 0)
1321 return LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM
;
1324 return LDNS_WIREPARSE_ERR_OK
;
1327 /* An alg field can either be specified as a 8 bits number
1328 * or by its symbolic name. Handle both */
1329 int sldns_str2wire_alg_buf(const char* str
, uint8_t* rd
, size_t* len
)
1331 sldns_lookup_table
*lt
= sldns_lookup_by_name(sldns_algorithms
, str
);
1333 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1335 rd
[0] = (uint8_t)lt
->id
;
1338 /* try as-is (a number) */
1339 return sldns_str2wire_int8_buf(str
, rd
, len
);
1341 return LDNS_WIREPARSE_ERR_OK
;
1344 int sldns_str2wire_time_buf(const char* str
, uint8_t* rd
, size_t* len
)
1346 /* convert a time YYYYDDMMHHMMSS to wireformat */
1349 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1351 /* Try to scan the time... */
1352 memset(&tm
, 0, sizeof(tm
));
1353 if (strlen(str
) == 14 && sscanf(str
, "%4d%2d%2d%2d%2d%2d",
1354 &tm
.tm_year
, &tm
.tm_mon
, &tm
.tm_mday
, &tm
.tm_hour
,
1355 &tm
.tm_min
, &tm
.tm_sec
) == 6) {
1359 if (tm
.tm_year
< 70)
1360 return LDNS_WIREPARSE_ERR_SYNTAX_TIME
;
1361 if (tm
.tm_mon
< 0 || tm
.tm_mon
> 11)
1362 return LDNS_WIREPARSE_ERR_SYNTAX_TIME
;
1363 if (tm
.tm_mday
< 1 || tm
.tm_mday
> 31)
1364 return LDNS_WIREPARSE_ERR_SYNTAX_TIME
;
1365 if (tm
.tm_hour
< 0 || tm
.tm_hour
> 23)
1366 return LDNS_WIREPARSE_ERR_SYNTAX_TIME
;
1367 if (tm
.tm_min
< 0 || tm
.tm_min
> 59)
1368 return LDNS_WIREPARSE_ERR_SYNTAX_TIME
;
1369 if (tm
.tm_sec
< 0 || tm
.tm_sec
> 59)
1370 return LDNS_WIREPARSE_ERR_SYNTAX_TIME
;
1372 sldns_write_uint32(rd
, sldns_mktime_from_utc(&tm
));
1374 /* handle it as 32 bits timestamp */
1376 uint32_t l
= (uint32_t)strtol((char*)str
, &end
, 10);
1378 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME
,
1380 sldns_write_uint32(rd
, l
);
1383 return LDNS_WIREPARSE_ERR_OK
;
1386 int sldns_str2wire_period_buf(const char* str
, uint8_t* rd
, size_t* len
)
1389 uint32_t p
= sldns_str2period(str
, &end
);
1391 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_PERIOD
, end
-str
);
1393 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1394 sldns_write_uint32(rd
, p
);
1396 return LDNS_WIREPARSE_ERR_OK
;
1399 /** read "<digits>[.<digits>][mM]" into mantissa exponent format for LOC type */
1401 loc_parse_cm(char* my_str
, char** endstr
, uint8_t* m
, uint8_t* e
)
1403 uint32_t meters
= 0, cm
= 0, val
;
1404 while (isblank((unsigned char)*my_str
)) {
1407 meters
= (uint32_t)strtol(my_str
, &my_str
, 10);
1408 if (*my_str
== '.') {
1410 cm
= (uint32_t)strtol(my_str
, &my_str
, 10);
1427 if (*my_str
== 'm' || *my_str
== 'M') {
1434 int sldns_str2wire_loc_buf(const char* str
, uint8_t* rd
, size_t* len
)
1436 uint32_t latitude
= 0;
1437 uint32_t longitude
= 0;
1438 uint32_t altitude
= 0;
1440 uint32_t equator
= (uint32_t)1<<31; /* 2**31 */
1442 /* only support version 0 */
1445 uint8_t size_b
= 1, size_e
= 2;
1446 uint8_t horiz_pre_b
= 1, horiz_pre_e
= 6;
1447 uint8_t vert_pre_b
= 1, vert_pre_e
= 3;
1453 char *my_str
= (char *) str
;
1455 if (isdigit((unsigned char) *my_str
)) {
1456 h
= (uint32_t) strtol(my_str
, &my_str
, 10);
1458 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1461 while (isblank((unsigned char) *my_str
)) {
1465 if (isdigit((unsigned char) *my_str
)) {
1466 m
= (uint32_t) strtol(my_str
, &my_str
, 10);
1467 } else if (*my_str
== 'N' || *my_str
