]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/unbound/sldns/wire2str.c
MFV r338092: ntp 4.2.8p12.
[FreeBSD/FreeBSD.git] / contrib / unbound / sldns / wire2str.c
1 /*
2  * wire2str.c
3  *
4  * conversion routines from the wire format
5  * to the presentation format (strings)
6  *
7  * (c) NLnet Labs, 2004-2006
8  *
9  * See the file LICENSE for the license
10  */
11 /**
12  * \file
13  *
14  * Contains functions to translate the wireformat to text
15  * representation, as well as functions to print them.
16  */
17 #include "config.h"
18 #include "sldns/wire2str.h"
19 #include "sldns/str2wire.h"
20 #include "sldns/rrdef.h"
21 #include "sldns/pkthdr.h"
22 #include "sldns/parseutil.h"
23 #include "sldns/sbuffer.h"
24 #include "sldns/keyraw.h"
25 #ifdef HAVE_TIME_H
26 #include <time.h>
27 #endif
28 #include <sys/time.h>
29 #include <stdarg.h>
30 #include <ctype.h>
31 #ifdef HAVE_NETDB_H
32 #include <netdb.h>
33 #endif
34
35 /* lookup tables for standard DNS stuff  */
36 /* Taken from RFC 2535, section 7.  */
37 static sldns_lookup_table sldns_algorithms_data[] = {
38         { LDNS_RSAMD5, "RSAMD5" },
39         { LDNS_DH, "DH" },
40         { LDNS_DSA, "DSA" },
41         { LDNS_ECC, "ECC" },
42         { LDNS_RSASHA1, "RSASHA1" },
43         { LDNS_DSA_NSEC3, "DSA-NSEC3-SHA1" },
44         { LDNS_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
45         { LDNS_RSASHA256, "RSASHA256"},
46         { LDNS_RSASHA512, "RSASHA512"},
47         { LDNS_ECC_GOST, "ECC-GOST"},
48         { LDNS_ECDSAP256SHA256, "ECDSAP256SHA256"},
49         { LDNS_ECDSAP384SHA384, "ECDSAP384SHA384"},
50         { LDNS_ED25519, "ED25519"},
51         { LDNS_ED448, "ED448"},
52         { LDNS_INDIRECT, "INDIRECT" },
53         { LDNS_PRIVATEDNS, "PRIVATEDNS" },
54         { LDNS_PRIVATEOID, "PRIVATEOID" },
55         { 0, NULL }
56 };
57 sldns_lookup_table* sldns_algorithms = sldns_algorithms_data;
58
59 /* hash algorithms in DS record */
60 static sldns_lookup_table sldns_hashes_data[] = {
61         { LDNS_SHA1, "SHA1" },
62         { LDNS_SHA256, "SHA256" },
63         { LDNS_HASH_GOST, "HASH-GOST" },
64         { LDNS_SHA384, "SHA384" },
65         { 0, NULL }
66 };
67 sldns_lookup_table* sldns_hashes = sldns_hashes_data;
68
69 /* Taken from RFC 4398  */
70 static sldns_lookup_table sldns_cert_algorithms_data[] = {
71         { LDNS_CERT_PKIX, "PKIX" },
72         { LDNS_CERT_SPKI, "SPKI" },
73         { LDNS_CERT_PGP, "PGP" },
74         { LDNS_CERT_IPKIX, "IPKIX" },
75         { LDNS_CERT_ISPKI, "ISPKI" },
76         { LDNS_CERT_IPGP, "IPGP" },
77         { LDNS_CERT_ACPKIX, "ACPKIX" },
78         { LDNS_CERT_IACPKIX, "IACPKIX" },
79         { LDNS_CERT_URI, "URI" },
80         { LDNS_CERT_OID, "OID" },
81         { 0, NULL }
82 };
83 sldns_lookup_table* sldns_cert_algorithms = sldns_cert_algorithms_data;
84
85 /* if these are used elsewhere */
86 static sldns_lookup_table sldns_rcodes_data[] = {
87         { LDNS_RCODE_NOERROR, "NOERROR" },
88         { LDNS_RCODE_FORMERR, "FORMERR" },
89         { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
90         { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
91         { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
92         { LDNS_RCODE_REFUSED, "REFUSED" },
93         { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
94         { LDNS_RCODE_YXRRSET, "YXRRSET" },
95         { LDNS_RCODE_NXRRSET, "NXRRSET" },
96         { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
97         { LDNS_RCODE_NOTZONE, "NOTZONE" },
98         { 0, NULL }
99 };
100 sldns_lookup_table* sldns_rcodes = sldns_rcodes_data;
101
102 static sldns_lookup_table sldns_opcodes_data[] = {
103         { LDNS_PACKET_QUERY, "QUERY" },
104         { LDNS_PACKET_IQUERY, "IQUERY" },
105         { LDNS_PACKET_STATUS, "STATUS" },
106         { LDNS_PACKET_NOTIFY, "NOTIFY" },
107         { LDNS_PACKET_UPDATE, "UPDATE" },
108         { 0, NULL }
109 };
110 sldns_lookup_table* sldns_opcodes = sldns_opcodes_data;
111
112 static sldns_lookup_table sldns_wireparse_errors_data[] = {
113         { LDNS_WIREPARSE_ERR_OK, "no parse error" },
114         { LDNS_WIREPARSE_ERR_GENERAL, "parse error" },
115         { LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, "Domainname length overflow" },
116         { LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, "Domainname length underflow (zero length)" },
117         { LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, "buffer too small" },
118         { LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, "Label length overflow" },
119         { LDNS_WIREPARSE_ERR_EMPTY_LABEL, "Empty label" },
120         { LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, "Syntax error, bad escape sequence" },
121         { LDNS_WIREPARSE_ERR_SYNTAX, "Syntax error, could not parse the RR" },
122         { LDNS_WIREPARSE_ERR_SYNTAX_TTL, "Syntax error, could not parse the RR's TTL" },
123         { LDNS_WIREPARSE_ERR_SYNTAX_TYPE, "Syntax error, could not parse the RR's type" },
124         { LDNS_WIREPARSE_ERR_SYNTAX_CLASS, "Syntax error, could not parse the RR's class" },
125         { LDNS_WIREPARSE_ERR_SYNTAX_RDATA, "Syntax error, could not parse the RR's rdata" },
126         { LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE, "Syntax error, value expected" },
127         { LDNS_WIREPARSE_ERR_INVALID_STR, "Conversion error, string expected" },
128         { LDNS_WIREPARSE_ERR_SYNTAX_B64, "Conversion error, b64 encoding expected" },
129         { LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT, "Conversion error, b32 ext encoding expected" },
130         { LDNS_WIREPARSE_ERR_SYNTAX_HEX, "Conversion error, hex encoding expected" },
131         { LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM, "Bad algorithm type for CERT record" },
132         { LDNS_WIREPARSE_ERR_SYNTAX_TIME, "Conversion error, time encoding expected" },
133         { LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, "Conversion error, time period encoding expected" },
134         { LDNS_WIREPARSE_ERR_SYNTAX_ILNP64, "Conversion error, 4 colon separated hex numbers expected" },
135         { LDNS_WIREPARSE_ERR_SYNTAX_EUI48,
136                 "Conversion error, 6 two character hex numbers "
137                 "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx" },
138         { LDNS_WIREPARSE_ERR_SYNTAX_EUI64,
139                 "Conversion error, 8 two character hex numbers "
140                 "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx-xx-xx" },
141         { LDNS_WIREPARSE_ERR_SYNTAX_TAG,
142                 "Conversion error, a non-zero sequence of US-ASCII letters "
143                 "and numbers in lower case expected" },
144         { LDNS_WIREPARSE_ERR_NOT_IMPL, "not implemented" },
145         { LDNS_WIREPARSE_ERR_SYNTAX_INT, "Conversion error, integer expected" },
146         { LDNS_WIREPARSE_ERR_SYNTAX_IP4, "Conversion error, ip4 addr expected" },
147         { LDNS_WIREPARSE_ERR_SYNTAX_IP6, "Conversion error, ip6 addr expected" },
148         { LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW, "Syntax error, integer overflow" },
149         { LDNS_WIREPARSE_ERR_INCLUDE, "$INCLUDE directive was seen in the zone" },
150         { LDNS_WIREPARSE_ERR_PARENTHESIS, "Parse error, parenthesis mismatch" },
151         { 0, NULL }
152 };
153 sldns_lookup_table* sldns_wireparse_errors = sldns_wireparse_errors_data;
154
155 static sldns_lookup_table sldns_edns_flags_data[] = {
156         { 3600, "do"},
157         { 0, NULL}
158 };
159 sldns_lookup_table* sldns_edns_flags = sldns_edns_flags_data;
160
161 static sldns_lookup_table sldns_edns_options_data[] = {
162         { 1, "LLQ" },
163         { 2, "UL" },
164         { 3, "NSID" },
165         /* 4 draft-cheshire-edns0-owner-option */
166         { 5, "DAU" },
167         { 6, "DHU" },
168         { 7, "N3U" },
169         { 8, "edns-client-subnet" },
170         { 11, "edns-tcp-keepalive"},
171         { 12, "Padding" },
172         { 0, NULL}
173 };
174 sldns_lookup_table* sldns_edns_options = sldns_edns_options_data;
175
176 static sldns_lookup_table sldns_tsig_errors_data[] = {
177         { LDNS_TSIG_ERROR_NOERROR, "NOERROR" },
178         { LDNS_RCODE_FORMERR, "FORMERR" },
179         { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
180         { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
181         { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
182         { LDNS_RCODE_REFUSED, "REFUSED" },
183         { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
184         { LDNS_RCODE_YXRRSET, "YXRRSET" },
185         { LDNS_RCODE_NXRRSET, "NXRRSET" },
186         { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
187         { LDNS_RCODE_NOTZONE, "NOTZONE" },
188         { LDNS_TSIG_ERROR_BADSIG, "BADSIG" },
189         { LDNS_TSIG_ERROR_BADKEY, "BADKEY" },
190         { LDNS_TSIG_ERROR_BADTIME, "BADTIME" },
191         { LDNS_TSIG_ERROR_BADMODE, "BADMODE" },
192         { LDNS_TSIG_ERROR_BADNAME, "BADNAME" },
193         { LDNS_TSIG_ERROR_BADALG, "BADALG" },
194         { 0, NULL }
195 };
196 sldns_lookup_table* sldns_tsig_errors = sldns_tsig_errors_data;
197
198 char* sldns_wire2str_pkt(uint8_t* data, size_t len)
199 {
200         size_t slen = (size_t)sldns_wire2str_pkt_buf(data, len, NULL, 0);
201         char* result = (char*)malloc(slen+1);
202         if(!result) return NULL;
203         sldns_wire2str_pkt_buf(data, len, result, slen+1);
204         return result;
205 }
206
207 char* sldns_wire2str_rr(uint8_t* rr, size_t len)
208 {
209         size_t slen = (size_t)sldns_wire2str_rr_buf(rr, len, NULL, 0);
210         char* result = (char*)malloc(slen+1);
211         if(!result) return NULL;
212         sldns_wire2str_rr_buf(rr, len, result, slen+1);
213         return result;
214 }
215
216 char* sldns_wire2str_type(uint16_t rrtype)
217 {
218         char buf[16];
219         sldns_wire2str_type_buf(rrtype, buf, sizeof(buf));
220         return strdup(buf);
221 }
222
223 char* sldns_wire2str_class(uint16_t rrclass)
224 {
225         char buf[16];
226         sldns_wire2str_class_buf(rrclass, buf, sizeof(buf));
227         return strdup(buf);
228 }
229
230 char* sldns_wire2str_dname(uint8_t* dname, size_t dname_len)
231 {
232         size_t slen=(size_t)sldns_wire2str_dname_buf(dname, dname_len, NULL, 0);
233         char* result = (char*)malloc(slen+1);
