2 * str2wire.c - read txt presentation of RRs
4 * (c) NLnet Labs, 2005-2006
6 * See the file LICENSE for the license
12 * Parses text to wireformat.
15 #include "sldns/str2wire.h"
16 #include "sldns/wire2str.h"
17 #include "sldns/sbuffer.h"
18 #include "sldns/parse.h"
19 #include "sldns/parseutil.h"
28 /** return an error */
29 #define RET_ERR(e, off) ((int)((e)|((off)<<LDNS_WIREPARSE_SHIFT)))
30 /** Move parse error but keep its ID */
31 #define RET_ERR_SHIFT(e, move) RET_ERR(LDNS_WIREPARSE_ERROR(e), LDNS_WIREPARSE_OFFSET(e)+(move));
32 #define LDNS_IP6ADDRLEN (128/8)
35 * No special care is taken, all dots are translated into
37 * @param rel: true if the domain is not absolute (not terminated in .).
38 * The output is then still terminated with a '0' rootlabel.
40 static int sldns_str2wire_dname_buf_rel(const char* str, uint8_t* buf,
41 size_t* olen, int* rel)
46 uint8_t *q, *pq, label_len;
49 len = strlen((char*)str);
50 /* octet representation can make strings a lot longer than actual length */
51 if (len > LDNS_MAX_DOMAINLEN * 4) {
52 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, 0);
55 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, 0);
59 if (1 == len && *str == '.') {
61 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
64 return LDNS_WIREPARSE_ERR_OK;
67 /* get on with the rest */
69 /* s is on the current character in the string
70 * pq points to where the labellength is going to go
71 * label_len keeps track of the current label's length
72 * q builds the dname inside the buf array
76 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
80 for (s = str; *s; s++, q++) {
82 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
83 if (q >= buf + LDNS_MAX_DOMAINLEN)
84 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
87 if (label_len > LDNS_MAX_LABELLEN) {
88 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
91 return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
100 /* octet value or literal char */
102 if (!sldns_parse_escape(q, &s)) {
104 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, q-buf);
115 /* add root label if last char was not '.' */
118 if (q >= buf + *olen)
119 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
120 if (q >= buf + LDNS_MAX_DOMAINLEN) {
121 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
123 if (label_len > LDNS_MAX_LABELLEN) {
124 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
126 if (label_len == 0) { /* label_len 0 but not . at end? */
127 return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
129 len += label_len + 1;
136 return LDNS_WIREPARSE_ERR_OK;
139 int sldns_str2wire_dname_buf(const char* str, uint8_t* buf, size_t* len)
141 return sldns_str2wire_dname_buf_rel(str, buf, len, NULL);
144 int sldns_str2wire_dname_buf_origin(const char* str, uint8_t* buf, size_t* len,
145 uint8_t* origin, size_t origin_len)
149 int s = sldns_str2wire_dname_buf_rel(str, buf, &dlen, &rel);
152 if(rel && origin && dlen > 0) {
153 if((unsigned)dlen >= 0x00ffffffU ||
154 (unsigned)origin_len >= 0x00ffffffU)
155 /* guard against integer overflow in addition */
156 return RET_ERR(LDNS_WIREPARSE_ERR_GENERAL, *len);
157 if(dlen + origin_len - 1 > LDNS_MAX_DOMAINLEN)
158 return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW,
160 if(dlen + origin_len - 1 > *len)
161 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
163 memmove(buf+dlen-1, origin, origin_len);
164 *len = dlen + origin_len - 1;
167 return LDNS_WIREPARSE_ERR_OK;
170 uint8_t* sldns_str2wire_dname(const char* str, size_t* len)
172 uint8_t dname[LDNS_MAX_DOMAINLEN+1];
173 *len = sizeof(dname);
174 if(sldns_str2wire_dname_buf(str, dname, len) == 0) {