== 'S') {
1470 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1473 while (isblank((unsigned char) *my_str
)) {
1477 if (isdigit((unsigned char) *my_str
)) {
1478 s
= strtod(my_str
, &my_str
);
1481 /* skip blanks before norterness */
1482 while (isblank((unsigned char) *my_str
)) {
1487 if (*my_str
== 'N') {
1489 } else if (*my_str
== 'S') {
1492 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1499 /* add a little to make floor in conversion a round */
1501 latitude
= (uint32_t) s
;
1502 latitude
+= 1000 * 60 * m
;
1503 latitude
+= 1000 * 60 * 60 * h
;
1505 latitude
= equator
+ latitude
;
1507 latitude
= equator
- latitude
;
1509 while (isblank((unsigned char)*my_str
)) {
1513 if (isdigit((unsigned char) *my_str
)) {
1514 h
= (uint32_t) strtol(my_str
, &my_str
, 10);
1516 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1519 while (isblank((unsigned char) *my_str
)) {
1523 if (isdigit((unsigned char) *my_str
)) {
1524 m
= (uint32_t) strtol(my_str
, &my_str
, 10);
1525 } else if (*my_str
== 'E' || *my_str
== 'W') {
1528 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1531 while (isblank((unsigned char)*my_str
)) {
1535 if (isdigit((unsigned char) *my_str
)) {
1536 s
= strtod(my_str
, &my_str
);
1539 /* skip blanks before easterness */
1540 while (isblank((unsigned char)*my_str
)) {
1545 if (*my_str
== 'E') {
1547 } else if (*my_str
== 'W') {
1550 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1557 /* add a little to make floor in conversion a round */
1559 longitude
= (uint32_t) s
;
1560 longitude
+= 1000 * 60 * m
;
1561 longitude
+= 1000 * 60 * 60 * h
;
1564 longitude
+= equator
;
1566 longitude
= equator
- longitude
;
1569 altitude
= (uint32_t)(strtod(my_str
, &my_str
)*100.0 +
1571 if (*my_str
== 'm' || *my_str
== 'M') {
1575 if (strlen(my_str
) > 0) {
1576 if(!loc_parse_cm(my_str
, &my_str
, &size_b
, &size_e
))
1577 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1580 if (strlen(my_str
) > 0) {
1581 if(!loc_parse_cm(my_str
, &my_str
, &horiz_pre_b
, &horiz_pre_e
))
1582 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1585 if (strlen(my_str
) > 0) {
1586 if(!loc_parse_cm(my_str
, &my_str
, &vert_pre_b
, &vert_pre_e
))
1587 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1591 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1593 rd
[1] = ((size_b
<< 4) & 0xf0) | (size_e
& 0x0f);
1594 rd
[2] = ((horiz_pre_b
<< 4) & 0xf0) | (horiz_pre_e
& 0x0f);
1595 rd
[3] = ((vert_pre_b
<< 4) & 0xf0) | (vert_pre_e
& 0x0f);
1596 sldns_write_uint32(rd
+ 4, latitude
);
1597 sldns_write_uint32(rd
+ 8, longitude
);
1598 sldns_write_uint32(rd
+ 12, altitude
);
1600 return LDNS_WIREPARSE_ERR_OK
;
1604 ldns_tolower_str(char* s
)
1608 *s
= (char)tolower((unsigned char)*s
);
1614 int sldns_str2wire_wks_buf(const char* str
, uint8_t* rd
, size_t* len
)
1618 char token
[50], proto_str
[50];
1619 sldns_buffer strbuf
;
1620 sldns_buffer_init_frm_data(&strbuf
, (uint8_t*)str
, strlen(str
));
1623 /* check we have one byte for proto */
1625 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1627 while(sldns_bget_token(&strbuf
, token
, "\t\n ", sizeof(token
)) > 0) {
1628 ldns_tolower_str(token
);
1630 struct protoent
*p
= getprotobyname(token
);
1632 if(p
) rd
[0] = (uint8_t)p
->p_proto
;
1633 else rd
[0] = (uint8_t)atoi(token
);
1634 (void)strlcpy(proto_str
, token
, sizeof(proto_str
));