234         if(!result) return NULL;
235         sldns_wire2str_dname_buf(dname, dname_len, result, slen+1);
236         return result;
237 }
238
239 char* sldns_wire2str_rcode(int rcode)
240 {
241         char buf[16];
242         sldns_wire2str_rcode_buf(rcode, buf, sizeof(buf));
243         return strdup(buf);
244 }
245
246 int sldns_wire2str_pkt_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
247 {
248         /* use arguments as temporary variables */
249         return sldns_wire2str_pkt_scan(&d, &dlen, &s, &slen);
250 }
251
252 int sldns_wire2str_rr_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
253 {
254         /* use arguments as temporary variables */
255         return sldns_wire2str_rr_scan(&d, &dlen, &s, &slen, NULL, 0);
256 }
257
258 int sldns_wire2str_rrquestion_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
259 {
260         /* use arguments as temporary variables */
261         return sldns_wire2str_rrquestion_scan(&d, &dlen, &s, &slen, NULL, 0);
262 }
263
264 int sldns_wire2str_rdata_buf(uint8_t* rdata, size_t rdata_len, char* str,
265         size_t str_len, uint16_t rrtype)
266 {
267         /* use arguments as temporary variables */
268         return sldns_wire2str_rdata_scan(&rdata, &rdata_len, &str, &str_len,
269                 rrtype, NULL, 0);
270 }
271
272 int sldns_wire2str_rr_unknown_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
273 {
274         /* use arguments as temporary variables */
275         return sldns_wire2str_rr_unknown_scan(&d, &dlen, &s, &slen, NULL, 0);
276 }
277
278 int sldns_wire2str_rr_comment_buf(uint8_t* rr, size_t rrlen, size_t dname_len,
279         char* s, size_t slen)
280 {
281         uint16_t rrtype = sldns_wirerr_get_type(rr, rrlen, dname_len);
282         return sldns_wire2str_rr_comment_print(&s, &slen, rr, rrlen, dname_len,
283                 rrtype);
284 }
285
286 int sldns_wire2str_type_buf(uint16_t rrtype, char* s, size_t slen)
287 {
288         /* use arguments as temporary variables */
289         return sldns_wire2str_type_print(&s, &slen, rrtype);
290 }
291
292 int sldns_wire2str_class_buf(uint16_t rrclass, char* s, size_t slen)
293 {
294         /* use arguments as temporary variables */
295         return sldns_wire2str_class_print(&s, &slen, rrclass);
296 }
297
298 int sldns_wire2str_rcode_buf(int rcode, char* s, size_t slen)
299 {
300         /* use arguments as temporary variables */
301         return sldns_wire2str_rcode_print(&s, &slen, rcode);
302 }
303
304 int sldns_wire2str_opcode_buf(int opcode, char* s, size_t slen)
305 {
306         /* use arguments as temporary variables */
307         return sldns_wire2str_opcode_print(&s, &slen, opcode);
308 }
309
310 int sldns_wire2str_dname_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
311 {
312         /* use arguments as temporary variables */
313         return sldns_wire2str_dname_scan(&d, &dlen, &s, &slen, NULL, 0);
314 }
315
316 int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args)
317 {
318         int w = vsnprintf(*str, *slen, format, args);
319         if(w < 0) {
320                 /* error in printout */
321                 return 0;
322         } else if((size_t)w >= *slen) {
323                 *str = NULL; /* we do not want str to point outside of buffer*/
324                 *slen = 0;
325         } else {
326                 *str += w;
327                 *slen -= w;
328         }
329         return w;
330 }
331
332 int sldns_str_print(char** str, size_t* slen, const char* format, ...)
333 {
334         int w;
335         va_list args;
336         va_start(args, format);
337         w = sldns_str_vprint(str, slen, format, args);
338         va_end(args);
339         return w;
340 }
341
342 /** print hex format into text buffer for specified length */
343 static int print_hex_buf(char** s, size_t* slen, uint8_t* buf, size_t len)
344 {
345         const char* hex = "0123456789ABCDEF";
346         size_t i;
347         for(i=0; i<len; i++) {
348                 (void)sldns_str_print(s, slen, "%c%c", hex[(buf[i]&0xf0)>>4],
349                         hex[buf[i]&0x0f]);
350         }
351         return (int)len*2;
352 }
353
354 /** print remainder of buffer in hex format with prefixed text */
355 static int print_remainder_hex(const char* pref, uint8_t** d, size_t* dlen,
356         char** s, size_t* slen)
357 {
358         int w = 0;
359         w += sldns_str_print(s, slen, "%s", pref);
360         w += print_hex_buf(s, slen, *d, *dlen);
361         *d += *dlen;
362         *dlen = 0;
363         return w;
364 }
365
366 int sldns_wire2str_pkt_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
367 {
368         int w = 0;
369         unsigned qdcount, ancount, nscount, arcount, i;
370         uint8_t* pkt = *d;
371         size_t pktlen = *dlen;
372         if(*dlen >= LDNS_HEADER_SIZE) {
373                 qdcount = (unsigned)LDNS_QDCOUNT(*d);
374                 ancount = (unsigned)LDNS_ANCOUNT(*d);
375                 nscount = (unsigned)LDNS_NSCOUNT(*d);
376                 arcount = (unsigned)LDNS_ARCOUNT(*d);
377         } else {
378                 qdcount = ancount = nscount = arcount = 0;
379         }
380         w += sldns_wire2str_header_scan(d, dlen, s, slen);
381         w += sldns_str_print(s, slen, "\n");
382         w += sldns_str_print(s, slen, ";; QUESTION SECTION:\n");
383         for(i=0; i<qdcount; i++) {
384                 w += sldns_wire2str_rrquestion_scan(d, dlen, s, slen,
385                         pkt, pktlen);
386                 if(!*dlen) break;
387         }
388         w += sldns_str_print(s, slen, "\n");
389         w += sldns_str_print(s, slen, ";; ANSWER SECTION:\n");
390         for(i=0; i<ancount; i++) {
391                 w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen);
392                 if(!*dlen) break;
393         }
394         w += sldns_str_print(s, slen, "\n");
395         w += sldns_str_print(s, slen, ";; AUTHORITY SECTION:\n");
396         for(i=0; i<nscount; i++) {
397                 w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen);
398                 if(!*dlen) break;
399         }
400         w += sldns_str_print(s, slen, "\n");
401         w += sldns_str_print(s, slen, ";; ADDITIONAL SECTION:\n");
402         for(i=0; i<arcount; i++) {
403                 w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen);
404                 if(!*dlen) break;
405         }
406         /* other fields: WHEN(time), SERVER(IP) not available here. */
407         w += sldns_str_print(s, slen, ";; MSG SIZE  rcvd: %d\n", (int)pktlen);
408         if(*dlen > 0) {
409                 w += print_remainder_hex(";; trailing garbage 0x",
410                         d, dlen, s, slen);
411                 w += sldns_str_print(s, slen, "\n");
412         }
413         return w;
414 }
415
416 /** scan type, class and ttl and printout, for rr */
417 static int sldns_rr_tcttl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
418 {
419         int w = 0;
420         uint16_t t, c;
421         uint32_t ttl;
422         if(*dl < 8) {
423                 if(*dl < 4)
424                         return w + print_remainder_hex("; Error malformed 0x",
425                                 d, dl, s, sl);
426                 /* these print values or 0x.. if none left */
427                 t = sldns_read_uint16(*d);
428                 c = sldns_read_uint16((*d)+2);
429                 (*d)+=4;
430                 (*dl)-=4;
431                 w += sldns_wire2str_class_print(s, sl, c);
432                 w += sldns_str_print(s, sl, "\t");
433                 w += sldns_wire2str_type_print(s, sl, t);
434                 if(*dl == 0)
435                         return w + sldns_str_print(s, sl, "; Error no ttl");
436                 return w + print_remainder_hex(
437                         "; Error malformed ttl 0x", d, dl, s, sl);
438         }
439         t = sldns_read_uint16(*d);
440         c = sldns_read_uint16((*d)+2);
441         ttl = sldns_read_uint32((*d)+4);
442         (*d)+=8;
443         (*dl)-=8;
444         w += sldns_str_print(s, sl, "%lu\t", (unsigned long)ttl);
445         w += sldns_wire2str_class_print(s, sl, c);
446         w += sldns_str_print(s, sl, "\t");
447         w += sldns_wire2str_type_print(s, sl, t);
448         return w;
449 }
450
451 int sldns_wire2str_rr_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
452         uint8_t* pkt, size_t pktlen)
453 {
454         int w = 0;
455         uint8_t* rr = *d;
456         size_t rrlen = *dlen, dname_off, rdlen, ordlen;
457         uint16_t rrtype = 0;
458         
459         if(*dlen >= 3 && (*d)[0]==0 &&
460                 sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
461                 /* perform EDNS OPT processing */
462                 return sldns_wire2str_edns_scan(d, dlen, s, slen, pkt, pktlen);
463         }
464
465         /* try to scan the rdata with pretty-printing, but if that fails, then
466          * scan the rdata as an unknown RR type */
467         w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
468         w += sldns_str_print(s, slen, "\t");
469         dname_off = rrlen-(*dlen);
470         if(*dlen == 4) {
471                 /* like a question-RR */
472                 uint16_t t = sldns_read_uint16(*d);
473                 uint16_t c = sldns_read_uint16((*d)+2);
474                 (*d)+=4;
475                 (*dlen)-=4;
476                 w += sldns_wire2str_class_print(s, slen, c);
477                 w += sldns_str_print(s, slen, "\t");
478                 w += sldns_wire2str_type_print(s, slen, t);
479                 w += sldns_str_print(s, slen, " ; Error no ttl,rdata\n");
480                 return w;
481         }
482         if(*dlen < 8) {
483                 if(*dlen == 0)
484                         return w + sldns_str_print(s, slen, ";Error missing RR\n");
485                 w += print_remainder_hex(";Error partial RR 0x", d, dlen, s, slen);
486                 return w + sldns_str_print(s, slen, "\n");
487         }
488         rrtype = sldns_read_uint16(*d);
489         w += sldns_rr_tcttl_scan(d, dlen, s, slen);
490         w += sldns_str_print(s, slen, "\t");
491
492         /* rdata */
493         if(*dlen < 2) {
494                 if(*dlen == 0)
495                         return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
496                 w += print_remainder_hex(";Error missing rdatalen 0x",