176 if(*len > sizeof(dname)) return NULL;
177 r = (uint8_t*)malloc(*len);
178 if(r) return memcpy(r, dname, *len);
184 /** read owner name */
186 rrinternal_get_owner(sldns_buffer* strbuf, uint8_t* rr, size_t* len,
187 size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
188 size_t prev_len, char* token, size_t token_len)
190 /* split the rr in its parts -1 signals trouble */
191 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
192 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
193 sldns_buffer_position(strbuf));
196 if(token_len < 2) /* make sure there is space to read "@" or "" */
197 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
198 sldns_buffer_position(strbuf));
199 if(token[0]=='@' && token[1]=='\0') {
202 *dname_len = origin_len;
205 *dname_len = prev_len;
208 /* default to root */
210 tocopy = (uint8_t*)"\0";
212 if(*len < *dname_len)
213 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
214 sldns_buffer_position(strbuf));
215 memmove(rr, tocopy, *dname_len);
216 } else if(*token == '\0') {
217 /* no ownername was given, try prev, if that fails
218 * origin, else default to root */
221 *dname_len = prev_len;
224 *dname_len = origin_len;
228 tocopy = (uint8_t*)"\0";
230 if(*len < *dname_len)
231 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
232 sldns_buffer_position(strbuf));
233 memmove(rr, tocopy, *dname_len);
236 int s = sldns_str2wire_dname_buf_origin(token, rr, &dlen,
238 if(s) return RET_ERR_SHIFT(s,
239 sldns_buffer_position(strbuf)-strlen(token));
242 return LDNS_WIREPARSE_ERR_OK;
247 rrinternal_get_ttl(sldns_buffer* strbuf, char* token, size_t token_len,
248 int* not_there, uint32_t* ttl, uint32_t default_ttl)
251 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
252 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TTL,
253 sldns_buffer_position(strbuf));
255 *ttl = (uint32_t) sldns_str2period(token, &endptr);
257 if (strlen(token) > 0 && !isdigit((unsigned char)token[0])) {
259 /* ah, it's not there or something */
260 if (default_ttl == 0) {
261 *ttl = LDNS_DEFAULT_TTL;
266 return LDNS_WIREPARSE_ERR_OK;
271 rrinternal_get_class(sldns_buffer* strbuf, char* token, size_t token_len,
272 int* not_there, uint16_t* cl)
274 /* if 'not_there' then we got token from previous parse routine */
276 /* parse new token for class */
277 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
278 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_CLASS,
279 sldns_buffer_position(strbuf));
281 } else *not_there = 0;
282 *cl = sldns_get_rr_class_by_name(token);
283 /* class can be left out too, assume IN, current token must be type */
284 if(*cl == 0 && strcmp(token, "CLASS0") != 0) {
286 *cl = LDNS_RR_CLASS_IN;
288 return LDNS_WIREPARSE_ERR_OK;
293 rrinternal_get_type(sldns_buffer* strbuf, char* token, size_t token_len,
294 int* not_there, uint16_t* tp)
296 /* if 'not_there' then we got token from previous parse routine */
298 /* parse new token for type */
299 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
300 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
301 sldns_buffer_position(strbuf));
304 *tp = sldns_get_rr_type_by_name(token);
305 if(*tp == 0 && strcmp(token, "TYPE0") != 0) {
306 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
307 sldns_buffer_position(strbuf));
309 return LDNS_WIREPARSE_ERR_OK;
312 /** put type, class, ttl into rr buffer */
314 rrinternal_write_typeclassttl(sldns_buffer* strbuf, uint8_t* rr, size_t len,
315 size_t dname_len, uint16_t tp, uint16_t cl, uint32_t ttl, int question)
318 /* question is : name, type, class */
319 if(dname_len + 4 > len)
320 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