1637 struct servent
*serv
= getservbyname(token
, proto_str
);
1638 if(serv
) serv_port
=(int)ntohs((uint16_t)serv
->s_port
);
1640 serv_port
= atoi(token
);
1641 if(serv_port
== 0 && strcmp(token
, "0") != 0) {
1642 #ifdef HAVE_ENDSERVENT
1645 #ifdef HAVE_ENDPROTOENT
1648 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX
,
1649 sldns_buffer_position(&strbuf
));
1651 if(serv_port
< 0 || serv_port
> 65535) {
1652 #ifdef HAVE_ENDSERVENT
1655 #ifdef HAVE_ENDPROTOENT
1658 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX
,
1659 sldns_buffer_position(&strbuf
));
1662 if(rd_len
< 1+serv_port
/8+1) {
1663 /* bitmap is larger, init new bytes at 0 */
1664 if(*len
< 1+(size_t)serv_port
/8+1) {
1665 #ifdef HAVE_ENDSERVENT
1668 #ifdef HAVE_ENDPROTOENT
1672 LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
1673 sldns_buffer_position(&strbuf
));
1675 memset(rd
+rd_len
, 0, 1+(size_t)serv_port
/8+1-rd_len
);
1676 rd_len
= 1+serv_port
/8+1;
1678 rd
[1+ serv_port
/8] |= (1 << (7 - serv_port
% 8));
1681 *len
= (size_t)rd_len
;
1683 #ifdef HAVE_ENDSERVENT
1686 #ifdef HAVE_ENDPROTOENT
1689 return LDNS_WIREPARSE_ERR_OK
;
1692 int sldns_str2wire_nsap_buf(const char* str
, uint8_t* rd
, size_t* len
)
1694 const char* s
= str
;
1696 size_t dlen
= 0; /* number of hexdigits parsed */
1698 /* just a hex string with optional dots? */
1699 if (s
[0] != '0' || s
[1] != 'x')
1700 return LDNS_WIREPARSE_ERR_INVALID_STR
;
1703 if(slen
> LDNS_MAX_RDFLEN
*2)
1704 return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
;
1706 if(isspace((unsigned char)*s
) || *s
== '.') {
1710 if(!isxdigit((unsigned char)*s
))
1711 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, s
-str
);
1712 if(*len
< dlen
/2 + 1)
1713 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
1716 rd
[dlen
/2] = (uint8_t)sldns_hexdigit_to_int(*s
++) * 16;
1717 else rd
[dlen
/2] += sldns_hexdigit_to_int(*s
++);
1721 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, s
-str
);
1723 return LDNS_WIREPARSE_ERR_OK
;
1726 int sldns_str2wire_atma_buf(const char* str
, uint8_t* rd
, size_t* len
)
1728 const char* s
= str
;
1729 size_t slen
= strlen(str
);
1730 size_t dlen
= 0; /* number of hexdigits parsed */
1732 /* just a hex string with optional dots? */
1733 /* notimpl e.164 format */
1734 if(slen
> LDNS_MAX_RDFLEN
*2)
1735 return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
;
1737 if(isspace((unsigned char)*s
) || *s
== '.') {
1741 if(!isxdigit((unsigned char)*s
))
1742 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, s
-str
);
1743 if(*len
< dlen
/2 + 1)
1744 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
1747 rd
[dlen
/2] = (uint8_t)sldns_hexdigit_to_int(*s
++) * 16;
1748 else rd
[dlen
/2] += sldns_hexdigit_to_int(*s
++);
1752 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, s
-str
);
1754 return LDNS_WIREPARSE_ERR_OK
;
1757 int sldns_str2wire_ipseckey_buf(const char* str
, uint8_t* rd
, size_t* len
)
1759 size_t gwlen
= 0, keylen
= 0;
1763 sldns_buffer strbuf
;
1764 sldns_buffer_init_frm_data(&strbuf
, (uint8_t*)str
, strlen(str
));
1767 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1769 if(sldns_bget_token(&strbuf
, token
, "\t\n ", sizeof(token
)) <= 0)
1770 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
,
1771 sldns_buffer_position(&strbuf
));
1772 rd
[0] = (uint8_t)atoi(token
);
1774 if(sldns_bget_token(&strbuf