497                         d, dlen, s, slen);
498                 return w + sldns_str_print(s, slen, "\n");
499         }
500         rdlen = sldns_read_uint16(*d);
501         ordlen = rdlen;
502         (*d)+=2;
503         (*dlen)-=2;
504         if(*dlen < rdlen) {
505                 w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
506                 if(*dlen == 0)
507                         return w + sldns_str_print(s, slen, ";Error missing rdata\n");
508                 w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
509                 return w + sldns_str_print(s, slen, "\n");
510         }
511         w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen);
512         (*dlen) -= (ordlen-rdlen);
513
514         /* default comment */
515         w += sldns_wire2str_rr_comment_print(s, slen, rr, rrlen, dname_off,
516                 rrtype);
517         w += sldns_str_print(s, slen, "\n");
518         return w;
519 }
520
521 int sldns_wire2str_rrquestion_scan(uint8_t** d, size_t* dlen, char** s,
522         size_t* slen, uint8_t* pkt, size_t pktlen)
523 {
524         int w = 0;
525         uint16_t t, c;
526         w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
527         w += sldns_str_print(s, slen, "\t");
528         if(*dlen < 4) {
529                 if(*dlen == 0)
530                         return w + sldns_str_print(s, slen, "Error malformed\n");
531                 w += print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
532                 return w + sldns_str_print(s, slen, "\n");
533         }
534         t = sldns_read_uint16(*d);
535         c = sldns_read_uint16((*d)+2);
536         (*d)+=4;
537         (*dlen)-=4;
538         w += sldns_wire2str_class_print(s, slen, c);
539         w += sldns_str_print(s, slen, "\t");
540         w += sldns_wire2str_type_print(s, slen, t);
541         w += sldns_str_print(s, slen, "\n");
542         return w;
543 }
544
545 int sldns_wire2str_rr_unknown_scan(uint8_t** d, size_t* dlen, char** s,
546         size_t* slen, uint8_t* pkt, size_t pktlen)
547 {
548         size_t rdlen, ordlen;
549         int w = 0;
550         w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
551         w += sldns_str_print(s, slen, "\t");
552         w += sldns_rr_tcttl_scan(d, dlen, s, slen);
553         w += sldns_str_print(s, slen, "\t");
554         if(*dlen < 2) {
555                 if(*dlen == 0)
556                         return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
557                 w += print_remainder_hex(";Error missing rdatalen 0x",
558                         d, dlen, s, slen);
559                 return w + sldns_str_print(s, slen, "\n");
560         }
561         rdlen = sldns_read_uint16(*d);
562         ordlen = rdlen;
563         (*d) += 2;
564         (*dlen) -= 2;
565         if(*dlen < rdlen) {
566                 w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
567                 if(*dlen == 0)
568                         return w + sldns_str_print(s, slen, ";Error missing rdata\n");
569                 w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
570                 return w + sldns_str_print(s, slen, "\n");
571         }
572         w += sldns_wire2str_rdata_unknown_scan(d, &rdlen, s, slen);
573         (*dlen) -= (ordlen-rdlen);
574         w += sldns_str_print(s, slen, "\n");
575         return w;
576 }
577
578 /** print rr comment for type DNSKEY */
579 static int rr_comment_dnskey(char** s, size_t* slen, uint8_t* rr,
580         size_t rrlen, size_t dname_off)
581 {
582         size_t rdlen;
583         uint8_t* rdata;
584         int flags, w = 0;
585         if(rrlen < dname_off + 10) return 0;
586         rdlen = sldns_read_uint16(rr+dname_off+8);
587         if(rrlen < dname_off + 10 + rdlen) return 0;
588         rdata = rr + dname_off + 10;
589         flags = (int)sldns_read_uint16(rdata);
590         w += sldns_str_print(s, slen, " ;{");
591
592         /* id */
593         w += sldns_str_print(s, slen, "id = %u",
594                 sldns_calc_keytag_raw(rdata, rdlen));
595
596         /* flags */
597         if((flags&LDNS_KEY_ZONE_KEY)) {
598                 if((flags&LDNS_KEY_SEP_KEY))
599                         w += sldns_str_print(s, slen, " (ksk)");
600                 else    w += sldns_str_print(s, slen, " (zsk)");
601         }
602
603         /* keysize */
604         if(rdlen > 4) {
605                 w += sldns_str_print(s, slen, ", ");
606                 w += sldns_str_print(s, slen, "size = %db",
607                         (int)sldns_rr_dnskey_key_size_raw(
608                         (unsigned char*)rdata+4, rdlen-4, (int)(rdata[3])));
609         }
610
611         w += sldns_str_print(s, slen, "}");
612         return w;
613 }
614
615 /** print rr comment for type RRSIG */
616 static int rr_comment_rrsig(char** s, size_t* slen, uint8_t* rr,
617         size_t rrlen, size_t dname_off)
618 {
619         size_t rdlen;
620         uint8_t* rdata;
621         if(rrlen < dname_off + 10) return 0;
622         rdlen = sldns_read_uint16(rr+dname_off+8);
623         if(rrlen < dname_off + 10 + rdlen) return 0;
624         rdata = rr + dname_off + 10;
625         if(rdlen < 18) return 0;
626         return sldns_str_print(s, slen, " ;{id = %d}",
627                 (int)sldns_read_uint16(rdata+16));
628 }
629
630 /** print rr comment for type NSEC3 */
631 static int rr_comment_nsec3(char** s, size_t* slen, uint8_t* rr,
632         size_t rrlen, size_t dname_off)
633 {
634         size_t rdlen;
635         uint8_t* rdata;
636         int w = 0;
637         if(rrlen < dname_off + 10) return 0;
638         rdlen = sldns_read_uint16(rr+dname_off+8);
639         if(rrlen < dname_off + 10 + rdlen) return 0;
640         rdata = rr + dname_off + 10;
641         if(rdlen < 2) return 0;
642         if((rdata[1] & LDNS_NSEC3_VARS_OPTOUT_MASK))
643                 w += sldns_str_print(s, slen, " ;{flags: optout}");
644         return w;
645 }
646
647 int sldns_wire2str_rr_comment_print(char** s, size_t* slen, uint8_t* rr,
648         size_t rrlen, size_t dname_off, uint16_t rrtype)
649 {
650         if(rrtype == LDNS_RR_TYPE_DNSKEY) {
651                 return rr_comment_dnskey(s, slen, rr, rrlen, dname_off);
652         } else if(rrtype == LDNS_RR_TYPE_RRSIG) {
653                 return rr_comment_rrsig(s, slen, rr, rrlen, dname_off);
654         } else if(rrtype == LDNS_RR_TYPE_NSEC3) {
655                 return rr_comment_nsec3(s, slen, rr, rrlen, dname_off);
656         }
657         return 0;
658 }
659
660 int sldns_wire2str_header_scan(uint8_t** d, size_t* dlen, char** s,
661         size_t* slen)
662 {
663         int w = 0;
664         int opcode, rcode;
665         w += sldns_str_print(s, slen, ";; ->>HEADER<<- ");
666         if(*dlen == 0)
667                 return w+sldns_str_print(s, slen, "Error empty packet");
668         if(*dlen < 4)
669                 return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
670         opcode = (int)LDNS_OPCODE_WIRE(*d);
671         rcode = (int)LDNS_RCODE_WIRE(*d);
672         w += sldns_str_print(s, slen, "opcode: ");
673         w += sldns_wire2str_opcode_print(s, slen, opcode);
674         w += sldns_str_print(s, slen, ", ");
675         w += sldns_str_print(s, slen, "rcode: ");
676         w += sldns_wire2str_rcode_print(s, slen, rcode);
677         w += sldns_str_print(s, slen, ", ");
678         w += sldns_str_print(s, slen, "id: %d\n", (int)LDNS_ID_WIRE(*d));
679         w += sldns_str_print(s, slen, ";; flags:");
680         if(LDNS_QR_WIRE(*d)) w += sldns_str_print(s, slen, " qr");
681         if(LDNS_AA_WIRE(*d)) w += sldns_str_print(s, slen, " aa");
682         if(LDNS_TC_WIRE(*d)) w += sldns_str_print(s, slen, " tc");
683         if(LDNS_RD_WIRE(*d)) w += sldns_str_print(s, slen, " rd");
684         if(LDNS_CD_WIRE(*d)) w += sldns_str_print(s, slen, " cd");
685         if(LDNS_RA_WIRE(*d)) w += sldns_str_print(s, slen, " ra");
686         if(LDNS_AD_WIRE(*d)) w += sldns_str_print(s, slen, " ad");
687         if(LDNS_Z_WIRE(*d))  w += sldns_str_print(s, slen, " z");
688         w += sldns_str_print(s, slen, " ; ");
689         if(*dlen < LDNS_HEADER_SIZE)
690                 return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
691         w += sldns_str_print(s, slen, "QUERY: %d, ", (int)LDNS_QDCOUNT(*d));
692         w += sldns_str_print(s, slen, "ANSWER: %d, ", (int)LDNS_ANCOUNT(*d));
693         w += sldns_str_print(s, slen, "AUTHORITY: %d, ", (int)LDNS_NSCOUNT(*d));
694         w += sldns_str_print(s, slen, "ADDITIONAL: %d ", (int)LDNS_ARCOUNT(*d));
695         *d += LDNS_HEADER_SIZE;
696         *dlen -= LDNS_HEADER_SIZE;
697         return w;
698 }
699
700 int sldns_wire2str_rdata_scan(uint8_t** d, size_t* dlen, char** s,
701         size_t* slen, uint16_t rrtype, uint8_t* pkt, size_t pktlen)
702 {
703         /* try to prettyprint, but if that fails, use unknown format */
704         uint8_t* origd = *d;
705         char* origs = *s;
706         size_t origdlen = *dlen, origslen = *slen;
707         size_t r_cnt, r_max;
708         sldns_rdf_type rdftype;
709         int w = 0, n;
710
711         const sldns_rr_descriptor *desc = sldns_rr_descript(rrtype);
712         if(!desc) /* unknown format */
713                 return sldns_wire2str_rdata_unknown_scan(d, dlen, s, slen);
714         /* dlen equals the rdatalen for the rdata */
715
716         r_max = sldns_rr_descriptor_maximum(desc);
717         for(r_cnt=0; r_cnt < r_max; r_cnt++) {
718                 if(*dlen == 0) {
719                         if(r_cnt < sldns_rr_descriptor_minimum(desc))
720                                 goto failed;
721                         break; /* nothing more to print */
722                 }
723                 rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
724                 if(r_cnt != 0)
725                         w += sldns_str_print(s, slen, " ");
726                 n = sldns_wire2str_rdf_scan(d, dlen, s, slen, rdftype,
727                         pkt, pktlen);
728                 if(n == -1) {
729                 failed:
730                         /* failed, use unknown format */
731                         *d = origd; *s = origs;
732                         *dlen = origdlen; *slen = origslen;
733                         return sldns_wire2str_rdata_unknown_scan(d, dlen,
734                                 s, slen);