321 sldns_buffer_position(strbuf));
322 sldns_write_uint16(rr+dname_len, tp);
323 sldns_write_uint16(rr+dname_len+2, cl);
324 return LDNS_WIREPARSE_ERR_OK;
327 /* type(2), class(2), ttl(4), rdatalen(2 (later)) = 10 */
328 if(dname_len + 10 > len)
329 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
330 sldns_buffer_position(strbuf));
331 sldns_write_uint16(rr+dname_len, tp);
332 sldns_write_uint16(rr+dname_len+2, cl);
333 sldns_write_uint32(rr+dname_len+4, ttl);
334 sldns_write_uint16(rr+dname_len+8, 0); /* rdatalen placeholder */
335 return LDNS_WIREPARSE_ERR_OK;
338 /** find delimiters for type */
340 rrinternal_get_delims(sldns_rdf_type rdftype, size_t r_cnt, size_t r_max)
343 case LDNS_RDF_TYPE_B64 :
344 case LDNS_RDF_TYPE_HEX : /* These rdf types may con- */
345 case LDNS_RDF_TYPE_LOC : /* tain whitespace, only if */
346 case LDNS_RDF_TYPE_WKS : /* it is the last rd field. */
347 case LDNS_RDF_TYPE_IPSECKEY :
348 case LDNS_RDF_TYPE_NSEC : if (r_cnt == r_max - 1) {
357 /* Syntactic sugar for sldns_rr_new_frm_str_internal */
359 sldns_rdf_type_maybe_quoted(sldns_rdf_type rdf_type)
361 return rdf_type == LDNS_RDF_TYPE_STR ||
362 rdf_type == LDNS_RDF_TYPE_LONG_STR;
365 /** see if rdata is quoted */
367 rrinternal_get_quoted(sldns_buffer* strbuf, const char** delimiters,
368 sldns_rdf_type rdftype)
370 if(sldns_rdf_type_maybe_quoted(rdftype) &&
371 sldns_buffer_remaining(strbuf) > 0) {
374 while(sldns_buffer_remaining(strbuf) > 0 &&
375 *(sldns_buffer_current(strbuf)) == ' ') {
376 sldns_buffer_skip(strbuf, 1);
379 if(sldns_buffer_remaining(strbuf) > 0 &&
380 *(sldns_buffer_current(strbuf)) == '\"') {
381 *delimiters = "\"\0";
382 sldns_buffer_skip(strbuf, 1);
389 /** spool hex data into rdata */
391 rrinternal_spool_hex(char* token, uint8_t* rr, size_t rr_len,
392 size_t rr_cur_len, size_t* cur_hex_data_size, size_t hex_data_size)
396 if(isspace((unsigned char)*p)) {
400 if(!isxdigit((unsigned char)*p))
401 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
403 if(*cur_hex_data_size >= hex_data_size)
404 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
406 /* extra robust check */
407 if(rr_cur_len+(*cur_hex_data_size)/2 >= rr_len)
408 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
410 /* see if 16s or 1s */
411 if( ((*cur_hex_data_size)&1) == 0) {
412 rr[rr_cur_len+(*cur_hex_data_size)/2] =
413 (uint8_t)sldns_hexdigit_to_int(*p)*16;
415 rr[rr_cur_len+(*cur_hex_data_size)/2] +=
416 (uint8_t)sldns_hexdigit_to_int(*p);
419 (*cur_hex_data_size)++;
421 return LDNS_WIREPARSE_ERR_OK;
424 /** read unknown rr type format */
426 rrinternal_parse_unknown(sldns_buffer* strbuf, char* token, size_t token_len,
427 uint8_t* rr, size_t* rr_len, size_t* rr_cur_len, size_t pre_data_pos)
429 const char* delim = "\n\t ";
430 size_t hex_data_size, cur_hex_data_size;
431 /* go back to before \#
432 * and skip it while setting delimiters better
434 sldns_buffer_set_position(strbuf, pre_data_pos);
435 if(sldns_bget_token(strbuf, token, delim, token_len) == -1)
436 return LDNS_WIREPARSE_ERR_GENERAL; /* should not fail */
437 /* read rdata octet length */
438 if(sldns_bget_token(strbuf, token, delim, token_len) == -1) {
439 /* something goes very wrong here */
440 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
441 sldns_buffer_position(strbuf));
443 hex_data_size = (size_t)atoi(token);
444 if(hex_data_size > LDNS_MAX_RDFLEN ||
445 *rr_cur_len + hex_data_size > *rr_len) {
446 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
447 sldns_buffer_position(strbuf));
449 /* copy hex chars into hex str (2 chars per byte) */
451 cur_hex_data_size = 0;
452 while(cur_hex_data_size < hex_data_size) {