, token
, "\t\n ", sizeof(token
)) <= 0)
1775 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
,
1776 sldns_buffer_position(&strbuf
));
1777 rd
[1] = (uint8_t)atoi(token
);
1780 if(sldns_bget_token(&strbuf
, token
, "\t\n ", sizeof(token
)) <= 0)
1781 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
,
1782 sldns_buffer_position(&strbuf
));
1783 rd
[2] = (uint8_t)atoi(token
);
1786 if(sldns_bget_token(&strbuf
, token
, "\t\n ", sizeof(token
)) <= 0)
1787 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
,
1788 sldns_buffer_position(&strbuf
));
1791 if(strcmp(token
, ".") != 0)
1792 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
,
1793 sldns_buffer_position(&strbuf
));
1795 } else if(gwtype
== 1) {
1798 s
= sldns_str2wire_a_buf(token
, rd
+3, &gwlen
);
1799 if(s
) return RET_ERR_SHIFT(s
, sldns_buffer_position(&strbuf
));
1800 } else if(gwtype
== 2) {
1803 s
= sldns_str2wire_aaaa_buf(token
, rd
+3, &gwlen
);
1804 if(s
) return RET_ERR_SHIFT(s
, sldns_buffer_position(&strbuf
));
1805 } else if(gwtype
== 3) {
1808 s
= sldns_str2wire_dname_buf(token
, rd
+3, &gwlen
);
1809 if(s
) return RET_ERR_SHIFT(s
, sldns_buffer_position(&strbuf
));
1811 /* unknown gateway type */
1812 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR
,
1813 sldns_buffer_position(&strbuf
));
1815 /* double check for size */
1816 if(*len
< 3 + gwlen
)
1817 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
,
1818 sldns_buffer_position(&strbuf
));
1820 /* publickey in remainder of strbuf */
1821 keylen
= *len
- 3 - gwlen
;
1822 s
= sldns_str2wire_b64_buf((const char*)sldns_buffer_current(&strbuf
),
1823 rd
+3+gwlen
, &keylen
);
1824 if(s
) return RET_ERR_SHIFT(s
, sldns_buffer_position(&strbuf
));
1826 *len
= 3 + gwlen
+ keylen
;
1827 return LDNS_WIREPARSE_ERR_OK
;
1830 int sldns_str2wire_nsec3_salt_buf(const char* str
, uint8_t* rd
, size_t* len
)
1832 int i
, salt_length_str
= (int)strlen(str
);
1833 if (salt_length_str
== 1 && str
[0] == '-') {
1834 salt_length_str
= 0;
1835 } else if (salt_length_str
% 2 != 0) {
1836 return LDNS_WIREPARSE_ERR_SYNTAX_HEX
;
1838 if (salt_length_str
> 512)
1839 return LDNS_WIREPARSE_ERR_SYNTAX_HEX
;
1840 if(*len
< 1+(size_t)salt_length_str
/ 2)
1841 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1842 rd
[0] = (uint8_t) (salt_length_str
/ 2);
1843 for (i
= 0; i
< salt_length_str
; i
+= 2) {
1844 if (isxdigit((unsigned char)str
[i
]) &&
1845 isxdigit((unsigned char)str
[i
+1])) {
1846 rd
[1+i
/2] = (uint8_t)(sldns_hexdigit_to_int(str
[i
])*16
1847 + sldns_hexdigit_to_int(str
[i
+1]));
1849 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX
, i
);
1852 *len
= 1 + (size_t)rd
[0];
1853 return LDNS_WIREPARSE_ERR_OK
;
1856 int sldns_str2wire_ilnp64_buf(const char* str
, uint8_t* rd
, size_t* len
)
1858 unsigned int a
, b
, c
, d
;
1861 if(*len
< sizeof(shorts
))
1862 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1864 if (sscanf(str
, "%4x:%4x:%4x:%4x%n", &a
, &b
, &c
, &d
, &l
) != 4 ||
1865 l
!= (int)strlen(str
) || /* more data to read */
1866 strpbrk(str
, "+-") /* signed hexes */
1868 return LDNS_WIREPARSE_ERR_SYNTAX_ILNP64
;
1869 shorts
[0] = htons(a
);
1870 shorts
[1] = htons(b
);
1871 shorts
[2] = htons(c
);
1872 shorts
[3] = htons(d
);
1873 memmove(rd
, &shorts
, sizeof(shorts
));
1874 *len
= sizeof(shorts
);
1875 return LDNS_WIREPARSE_ERR_OK
;