735                 }
736                 w += n;
737         }
738         if(*dlen != 0) {
739                 goto failed;
740         }
741         return w;
742 }
743
744 int sldns_wire2str_rdata_unknown_scan(uint8_t** d, size_t* dlen, char** s,
745         size_t* slen)
746 {
747         int w = 0;
748
749         /* print length */
750         w += sldns_str_print(s, slen, "\\# %u", (unsigned)*dlen);
751
752         /* print rdlen in hex */
753         if(*dlen != 0)
754                 w += sldns_str_print(s, slen, " ");
755         w += print_hex_buf(s, slen, *d, *dlen);
756         (*d) += *dlen;
757         (*dlen) = 0;
758         return w;
759 }
760
761 /** print and escape one character for a domain dname */
762 static int dname_char_print(char** s, size_t* slen, uint8_t c)
763 {
764         if(c == '.' || c == ';' || c == '(' || c == ')' || c == '\\')
765                 return sldns_str_print(s, slen, "\\%c", c);
766         else if(!(isascii((unsigned char)c) && isgraph((unsigned char)c)))
767                 return sldns_str_print(s, slen, "\\%03u", (unsigned)c);
768         /* plain printout */
769         if(*slen) {
770                 **s = (char)c;
771                 (*s)++;
772                 (*slen)--;
773         }
774         return 1;
775 }
776
777 int sldns_wire2str_dname_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
778         uint8_t* pkt, size_t pktlen)
779 {
780         int w = 0;
781         /* spool labels onto the string, use compression if its there */
782         uint8_t* pos = *d;
783         unsigned i, counter=0;
784         const unsigned maxcompr = 1000; /* loop detection, max compr ptrs */
785         int in_buf = 1;
786         if(*dlen == 0) return sldns_str_print(s, slen, "ErrorMissingDname");
787         if(*pos == 0) {
788                 (*d)++;
789                 (*dlen)--;
790                 return sldns_str_print(s, slen, ".");
791         }
792         while(*pos) {
793                 /* read label length */
794                 uint8_t labellen = *pos++;
795                 if(in_buf) { (*d)++; (*dlen)--; }
796
797                 /* find out what sort of label we have */
798                 if((labellen&0xc0) == 0xc0) {
799                         /* compressed */
800                         uint16_t target = 0;
801                         if(in_buf && *dlen == 0)
802                                 return w + sldns_str_print(s, slen,
803                                         "ErrorPartialDname");
804                         else if(!in_buf && pos+1 > pkt+pktlen)
805                                 return w + sldns_str_print(s, slen,
806                                         "ErrorPartialDname");
807                         target = ((labellen&0x3f)<<8) | *pos;
808                         if(in_buf) { (*d)++; (*dlen)--; }
809                         /* move to target, if possible */
810                         if(!pkt || target >= pktlen)
811                                 return w + sldns_str_print(s, slen,
812                                         "ErrorComprPtrOutOfBounds");
813                         if(counter++ > maxcompr)
814                                 return w + sldns_str_print(s, slen,
815                                         "ErrorComprPtrLooped");
816                         in_buf = 0;
817                         pos = pkt+target;
818                         continue;
819                 } else if((labellen&0xc0)) {
820                         /* notimpl label type */
821                         w += sldns_str_print(s, slen,
822                                 "ErrorLABELTYPE%xIsUnknown",
823                                 (int)(labellen&0xc0));
824                         return w;
825                 }
826
827                 /* spool label characters, end with '.' */
828                 if(in_buf && *dlen < (size_t)labellen)
829                         labellen = (uint8_t)*dlen;
830                 else if(!in_buf && pos+(size_t)labellen > pkt+pktlen)
831                         labellen = (uint8_t)(pkt + pktlen - pos);
832                 for(i=0; i<(unsigned)labellen; i++) {
833                         w += dname_char_print(s, slen, *pos++);
834                 }
835                 if(in_buf) {
836                         (*d) += labellen;
837                         (*dlen) -= labellen;
838                         if(*dlen == 0) break;
839                 }
840                 w += sldns_str_print(s, slen, ".");
841         }
842         /* skip over final root label */
843         if(in_buf && *dlen > 0) { (*d)++; (*dlen)--; }
844         /* in case we printed no labels, terminate dname */
845         if(w == 0) w += sldns_str_print(s, slen, ".");
846         return w;
847 }
848
849 int sldns_wire2str_opcode_print(char** s, size_t* slen, int opcode)
850 {
851         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_opcodes, opcode);
852         if (lt && lt->name) {
853                 return sldns_str_print(s, slen, "%s", lt->name);
854         }
855         return sldns_str_print(s, slen, "OPCODE%u", (unsigned)opcode);
856 }
857
858 int sldns_wire2str_rcode_print(char** s, size_t* slen, int rcode)
859 {
860         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rcodes, rcode);
861         if (lt && lt->name) {
862                 return sldns_str_print(s, slen, "%s", lt->name);
863         }
864         return sldns_str_print(s, slen, "RCODE%u", (unsigned)rcode);
865 }
866
867 int sldns_wire2str_class_print(char** s, size_t* slen, uint16_t rrclass)
868 {
869         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rr_classes,
870                 (int)rrclass);
871         if (lt && lt->name) {
872                 return sldns_str_print(s, slen, "%s", lt->name);
873         }
874         return sldns_str_print(s, slen, "CLASS%u", (unsigned)rrclass);
875 }
876
877 int sldns_wire2str_type_print(char** s, size_t* slen, uint16_t rrtype)
878 {
879         const sldns_rr_descriptor *descriptor = sldns_rr_descript(rrtype);
880         if (descriptor && descriptor->_name) {
881                 return sldns_str_print(s, slen, "%s", descriptor->_name);
882         }
883         return sldns_str_print(s, slen, "TYPE%u", (unsigned)rrtype);
884 }
885
886 int sldns_wire2str_edns_option_code_print(char** s, size_t* slen,
887         uint16_t opcode)
888 {
889         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_edns_options,
890                 (int)opcode);
891         if (lt && lt->name) {
892                 return sldns_str_print(s, slen, "%s", lt->name);
893         }
894         return sldns_str_print(s, slen, "OPT%u", (unsigned)opcode);
895 }
896
897 int sldns_wire2str_class_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
898 {
899         uint16_t c;
900         if(*dlen == 0) return 0;
901         if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
902         c = sldns_read_uint16(*d);
903         (*d)+=2;
904         (*dlen)-=2;
905         return sldns_wire2str_class_print(s, slen, c);
906 }
907
908 int sldns_wire2str_type_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
909 {
910         uint16_t t;
911         if(*dlen == 0) return 0;
912         if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
913         t = sldns_read_uint16(*d);
914         (*d)+=2;
915         (*dlen)-=2;
916         return sldns_wire2str_type_print(s, slen, t);
917 }
918
919 int sldns_wire2str_ttl_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
920 {
921         uint32_t ttl;
922         if(*dlen == 0) return 0;
923         if(*dlen < 4) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
924         ttl = sldns_read_uint32(*d);
925         (*d)+=4;
926         (*dlen)-=4;
927         return sldns_str_print(s, slen, "%u", (unsigned)ttl);
928 }
929
930 int sldns_wire2str_rdf_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
931         int rdftype, uint8_t* pkt, size_t pktlen)
932 {
933         if(*dlen == 0) return 0;
934         switch(rdftype) {
935         case LDNS_RDF_TYPE_NONE:
936                 return 0;
937         case LDNS_RDF_TYPE_DNAME:
938                 return sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
939         case LDNS_RDF_TYPE_INT8:
940                 return sldns_wire2str_int8_scan(d, dlen, s, slen);
941         case LDNS_RDF_TYPE_INT16:
942                 return sldns_wire2str_int16_scan(d, dlen, s, slen);
943         case LDNS_RDF_TYPE_INT32:
944                 return sldns_wire2str_int32_scan(d, dlen, s, slen);
945         case LDNS_RDF_TYPE_PERIOD:
946                 return sldns_wire2str_period_scan(d, dlen, s, slen);
947         case LDNS_RDF_TYPE_TSIGTIME:
948                 return sldns_wire2str_tsigtime_scan(d, dlen, s, slen);
949         case LDNS_RDF_TYPE_A:
950                 return sldns_wire2str_a_scan(d, dlen, s, slen);
951         case LDNS_RDF_TYPE_AAAA:
952                 return sldns_wire2str_aaaa_scan(d, dlen, s, slen);
953         case LDNS_RDF_TYPE_STR:
954                 return sldns_wire2str_str_scan(d, dlen, s, slen);
955         case LDNS_RDF_TYPE_APL:
956                 return sldns_wire2str_apl_scan(d, dlen, s, slen);
957         case LDNS_RDF_TYPE_B32_EXT:
958                 return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
959         case LDNS_RDF_TYPE_B64:
960                 return sldns_wire2str_b64_scan(d, dlen, s, slen);
961         case LDNS_RDF_TYPE_HEX:
962                 return sldns_wire2str_hex_scan(d, dlen, s, slen);
963         case LDNS_RDF_TYPE_NSEC:
964                 return sldns_wire2str_nsec_scan(d, dlen, s, slen);
965         case LDNS_RDF_TYPE_NSEC3_SALT:
966                 return sldns_wire2str_nsec3_salt_scan(d, dlen, s, slen);
967         case LDNS_RDF_TYPE_TYPE:
968                 return sldns_wire2str_type_scan(d, dlen, s, slen);
969         case LDNS_RDF_TYPE_CLASS:
970                 return sldns_wire2str_class_scan(d, dlen, s, slen);
971         case LDNS_RDF_TYPE_CERT_ALG:
972                 return sldns_wire2str_cert_alg_scan(d, dlen, s, slen);
973         case LDNS_RDF_TYPE_ALG:
974                 return sldns_wire2str_alg_scan(d, dlen, s, slen);
975         case LDNS_RDF_TYPE_UNKNOWN:
976                 return sldns_wire2str_unknown_scan(d, dlen, s, slen);
977         case LDNS_RDF_TYPE_TIME:
978                 return sldns_wire2str_time_scan(d, dlen, s, slen);
979         case LDNS_RDF_TYPE_LOC:
980                 return sldns_wire2str_loc_scan(d, dlen, s, slen);
981         case LDNS_RDF_TYPE_WKS:
982         case LDNS_RDF_TYPE_SERVICE:
983                 return sldns_wire2str_wks_scan(d, dlen, s, slen);
984         case LDNS_RDF_TYPE_NSAP:
985                 return sldns_wire2str_nsap_scan(d, dlen, s, slen);
986         case LDNS_RDF_TYPE_ATMA:
987                 return sldns_wire2str_atma_scan(d, dlen, s, slen);
988         case LDNS_RDF_TYPE_IPSECKEY:
989                 return sldns_wire2str_ipseckey_scan(d, dlen, s, slen, pkt,
990                         pktlen);
991         case LDNS_RDF_TYPE_HIP:
992                 return sldns_wire2str_hip_scan(d, dlen, s, slen);
993         case LDNS_RDF_TYPE_INT16_DATA:
994                 return sldns_wire2str_int16_data_scan(d, dlen, s, slen);
995         case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
996                 return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
997         case LDNS_RDF_TYPE_ILNP64:
998                 return sldns_wire2str_ilnp64_scan(d, dlen, s, slen);
999         case LDNS_RDF_TYPE_EUI48:
1000                 return sldns_wire2str_eui48_scan(d, dlen, s, slen);
1001         case LDNS_RDF_TYPE_EUI64:
1002                 return sldns_wire2str_eui64_scan(d, dlen, s, slen);
1003         case LDNS_RDF_TYPE_TAG:
1004                 return sldns_wire2str_tag_scan(d, dlen, s, slen);
1005         case LDNS_RDF_TYPE_LONG_STR:
1006                 return sldns_wire2str_long_str_scan(d, dlen, s, slen);
1007         case LDNS_RDF_TYPE_TSIGERROR:
1008                 return sldns_wire2str_tsigerror_scan(d, dlen, s, slen);
1009         }
1010         /* unknown rdf type */
1011         return -1;
1012 }
1013
1014 int sldns_wire2str_int8_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1015 {
1016         int w;
1017         if(*dl < 1) return -1;
1018         w = sldns_str_print(s, sl, "%u", (unsigned)**d);
1019         (*d)++;
1020         (*dl)--;
1021         return w;
1022 }
1023
1024 int sldns_wire2str_int16_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1025 {
1026         int w;
1027         if(*dl < 2) return -1;
1028         w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint16(*d));
1029         (*d)+=2;
1030         (*dl)-=2;
1031         return w;
1032 }
1033
1034 int sldns_wire2str_int32_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1035 {
1036         int w;
1037         if(*dl < 4) return -1;
1038         w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint32(*d));
1039         (*d)+=4;
1040         (*dl)-=4;
1041         return w;
1042 }
1043
1044 int sldns_wire2str_period_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1045 {
1046         int w;
1047         if(*dl < 4) return -1;
1048         w = sldns_str_print(s, sl, "%u", (unsigned)sldns_read_uint32(*d));
1049         (*d)+=4;
1050         (*dl)-=4;
1051         return w;
1052 }
1053
1054 int sldns_wire2str_tsigtime_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1055 {
1056         /* tsigtime is 48 bits network order unsigned integer */
1057         int w;
1058         uint64_t tsigtime = 0;
1059         uint64_t d0, d1, d2, d3, d4, d5;
1060         if(*dl < 6) return -1;
1061         d0 = (*d)[0]; /* cast to uint64 for shift operations */
1062         d1 = (*d)[1];
1063         d2 = (*d)[2];
1064         d3 = (*d)[3];
1065         d4 = (*d)[4];
1066         d5 = (*d)[5];
1067         tsigtime = (d0<<40) | (d1<<32) | (d2<<24) | (d3<<16) | (d4<<8) | d5;
1068 #ifndef USE_WINSOCK
1069         w = sldns_str_print(s, sl, "%llu", (long long)tsigtime);
1070 #else
1071         w = sldns_str_print(s, sl, "%I64u", (long long)tsigtime);
1072 #endif
1073         (*d)+=6;
1074         (*dl)-=6;
1075         return w;
1076 }
1077
1078 int sldns_wire2str_a_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1079 {
1080         char buf[32];
1081         int w;
1082         if(*dl < 4) return -1;
1083         if(!inet_ntop(AF_INET, *d, buf, (socklen_t)sizeof(buf)))
1084                 return -1;
1085         w = sldns_str_print(s, sl, "%s", buf);
1086         (*d)+=4;
1087         (*dl)-=4;
1088         return w;
1089 }
1090
1091 int sldns_wire2str_aaaa_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1092 {
1093 #ifdef AF_INET6
1094         char buf[64];
1095         int w;
1096         if(*dl < 16) return -1;
1097         if(!inet_ntop(AF_INET6, *d, buf, (socklen_t)sizeof(buf)))
1098                 return -1;
1099         w = sldns_str_print(s, sl, "%s", buf);
1100         (*d)+=16;
1101         (*dl)-=16;
1102         return w;
1103 #else
1104         return -1;
1105 #endif
1106 }
1107
1108 /** printout escaped TYPE_STR character */
1109 static int str_char_print(char** s, size_t* sl, uint8_t c)
1110 {
1111         if(isprint((unsigned char)c) || c == '\t') {
1112                 if(c == '\"' || c == '\\')
1113                         return sldns_str_print(s, sl, "\\%c", c);
1114                 if(*sl) {
1115                         **s = (char)c;
1116                         (*s)++;
1117                         (*sl)--;
1118                 }
1119                 return 1;
1120         }
1121         return sldns_str_print(s, sl, "\\%03u", (unsigned)c);
1122 }
1123
1124 int sldns_wire2str_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1125 {
1126         int w = 0;
1127         size_t i, len;
1128         if(*dl < 1) return -1;
1129         len = **d;
1130         if(*dl < 1+len) return -1;
1131         (*d)++;
1132         (*dl)--;
1133         w += sldns_str_print(s, sl, "\"");
1134         for(i=0; i<len; i++)
1135                 w += str_char_print(s, sl, (*d)[i]);
1136         w += sldns_str_print(s, sl, "\"");
1137         (*d)+=len;
1138         (*dl)-=len;
1139         return w;
1140 }
1141
1142 int sldns_wire2str_apl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1143 {
1144         int i, w = 0;
1145         uint16_t family;
1146         uint8_t negation, prefix, adflength;
1147         if(*dl < 4) return -1;
1148         family = sldns_read_uint16(*d);
1149         prefix = (*d)[2];
1150         negation = ((*d)[3] & LDNS_APL_NEGATION);
1151         adflength = ((*d)[3] & LDNS_APL_MASK);
1152         if(*dl < 4+(size_t)adflength) return -1;
1153         if(family != LDNS_APL_IP4 && family != LDNS_APL_IP6)
1154                 return -1; /* unknown address family */
1155         if(negation)
1156                 w += sldns_str_print(s, sl, "!");
1157         w += sldns_str_print(s, sl, "%u:", (unsigned)family);
1158         if(family == LDNS_APL_IP4) {
1159                 /* check if prefix <32 ? */
1160                 /* address is variable length 0 - 4 */
1161                 for(i=0; i<4; i++) {
1162                         if(i > 0)
1163                                 w += sldns_str_print(s, sl, ".");
1164                         if(i < (int)adflength)
1165                                 w += sldns_str_print(s, sl, "%d", (*d)[4+i]);
1166                         else    w += sldns_str_print(s, sl, "0");
1167                 }
1168         } else if(family == LDNS_APL_IP6) {
1169                 /* check if prefix <128 ? */
1170                 /* address is variable length 0 - 16 */
1171                 for(i=0; i<16; i++) {
1172                         if(i%2 == 0 && i>0)
1173                                 w += sldns_str_print(s, sl, ":");
1174                         if(i < (int)adflength)
1175                                 w += sldns_str_print(s, sl, "%02x", (*d)[4+i]);
1176                         else    w += sldns_str_print(s, sl, "00");
1177                 }
1178         }
1179         w += sldns_str_print(s, sl, "/%u", (unsigned)prefix);
1180         (*d) += 4+adflength;
1181         (*dl) -= 4+adflength;
1182         return w;
1183 }
1184
1185 int sldns_wire2str_b32_ext_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1186 {
1187         size_t datalen;
1188         size_t sz;
1189         if(*dl < 1) return -1;
1190         datalen = (*d)[0];
1191         if(*dl < 1+datalen) return -1;
1192         sz = sldns_b32_ntop_calculate_size(datalen);
1193         if(*sl < sz+1) {
1194                 (*d) += datalen+1;
1195                 (*dl) -= (datalen+1);
1196                 return (int)sz; /* out of space really, but would need buffer
1197                         in order to truncate the output */
1198         }
1199         sldns_b32_ntop_extended_hex((*d)+1, datalen, *s, *sl);
1200         (*d) += datalen+1;
1201         (*dl) -= (datalen+1);
1202         (*s) += sz;
1203         (*sl) -= sz;
1204         return (int)sz;
1205 }
1206
1207 /** scan number of bytes from wire into b64 presentation format */
1208 static int sldns_wire2str_b64_scan_num(uint8_t** d, size_t* dl, char** s,
1209         size_t* sl, size_t num)
1210 {
1211         /* b64_ntop_calculate size includes null at the end */
1212         size_t sz = sldns_b64_ntop_calculate_size(num)-1;
1213         if(*sl < sz+1) {
1214                 (*d) += num;
1215                 (*dl) -= num;
1216                 return (int)sz; /* out of space really, but would need buffer
1217                         in order to truncate the output */
1218         }
1219         sldns_b64_ntop(*d, num, *s, *sl);
1220         (*d) += num;
1221         (*dl) -= num;
1222         (*s) += sz;
1223         (*sl) -= sz;
1224         return (int)sz;
1225 }
1226
1227 int sldns_wire2str_b64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1228 {
1229         if(*dl == 0) {
1230                 return sldns_str_print(s, sl, "0");
1231         }
1232         return sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1233 }
1234
1235 int sldns_wire2str_hex_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1236 {
1237         if(*dl == 0) {
1238                 return sldns_str_print(s, sl, "0");
1239         }
1240         return print_remainder_hex("", d, dl, s, sl);
1241 }
1242
1243 int sldns_wire2str_nsec_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1244 {
1245         uint8_t* p = *d;
1246         size_t pl = *dl;
1247         unsigned i, bit, window, block_len;
1248         uint16_t t;
1249         int w = 0;
1250         
1251         /* check for errors */
1252         while(pl) {
1253                 if(pl < 2) return -1;
1254                 block_len = (unsigned)p[1];
1255                 if(pl < 2+block_len) return -1;
1256                 p += block_len+2;