454 ssize_t c = sldns_bget_token(strbuf, token, delim, token_len);
455 if((status = rrinternal_spool_hex(token, rr, *rr_len,
456 *rr_cur_len, &cur_hex_data_size, hex_data_size)) != 0)
457 return RET_ERR_SHIFT(status,
458 sldns_buffer_position(strbuf)-strlen(token));
460 if(cur_hex_data_size != hex_data_size)
462 LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
463 sldns_buffer_position(strbuf));
467 *rr_cur_len += hex_data_size/2;
468 return LDNS_WIREPARSE_ERR_OK;
471 /** parse normal RR rdata element */
473 rrinternal_parse_rdf(sldns_buffer* strbuf, char* token, size_t token_len,
474 uint8_t* rr, size_t rr_len, size_t* rr_cur_len, sldns_rdf_type rdftype,
475 uint16_t rr_type, size_t r_cnt, size_t r_max, size_t dname_len,
476 uint8_t* origin, size_t origin_len)
482 case LDNS_RDF_TYPE_DNAME:
483 /* check if the origin should be used or concatenated */
484 if(strcmp(token, "@") == 0) {
488 copylen = origin_len;
490 } else if(rr_type == LDNS_RR_TYPE_SOA) {
492 tocopy = rr; /* copy rr owner name */
495 tocopy = (uint8_t*)"\0";
497 if((*rr_cur_len) + copylen > rr_len)
499 LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
500 sldns_buffer_position(strbuf));
501 memmove(rr+*rr_cur_len, tocopy, copylen);
502 (*rr_cur_len) += copylen;
504 size_t dlen = rr_len - (*rr_cur_len);
505 int s = sldns_str2wire_dname_buf_origin(token,
506 rr+*rr_cur_len, &dlen, origin, origin_len);
507 if(s) return RET_ERR_SHIFT(s,
508 sldns_buffer_position(strbuf)-strlen(token));
509 (*rr_cur_len) += dlen;
511 return LDNS_WIREPARSE_ERR_OK;
513 case LDNS_RDF_TYPE_HEX:
514 case LDNS_RDF_TYPE_B64:
515 /* When this is the last rdata field, then the
516 * rest should be read in (cause then these
517 * rdf types may contain spaces). */
518 if(r_cnt == r_max - 1) {
519 size_t tlen = strlen(token);
520 (void)sldns_bget_token(strbuf, token+tlen, "\n",
528 len = rr_len - (*rr_cur_len);
529 if((status=sldns_str2wire_rdf_buf(token, rr+(*rr_cur_len), &len,
531 return RET_ERR_SHIFT(status,
532 sldns_buffer_position(strbuf)-strlen(token));
534 return LDNS_WIREPARSE_ERR_OK;
538 * Parse one rdf token. Takes care of quotes and parenthesis.
541 sldns_parse_rdf_token(sldns_buffer* strbuf, char* token, size_t token_len,
542 int* quoted, int* parens, size_t* pre_data_pos,
543 const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
548 while(sldns_buffer_remaining(strbuf) > 0 && !*quoted &&
549 *(sldns_buffer_current(strbuf)) == ' ') {
550 sldns_buffer_skip(strbuf, 1);
553 *pre_data_pos = sldns_buffer_position(strbuf);
554 if(sldns_bget_token_par(strbuf, token, (*quoted)?"\"":delimiters,
555 token_len, parens, (*quoted)?NULL:" \t") == -1) {
558 slen = strlen(token);
559 /* check if not quoted yet, and we have encountered quotes */
560 if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
562 (token[0] == '"' || token[0] == '\'') &&
563 (token[slen-1] == '"' || token[slen-1] == '\'')) {
564 /* move token two smaller (quotes) with endnull */
565 memmove(token, token+1, slen-2);
569 } else if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
571 (token[0] == '"' || token[0] == '\'')) {
572 /* got the start quote (remove it) but read remainder
573 * of quoted string as well into remainder of token */
574 memmove(token, token+1, slen-1);
578 /* rewind buffer over skipped whitespace */
579 while(sldns_buffer_position(strbuf) > 0 &&
580 (sldns_buffer_current(strbuf)[-1] == ' ' ||
581 sldns_buffer_current(strbuf)[-1] == '\t')) {
582 sldns_buffer_skip(strbuf, -1);
584 if(sldns_bget_token_par(strbuf, token+slen,
585 "\"", token_len-slen,
586 parens, NULL) == -1) {
589 slen = strlen(token);
591 *token_strlen = slen;
595 /** Add space and one more rdf token onto the existing token string. */