1878 int sldns_str2wire_eui48_buf(const char* str
, uint8_t* rd
, size_t* len
)
1880 unsigned int a
, b
, c
, d
, e
, f
;
1884 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1885 if (sscanf(str
, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1886 &a
, &b
, &c
, &d
, &e
, &f
, &l
) != 6 ||
1887 l
!= (int)strlen(str
))
1888 return LDNS_WIREPARSE_ERR_SYNTAX_EUI48
;
1896 return LDNS_WIREPARSE_ERR_OK
;
1899 int sldns_str2wire_eui64_buf(const char* str
, uint8_t* rd
, size_t* len
)
1901 unsigned int a
, b
, c
, d
, e
, f
, g
, h
;
1905 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1906 if (sscanf(str
, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
1907 &a
, &b
, &c
, &d
, &e
, &f
, &g
, &h
, &l
) != 8 ||
1908 l
!= (int)strlen(str
))
1909 return LDNS_WIREPARSE_ERR_SYNTAX_EUI64
;
1919 return LDNS_WIREPARSE_ERR_OK
;
1922 int sldns_str2wire_tag_buf(const char* str
, uint8_t* rd
, size_t* len
)
1924 size_t slen
= strlen(str
);
1928 return LDNS_WIREPARSE_ERR_SYNTAX_TAG
;
1930 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1931 for (ptr
= str
; *ptr
; ptr
++) {
1932 if(!isalnum((unsigned char)*ptr
))
1933 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TAG
, ptr
-str
);
1936 memmove(rd
+1, str
, slen
);
1938 return LDNS_WIREPARSE_ERR_OK
;
1941 int sldns_str2wire_long_str_buf(const char* str
, uint8_t* rd
, size_t* len
)
1944 const char* pstr
= str
;
1947 /* Fill data with parsed bytes */
1948 while (sldns_parse_char(&ch
, &pstr
)) {
1950 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1954 return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE
;
1956 return LDNS_WIREPARSE_ERR_OK
;
1959 int sldns_str2wire_hip_buf(const char* str
, uint8_t* rd
, size_t* len
)
1963 size_t hitlen
, pklen
= 0;
1964 /* presentation format:
1965 * pk-algo HIThex pubkeybase64
1967 * hitlen[1byte] pkalgo[1byte] pubkeylen[2byte] [hit] [pubkey] */
1969 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
1971 /* read PK algorithm */
1972 rd
[1] = (uint8_t)strtol((char*)str
, &s
, 10);
1974 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT
, s
-(char*)str
);
1979 /* read HIT hex tag */
1980 /* zero terminate the tag (replace later) */
1981 end
= strchr(s
, ' ');
1982 if(!end
) return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX
, s
-(char*)str
);
1985 if((e
= sldns_str2wire_hex_buf(s
, rd
+4, &hitlen
)) != 0) {
1987 return RET_ERR_SHIFT(e
, s
-(char*)str
);
1991 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
, s
-(char*)str
+255*2);
1993 rd
[0] = (uint8_t)hitlen
;
1997 /* read pubkey base64 sequence */
1998 pklen
= *len
- 4 - hitlen
;
1999 if((e
= sldns_str2wire_b64_buf(s
, rd
+4+hitlen
, &pklen
)) != 0)
2000 return RET_ERR_SHIFT(e
, s
-(char*)str
);
2002 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
, s
-(char*)str
+65535);
2003 sldns_write_uint16(rd
+2, pklen
);
2005 *len
= 4 + hitlen
+ pklen
;
2006 return LDNS_WIREPARSE_ERR_OK
;
2009 int sldns_str2wire_int16_data_buf(const char* str
, uint8_t* rd
, size_t* len
)
2011 size_t sz
= sldns_b64_pton_calculate_size(strlen(str
));
2014 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL
;
2016 return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW
;
2017 n
= sldns_b64_pton(str
, rd
+2, (*len
)-2);
2019 return LDNS_WIREPARSE_ERR_SYNTAX_B64
;
2020 sldns_write_uint16(rd
, (uint16_t)n
);
2022 return LDNS_WIREPARSE_ERR_OK
;