1257                 pl -= block_len+2;
1258         }
1259
1260         /* do it */
1261         p = *d;
1262         pl = *dl;
1263         while(pl) {
1264                 if(pl < 2) return -1; /* cannot happen */
1265                 window = (unsigned)p[0];
1266                 block_len = (unsigned)p[1];
1267                 if(pl < 2+block_len) return -1; /* cannot happen */
1268                 p += 2;
1269                 for(i=0; i<block_len; i++) {
1270                         if(p[i] == 0) continue;
1271                         /* base type number for this octet */
1272                         t = ((window)<<8) | (i << 3);
1273                         for(bit=0; bit<8; bit++) {
1274                                 if((p[i]&(0x80>>bit))) {
1275                                         if(w) w += sldns_str_print(s, sl, " ");
1276                                         w += sldns_wire2str_type_print(s, sl,
1277                                                 t+bit);
1278                                 }
1279                         }
1280                 }
1281                 p += block_len;
1282                 pl -= block_len+2;
1283         }
1284         (*d) += *dl;
1285         (*dl) = 0;
1286         return w;
1287 }
1288
1289 int sldns_wire2str_nsec3_salt_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1290 {
1291         size_t salt_len;
1292         int w;
1293         if(*dl < 1) return -1;
1294         salt_len = (size_t)(*d)[0];
1295         if(*dl < 1+salt_len) return -1;
1296         (*d)++;
1297         (*dl)--;
1298         if(salt_len == 0) {
1299                 return sldns_str_print(s, sl, "-");
1300         }
1301         w = print_hex_buf(s, sl, *d, salt_len);
1302         (*dl)-=salt_len;
1303         (*d)+=salt_len;
1304         return w;
1305 }
1306
1307 int sldns_wire2str_cert_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1308 {
1309         sldns_lookup_table *lt;
1310         int data, w;
1311         if(*dl < 2) return -1;
1312         data = (int)sldns_read_uint16(*d);
1313         lt = sldns_lookup_by_id(sldns_cert_algorithms, data);
1314         if(lt && lt->name)
1315                 w = sldns_str_print(s, sl, "%s", lt->name);
1316         else    w = sldns_str_print(s, sl, "%d", data);
1317         (*dl)-=2;
1318         (*d)+=2;
1319         return w;
1320 }
1321
1322 int sldns_wire2str_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1323 {
1324         /* don't use algorithm mnemonics in the presentation format
1325          * this kind of got sneaked into the rfc's */
1326         return sldns_wire2str_int8_scan(d, dl, s, sl);
1327 }
1328
1329 int sldns_wire2str_unknown_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1330 {
1331         return sldns_wire2str_rdata_unknown_scan(d, dl, s, sl);
1332 }
1333
1334 int sldns_wire2str_time_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1335 {
1336         /* create a YYYYMMDDHHMMSS string if possible */
1337         struct tm tm;
1338         char date_buf[16];
1339         uint32_t t;
1340         memset(&tm, 0, sizeof(tm));
1341         if(*dl < 4) return -1;
1342         t = sldns_read_uint32(*d);
1343         date_buf[15]=0;
1344         if(sldns_serial_arithmetics_gmtime_r(t, time(NULL), &tm) &&
1345                 strftime(date_buf, 15, "%Y%m%d%H%M%S", &tm)) {
1346                 (*d) += 4;
1347                 (*dl) -= 4;
1348                 return sldns_str_print(s, sl, "%s", date_buf);
1349         }
1350         return -1;
1351 }
1352
1353 static int
1354 loc_cm_print(char** str, size_t* sl, uint8_t mantissa, uint8_t exponent)
1355 {
1356         int w = 0;
1357         uint8_t i;
1358         /* is it 0.<two digits> ? */
1359         if(exponent < 2) {
1360                 if(exponent == 1)
1361                         mantissa *= 10;
1362                 return sldns_str_print(str, sl, "0.%02ld", (long)mantissa);
1363         }
1364         /* always <digit><string of zeros> */
1365         w += sldns_str_print(str, sl, "%d", (int)mantissa);
1366         for(i=0; i<exponent-2; i++)
1367                 w += sldns_str_print(str, sl, "0");
1368         return w;
1369 }
1370
1371 int sldns_wire2str_loc_scan(uint8_t** d, size_t* dl, char** str, size_t* sl)
1372 {
1373         /* we could do checking (ie degrees < 90 etc)? */
1374         uint8_t version;
1375         uint8_t size;
1376         uint8_t horizontal_precision;
1377         uint8_t vertical_precision;
1378         uint32_t longitude;
1379         uint32_t latitude;
1380         uint32_t altitude;
1381         char northerness;
1382         char easterness;
1383         uint32_t h;
1384         uint32_t m;
1385         double s;
1386         uint32_t equator = (uint32_t)1 << 31; /* 2**31 */
1387         int w = 0;
1388
1389         if(*dl < 16) return -1;
1390         version = (*d)[0];
1391         if(version != 0)
1392                 return sldns_wire2str_hex_scan(d, dl, str, sl);
1393         size = (*d)[1];
1394         horizontal_precision = (*d)[2];
1395         vertical_precision = (*d)[3];
1396
1397         latitude = sldns_read_uint32((*d)+4);
1398         longitude = sldns_read_uint32((*d)+8);
1399         altitude = sldns_read_uint32((*d)+12);
1400
1401         if (latitude > equator) {
1402                 northerness = 'N';
1403                 latitude = latitude - equator;
1404         } else {
1405                 northerness = 'S';
1406                 latitude = equator - latitude;
1407         }
1408         h = latitude / (1000 * 60 * 60);
1409         latitude = latitude % (1000 * 60 * 60);
1410         m = latitude / (1000 * 60);
1411         latitude = latitude % (1000 * 60);
1412         s = (double) latitude / 1000.0;
1413         w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1414                 h, m, s, northerness);
1415
1416         if (longitude > equator) {
1417                 easterness = 'E';
1418                 longitude = longitude - equator;
1419         } else {
1420                 easterness = 'W';
1421                 longitude = equator - longitude;
1422         }
1423         h = longitude / (1000 * 60 * 60);
1424         longitude = longitude % (1000 * 60 * 60);
1425         m = longitude / (1000 * 60);
1426         longitude = longitude % (1000 * 60);
1427         s = (double) longitude / (1000.0);
1428         w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1429                 h, m, s, easterness);
1430
1431         s = ((double) altitude) / 100;
1432         s -= 100000;
1433
1434         if(altitude%100 != 0)
1435                 w += sldns_str_print(str, sl, "%.2f", s);
1436         else
1437                 w += sldns_str_print(str, sl, "%.0f", s);
1438
1439         w += sldns_str_print(str, sl, "m ");
1440
1441         w += loc_cm_print(str, sl, (size & 0xf0) >> 4, size & 0x0f);
1442         w += sldns_str_print(str, sl, "m ");
1443
1444         w += loc_cm_print(str, sl, (horizontal_precision & 0xf0) >> 4,
1445                 horizontal_precision & 0x0f);
1446         w += sldns_str_print(str, sl, "m ");
1447
1448         w += loc_cm_print(str, sl, (vertical_precision & 0xf0) >> 4,
1449                 vertical_precision & 0x0f);
1450         w += sldns_str_print(str, sl, "m");
1451
1452         (*d)+=16;
1453         (*dl)-=16;
1454         return w;
1455 }
1456
1457 int sldns_wire2str_wks_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1458 {
1459         /* protocol, followed by bitmap of services */
1460         const char* proto_name = NULL;
1461         struct protoent *protocol;
1462         struct servent *service;
1463         uint8_t protocol_nr;
1464         int bit, port, w = 0;
1465         size_t i;
1466         /* we cannot print with strings because they
1467          * are not portable, the presentation format may
1468          * not be able to be read in on another computer.  */
1469         int print_symbols = 0;
1470
1471         /* protocol */
1472         if(*dl < 1) return -1;
1473         protocol_nr = (*d)[0];
1474         (*d)++;
1475         (*dl)--;
1476         protocol = getprotobynumber((int)protocol_nr);
1477         if(protocol && (protocol->p_name != NULL)) {
1478                 w += sldns_str_print(s, sl, "%s", protocol->p_name);
1479                 proto_name = protocol->p_name;
1480         } else if(protocol_nr == 6) {
1481                 w += sldns_str_print(s, sl, "tcp");
1482         } else if(protocol_nr == 17) {
1483                 w += sldns_str_print(s, sl, "udp");
1484         } else  {
1485                 w += sldns_str_print(s, sl, "%u", (unsigned)protocol_nr);
1486         }
1487
1488         for(i=0; i<*dl; i++) {
1489                 if((*d)[i] == 0)
1490                         continue;
1491                 for(bit=0; bit<8; bit++) {
1492                         if(!(((*d)[i])&(0x80>>bit)))
1493                                 continue;
1494                         port = (int)i*8 + bit;
1495
1496                         if(!print_symbols)
1497                                 service = NULL;
1498                         else
1499                                 service = getservbyport(
1500                                         (int)htons((uint16_t)port), proto_name);
1501                         if(service && service->s_name)
1502                                 w += sldns_str_print(s, sl, " %s",
1503                                         service->s_name);
1504                         else    w += sldns_str_print(s, sl, " %u",
1505                                         (unsigned)port);
1506                 }
1507         }
1508
1509 #ifdef HAVE_ENDSERVENT
1510         endservent();
1511 #endif
1512 #ifdef HAVE_ENDPROTOENT
1513         endprotoent();
1514 #endif
1515         (*d) += *dl;
1516         (*dl) = 0;
1517         return w;
1518 }
1519
1520 int sldns_wire2str_nsap_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1521 {
1522         return print_remainder_hex("0x", d, dl, s, sl);
1523 }
1524
1525 int sldns_wire2str_atma_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1526 {
1527         return print_remainder_hex("", d, dl, s, sl);
1528 }
1529
1530 /* internal scan routine that can modify arguments on failure */
1531 static int sldns_wire2str_ipseckey_scan_internal(uint8_t** d, size_t* dl,
1532         char** s, size_t* sl, uint8_t* pkt, size_t pktlen)
1533 {
1534         /* http://www.ietf.org/internet-drafts/draft-ietf-ipseckey-rr-12.txt*/
1535         uint8_t precedence, gateway_type, algorithm;
1536         int w = 0;
1537
1538         if(*dl < 3) return -1;
1539         precedence = (*d)[0];
1540         gateway_type = (*d)[1];
1541         algorithm = (*d)[2];
1542         if(gateway_type > 3)
1543                 return -1; /* unknown */
1544         (*d)+=3;
1545         (*dl)-=3;
1546         w += sldns_str_print(s, sl, "%d %d %d ",
1547                 (int)precedence, (int)gateway_type, (int)algorithm);
1548
1549         switch(gateway_type) {
1550         case 0: /* no gateway */
1551                 w += sldns_str_print(s, sl, ".");
1552                 break;
1553         case 1: /* ip4 */
1554                 w += sldns_wire2str_a_scan(d, dl, s, sl);
1555                 break;
1556         case 2: /* ip6 */
1557                 w += sldns_wire2str_aaaa_scan(d, dl, s, sl);
1558                 break;
1559         case 3: /* dname */
1560                 w += sldns_wire2str_dname_scan(d, dl, s, sl, pkt, pktlen);
1561                 break;
1562         default: /* unknown */
1563                 return -1;
1564         }
1565
1566         if(*dl < 1)
1567                 return -1;
1568         w += sldns_str_print(s, sl, " ");
1569         w += sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1570         return w;
1571 }
1572
1573 int sldns_wire2str_ipseckey_scan(uint8_t** d, size_t* dl, char** s, size_t* sl,
1574         uint8_t* pkt, size_t pktlen)
1575 {
1576         uint8_t* od = *d;
1577         char* os = *s;
1578         size_t odl = *dl, osl = *sl;
1579         int w=sldns_wire2str_ipseckey_scan_internal(d, dl, s, sl, pkt, pktlen);
1580         if(w == -1) {
1581                 *d = od;
1582                 *s = os;
1583                 *dl = odl;
1584                 *sl = osl;
1585                 return -1;
1586         }
1587         return w;
1588 }
1589
1590 int sldns_wire2str_hip_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1591 {
1592         int w;
1593         uint8_t algo, hitlen;
1594         uint16_t pklen;
1595
1596         /* read lengths */
1597         if(*dl < 4)
1598                 return -1;
1599         hitlen = (*d)[0];
1600         algo = (*d)[1];
1601         pklen = sldns_read_uint16((*d)+2);
1602         if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen)
1603                 return -1;
1604
1605         /* write: algo hit pubkey */
1606         w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
1607         w += print_hex_buf(s, sl, (*d)+4, hitlen);
1608         w += sldns_str_print(s, sl, " ");
1609         (*d)+=4+hitlen;
1610         (*dl)-= (4+hitlen);
1611         w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
1612         return w;
1613 }
1614
1615 int sldns_wire2str_int16_data_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1616 {
1617         int w;
1618         uint16_t n;
1619         if(*dl < 2)
1620                 return -1;
1621         n = sldns_read_uint16(*d);
1622         if(*dl < 2+(size_t)n)
1623                 return -1;
1624         (*d)+=2;
1625         (*dl)-=2;
1626         if(n == 0) {
1627                 return sldns_str_print(s, sl, "0");
1628         }
1629         w = sldns_str_print(s, sl, "%u ", (unsigned)n);
1630         w += sldns_wire2str_b64_scan_num(d, dl, s, sl, n);
1631         return w;
1632 }
1633
1634 int sldns_wire2str_nsec3_next_owner_scan(uint8_t** d, size_t* dl, char** s,
1635         size_t* sl)
1636 {
1637         return sldns_wire2str_b32_ext_scan(d, dl, s, sl);
1638 }
1639
1640 int sldns_wire2str_ilnp64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1641 {
1642         int w;
1643         if(*dl < 8)
1644                 return -1;
1645         w = sldns_str_print(s, sl, "%.4x:%.4x:%.4x:%.4x",
1646                 sldns_read_uint16(*d), sldns_read_uint16((*d)+2),
1647                 sldns_read_uint16((*d)+4), sldns_read_uint16((*d)+6));
1648         (*d)+=8;
1649         (*dl)-=8;
1650         return w;
1651 }
1652
1653 int sldns_wire2str_eui48_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1654 {
1655         int w;
1656         if(*dl < 6)
1657                 return -1;
1658         w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1659                 (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5]);
1660         (*d)+=6;
1661         (*dl)-=6;
1662         return w;
1663 }
1664
1665 int sldns_wire2str_eui64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1666 {
1667         int w;
1668         if(*dl < 8)
1669                 return -1;
1670         w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1671                 (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5],
1672                 (*d)[6], (*d)[7]);
1673         (*d)+=8;
1674         (*dl)-=8;
1675         return w;
1676 }
1677
1678 int sldns_wire2str_tag_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1679 {
1680         size_t i, n;
1681         int w = 0;
1682         if(*dl < 1)
1683                 return -1;
1684         n = (size_t)((*d)[0]);
1685         if(*dl < 1+n)
1686                 return -1;
1687         for(i=0; i<n; i++)
1688                 if(!isalnum((unsigned char)(*d)[i+1]))
1689                         return -1;
1690         for(i=0; i<n; i++)
1691                 w += sldns_str_print(s, sl, "%c", (char)(*d)[i+1]);
1692         (*d)+=n+1;
1693         (*dl)-=(n+1);
1694         return w;
1695 }
1696
1697 int sldns_wire2str_long_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1698 {
1699         size_t i;
1700         int w = 0;
1701         w += sldns_str_print(s, sl, "\"");
1702         for(i=0; i<*dl; i++)
1703                 w += str_char_print(s, sl, (*d)[i]);
1704         w += sldns_str_print(s, sl, "\"");
1705         (*d)+=*dl;
1706         (*dl)=0;
1707         return w;
1708 }
1709
1710 int sldns_wire2str_tsigerror_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1711 {
1712         sldns_lookup_table *lt;
1713         int data, w;
1714         if(*dl < 2) return -1;
1715         data = (int)sldns_read_uint16(*d);
1716         lt = sldns_lookup_by_id(sldns_tsig_errors, data);
1717         if(lt && lt->name)
1718                 w = sldns_str_print(s, sl, "%s", lt->name);
1719         else    w = sldns_str_print(s, sl, "%d", data);
1720         (*dl)-=2;
1721         (*d)+=2;
1722         return w;
1723 }
1724
1725 int sldns_wire2str_edns_llq_print(char** s, size_t* sl, uint8_t* data,
1726         size_t len)
1727 {
1728         /* LLQ constants */
1729         const char* llq_errors[] = {"NO-ERROR", "SERV-FULL", "STATIC",
1730                 "FORMAT-ERR", "NO-SUCH-LLQ", "BAD-VERS", "UNKNOWN_ERR"};
1731         const unsigned int llq_errors_num = 7;
1732         const char* llq_opcodes[] = {"LLQ-SETUP", "LLQ-REFRESH", "LLQ-EVENT"};
1733         const unsigned int llq_opcodes_num = 3;
1734         uint16_t version, llq_opcode, error_code;
1735         uint64_t llq_id;
1736         uint32_t lease_life; /* Requested or granted life of LLQ, in seconds */
1737         int w = 0;
1738
1739         /* read the record */
1740         if(len != 18) {
1741                 w += sldns_str_print(s, sl, "malformed LLQ ");
1742                 w += print_hex_buf(s, sl, data, len);
1743                 return w;
1744         }
1745         version = sldns_read_uint16(data);
1746         llq_opcode = sldns_read_uint16(data+2);
1747         error_code = sldns_read_uint16(data+4);
1748         memmove(&llq_id, data+6, sizeof(llq_id));
1749         lease_life = sldns_read_uint32(data+14);
1750
1751         /* print it */
1752         w += sldns_str_print(s, sl, "v%d ", (int)version);
1753         if(llq_opcode < llq_opcodes_num)
1754                 w += sldns_str_print(s, sl, "%s", llq_opcodes[llq_opcode]);
1755         else    w += sldns_str_print(s, sl, "opcode %d", (int)llq_opcode);
1756         if(error_code < llq_errors_num)
1757                 w += sldns_str_print(s, sl, " %s", llq_errors[error_code]);
1758         else    w += sldns_str_print(s, sl, " error %d", (int)error_code);
1759 #ifndef USE_WINSOCK
1760         w += sldns_str_print(s, sl, " id %llx lease-life %lu",
1761                 (unsigned long long)llq_id, (unsigned long)lease_life);
1762 #else
1763         w += sldns_str_print(s, sl, " id %I64x lease-life %lu",
1764                 (unsigned long long)llq_id, (unsigned long)lease_life);
1765 #endif
1766         return w;
1767 }
1768
1769 int sldns_wire2str_edns_ul_print(char** s, size_t* sl, uint8_t* data,
1770         size_t len)
1771 {
1772         uint32_t lease;
1773         int w = 0;
1774         if(len != 4) {
1775                 w += sldns_str_print(s, sl, "malformed UL ");
1776                 w += print_hex_buf(s, sl, data, len);
1777                 return w;
1778         }
1779         lease = sldns_read_uint32(data);
1780         w += sldns_str_print(s, sl, "lease %lu", (unsigned long)lease);
1781         return w;
1782 }
1783
1784 int sldns_wire2str_edns_nsid_print(char** s, size_t* sl, uint8_t* data,
1785         size_t len)
1786 {
1787         int w = 0;
1788         size_t i, printed=0;
1789         w += print_hex_buf(s, sl, data, len);
1790         for(i=0; i<len; i++) {
1791                 if(isprint((unsigned char)data[i]) || data[i] == '\t') {
1792                         if(!printed) {
1793                                 w += sldns_str_print(s, sl, " (");
1794                                 printed = 1;
1795                         }
1796                         w += sldns_str_print(s, sl, "%c", (char)data[i]);
1797                 }
1798         }
1799         if(printed)
1800                 w += sldns_str_print(s, sl, ")");
1801         return w;
1802 }
1803
1804 int sldns_wire2str_edns_dau_print(char** s, size_t* sl, uint8_t* data,
1805         size_t len)
1806 {
1807         sldns_lookup_table *lt;
1808         size_t i;
1809         int w = 0;
1810         for(i=0; i<len; i++) {
1811                 lt = sldns_lookup_by_id(sldns_algorithms, (int)data[i]);
1812                 if(lt && lt->name)
1813                         w += sldns_str_print(s, sl, " %s", lt->name);
1814                 else    w += sldns_str_print(s, sl, " %d", (int)data[i]);
1815         }
1816         return w;
1817 }
1818
1819 int sldns_wire2str_edns_dhu_print(char** s, size_t* sl, uint8_t* data,
1820         size_t len)
1821 {
1822         sldns_lookup_table *lt;
1823         size_t i;
1824         int w = 0;
1825         for(i=0; i<len; i++) {
1826                 lt = sldns_lookup_by_id(sldns_hashes, (int)data[i]);
1827                 if(lt && lt->name)
1828                         w += sldns_str_print(s, sl, " %s", lt->name);
1829                 else    w += sldns_str_print(s, sl, " %d", (int)data[i]);
1830         }
1831         return w;
1832 }
1833
1834 int sldns_wire2str_edns_n3u_print(char** s, size_t* sl, uint8_t* data,
1835         size_t len)
1836 {
1837         size_t i;
1838         int w = 0;
1839         for(i=0; i<len; i++) {
1840                 if(data[i] == 1)
1841                         w += sldns_str_print(s, sl, " SHA1");
1842                 else    w += sldns_str_print(s, sl, " %d", (int)data[i]);
1843         }
1844         return w;
1845 }
1846
1847 int sldns_wire2str_edns_subnet_print(char** s, size_t* sl, uint8_t* data,
1848         size_t len)
1849 {
1850         int w = 0;
1851         uint16_t family;
1852         uint8_t source, scope;
1853         if(len < 4) {
1854                 w += sldns_str_print(s, sl, "malformed subnet ");
1855                 w += print_hex_buf(s, sl, data, len);
1856                 return w;
1857         }
1858         family = sldns_read_uint16(data);
1859         source = data[2];
1860         scope = data[3];
1861         if(family == 1) {
1862                 /* IP4 */
1863                 char buf[64];
1864                 uint8_t ip4[4];
1865                 memset(ip4, 0, sizeof(ip4));
1866                 if(len-4 > 4) {
1867                         w += sldns_str_print(s, sl, "trailingdata:");
1868                         w += print_hex_buf(s, sl, data+4+4, len-4-4);
1869                         w += sldns_str_print(s, sl, " ");
1870                         len = 4+4;
1871                 }
1872                 memmove(ip4, data+4, len-4);
1873                 if(!inet_ntop(AF_INET, ip4, buf, (socklen_t)sizeof(buf))) {
1874                         w += sldns_str_print(s, sl, "ip4ntoperror ");
1875                         w += print_hex_buf(s, sl, data+4+4, len-4-4);
1876                 } else {
1877                         w += sldns_str_print(s, sl, "%s", buf);
1878                 }
1879         } else if(family == 2) {
1880                 /* IP6 */
1881                 char buf[64];
1882                 uint8_t ip6[16];
1883                 memset(ip6, 0, sizeof(ip6));
1884                 if(len-4 > 16) {
1885                         w += sldns_str_print(s, sl, "trailingdata:");
1886                         w += print_hex_buf(s, sl, data+4+16, len-4-16);
1887                         w += sldns_str_print(s, sl, " ");
1888                         len = 4+16;
1889                 }
1890                 memmove(ip6, data+4, len-4);
1891 #ifdef AF_INET6
1892                 if(!inet_ntop(AF_INET6, ip6, buf, (socklen_t)sizeof(buf))) {
1893                         w += sldns_str_print(s, sl, "ip6ntoperror ");
1894                         w += print_hex_buf(s, sl, data+4+4, len-4-4);
1895                 } else {
1896                         w += sldns_str_print(s, sl, "%s", buf);
1897                 }
1898 #else
1899                 w += print_hex_buf(s, sl, data+4+4, len-4-4);
1900 #endif
1901         } else {
1902                 /* unknown */
1903                 w += sldns_str_print(s, sl, "family %d ",
1904                         (int)family);
1905                 w += print_hex_buf(s, sl, data, len);
1906         }
1907         w += sldns_str_print(s, sl, "/%d scope /%d", (int)source, (int)scope);
1908         return w;
1909 }
1910
1911 static int sldns_wire2str_edns_keepalive_print(char** s, size_t* sl, uint8_t* data,
1912         size_t len)
1913 {
1914         int w = 0;
1915         uint16_t timeout;
1916         if(!(len == 0 || len == 2)) {
1917                 w += sldns_str_print(s, sl, "malformed keepalive ");
1918                 w += print_hex_buf(s, sl, data, len);
1919                 return w;
1920         }
1921         if(len == 0 ) {
1922                 w += sldns_str_print(s, sl, "no timeout value (only valid for client option) ");
1923         } else {
1924                 timeout = sldns_read_uint16(data);
1925                 w += sldns_str_print(s, sl, "timeout value in units of 100ms %u", (int)timeout);
1926         }
1927         return w;
1928 }
1929
1930 int sldns_wire2str_edns_option_print(char** s, size_t* sl,
1931         uint16_t option_code, uint8_t* optdata, size_t optlen)
1932 {
1933         int w = 0;
1934         w += sldns_wire2str_edns_option_code_print(s, sl, option_code);
1935         w += sldns_str_print(s, sl, ": ");
1936         switch(option_code) {
1937         case LDNS_EDNS_LLQ:
1938                 w += sldns_wire2str_edns_llq_print(s, sl, optdata, optlen);
1939                 break;
1940         case LDNS_EDNS_UL:
1941                 w += sldns_wire2str_edns_ul_print(s, sl, optdata, optlen);
1942                 break;
1943         case LDNS_EDNS_NSID:
1944                 w += sldns_wire2str_edns_nsid_print(s, sl, optdata, optlen);
1945                 break;
1946         case LDNS_EDNS_DAU:
1947                 w += sldns_wire2str_edns_dau_print(s, sl, optdata, optlen);
1948                 break;
1949         case LDNS_EDNS_DHU:
1950                 w += sldns_wire2str_edns_dhu_print(s, sl, optdata, optlen);
1951                 break;
1952         case LDNS_EDNS_N3U:
1953                 w += sldns_wire2str_edns_n3u_print(s, sl, optdata, optlen);
1954                 break;
1955         case LDNS_EDNS_CLIENT_SUBNET:
1956                 w += sldns_wire2str_edns_subnet_print(s, sl, optdata, optlen);
1957                 break;
1958          case LDNS_EDNS_KEEPALIVE:
1959                 w += sldns_wire2str_edns_keepalive_print(s, sl, optdata, optlen);
1960                 break;
1961         case LDNS_EDNS_PADDING:
1962                 w += print_hex_buf(s, sl, optdata, optlen);
1963                 break;
1964         default:
1965                 /* unknown option code */
1966                 w += print_hex_buf(s, sl, optdata, optlen);
1967                 break;
1968         }
1969         return w;
1970 }
1971
1972 /** print the edns options to string */
1973 static int
1974 print_edns_opts(char** s, size_t* sl, uint8_t* rdata, size_t rdatalen)
1975 {
1976         uint16_t option_code, option_len;
1977         int w = 0;
1978         while(rdatalen > 0) {
1979                 /* option name */
1980                 if(rdatalen < 4) {
1981                         w += sldns_str_print(s, sl, " ; malformed: ");
1982                         w += print_hex_buf(s, sl, rdata, rdatalen);
1983                         return w;
1984                 }
1985                 option_code = sldns_read_uint16(rdata);
1986                 option_len = sldns_read_uint16(rdata+2);
1987                 rdata += 4;
1988                 rdatalen -= 4;
1989
1990                 /* option value */
1991                 if(rdatalen < (size_t)option_len) {
1992                         w += sldns_str_print(s, sl, " ; malformed ");
1993                         w += sldns_wire2str_edns_option_code_print(s, sl,
1994                                 option_code);
1995                         w += sldns_str_print(s, sl, ": ");
1996                         w += print_hex_buf(s, sl, rdata, rdatalen);
1997                         return w;
1998                 }
1999                 w += sldns_str_print(s, sl, " ; ");
2000                 w += sldns_wire2str_edns_option_print(s, sl, option_code,
2001                         rdata, option_len);
2002                 rdata += option_len;
2003                 rdatalen -= option_len;
2004         }
2005         return w;
2006 }
2007
2008 int sldns_wire2str_edns_scan(uint8_t** data, size_t* data_len, char** str,
2009         size_t* str_len, uint8_t* pkt, size_t pktlen)
2010 {
2011         int w = 0;
2012         uint8_t ext_rcode, edns_version;
2013         uint16_t udpsize, edns_bits, rdatalen;
2014         w += sldns_str_print(str, str_len, "; EDNS:");
2015
2016         /* some input checks, domain name */
2017         if(*data_len < 1+10)
2018                 return w + print_remainder_hex("Error malformed 0x",
2019                         data, data_len, str, str_len);
2020         if(*data[0] != 0) {
2021                 return w + print_remainder_hex("Error nonrootdname 0x",
2022                         data, data_len, str, str_len);
2023         }
2024         (*data)++;
2025         (*data_len)--;
2026
2027         /* check type and read fixed contents */
2028         if(sldns_read_uint16((*data)) != LDNS_RR_TYPE_OPT) {
2029                 return w + print_remainder_hex("Error nottypeOPT 0x",
2030                         data, data_len, str, str_len);
2031         }
2032         udpsize = sldns_read_uint16((*data)+2);
2033         ext_rcode = (*data)[4];
2034         edns_version = (*data)[5];
2035         edns_bits = sldns_read_uint16((*data)+6);
2036         rdatalen = sldns_read_uint16((*data)+8);
2037         (*data)+=10;
2038         (*data_len)-=10;
2039
2040         w += sldns_str_print(str, str_len, " version: %u;",
2041                 (unsigned)edns_version);
2042         w += sldns_str_print(str, str_len, " flags:");
2043         if((edns_bits & LDNS_EDNS_MASK_DO_BIT))
2044                 w += sldns_str_print(str, str_len, " do");
2045         /* the extended rcode is the value set, shifted four bits,
2046          * and or'd with the original rcode */
2047         if(ext_rcode) {
2048                 int rc = ((int)ext_rcode)<<4;
2049                 if(pkt && pktlen >= LDNS_HEADER_SIZE)
2050                         rc |= LDNS_RCODE_WIRE(pkt);
2051                 w += sldns_str_print(str, str_len, " ; ext-rcode: %d", rc);
2052         }
2053         w += sldns_str_print(str, str_len, " ; udp: %u", (unsigned)udpsize);
2054
2055         if(rdatalen) {
2056                 if((size_t)*data_len < rdatalen) {
2057                         w += sldns_str_print(str, str_len,
2058                                 " ; Error EDNS rdata too short; ");
2059                         rdatalen = (uint16_t)*data_len;
2060                 }
2061                 w += print_edns_opts(str, str_len, *data, rdatalen);
2062                 (*data) += rdatalen;
2063                 (*data_len) -= rdatalen;
2064         }
2065         w += sldns_str_print(str, str_len, "\n");
2066         return w;
2067 }