597 sldns_affix_token(sldns_buffer* strbuf, char* token, size_t* token_len,
598 int* quoted, int* parens, size_t* pre_data_pos,
599 const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
601 size_t addlen = *token_len - *token_strlen;
602 size_t addstrlen = 0;
605 if(addlen < 1) return 0;
606 token[*token_strlen] = ' ';
607 token[++(*token_strlen)] = 0;
609 /* read another token */
610 addlen = *token_len - *token_strlen;
611 if(!sldns_parse_rdf_token(strbuf, token+*token_strlen, addlen, quoted,
612 parens, pre_data_pos, delimiters, rdftype, &addstrlen))
614 (*token_strlen) += addstrlen;
618 /** parse rdata from string into rr buffer(-remainder after dname). */
620 rrinternal_parse_rdata(sldns_buffer* strbuf, char* token, size_t token_len,
621 uint8_t* rr, size_t* rr_len, size_t dname_len, uint16_t rr_type,
622 uint8_t* origin, size_t origin_len)
624 const sldns_rr_descriptor *desc = sldns_rr_descript((uint16_t)rr_type);
625 size_t r_cnt, r_min, r_max;
626 size_t rr_cur_len = dname_len + 10, pre_data_pos, token_strlen;
627 int was_unknown_rr_format = 0, parens = 0, status, quoted;
628 const char* delimiters;
629 sldns_rdf_type rdftype;
630 /* a desc is always returned */
631 if(!desc) return LDNS_WIREPARSE_ERR_GENERAL;
632 r_max = sldns_rr_descriptor_maximum(desc);
633 r_min = sldns_rr_descriptor_minimum(desc);
635 if(rr_cur_len > *rr_len)
636 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
637 sldns_buffer_position(strbuf));
639 /* because number of fields can be variable, we can't rely on
641 for(r_cnt=0; r_cnt < r_max; r_cnt++) {
642 rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
643 delimiters = rrinternal_get_delims(rdftype, r_cnt, r_max);
644 quoted = rrinternal_get_quoted(strbuf, &delimiters, rdftype);
646 if(!sldns_parse_rdf_token(strbuf, token, token_len, "ed,
647 &parens, &pre_data_pos, delimiters, rdftype,
651 /* rfc3597 specifies that any type can be represented
652 * with \# method, which can contain spaces...
653 * it does specify size though... */
655 /* unknown RR data */
656 if(token_strlen>=2 && strncmp(token, "\\#", 2) == 0 &&
657 !quoted && (token_strlen == 2 || token[2]==' ')) {
658 was_unknown_rr_format = 1;
659 if((status=rrinternal_parse_unknown(strbuf, token,
660 token_len, rr, rr_len, &rr_cur_len,
663 } else if(token_strlen > 0 || quoted) {
664 if(rdftype == LDNS_RDF_TYPE_HIP) {
665 /* affix the HIT and PK fields, with a space */
666 if(!sldns_affix_token(strbuf, token,
667 &token_len, "ed, &parens,
668 &pre_data_pos, delimiters,
669 rdftype, &token_strlen))
671 if(!sldns_affix_token(strbuf, token,
672 &token_len, "ed, &parens,
673 &pre_data_pos, delimiters,
674 rdftype, &token_strlen))
676 } else if(rdftype == LDNS_RDF_TYPE_INT16_DATA &&
677 strcmp(token, "0")!=0) {
678 /* affix len and b64 fields */
679 if(!sldns_affix_token(strbuf, token,
680 &token_len, "ed, &parens,
681 &pre_data_pos, delimiters,
682 rdftype, &token_strlen))
687 if((status=rrinternal_parse_rdf(strbuf, token,
688 token_len, rr, *rr_len, &rr_cur_len, rdftype,
689 rr_type, r_cnt, r_max, dname_len, origin,
695 if(!was_unknown_rr_format && r_cnt+1 < r_min) {
696 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE,
697 sldns_buffer_position(strbuf));
700 /* read remainder, must be "" */
701 if(sldns_bget_token_par(strbuf, token, "\n", token_len,
702 &parens, " \t") == -1) {
704 return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
705 sldns_buffer_position(strbuf));
708 if(strcmp(token, "") != 0)
709 return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
710 sldns_buffer_position(strbuf));
712 /* write rdata length */
713 sldns_write_uint16(rr+dname_len+8, (uint16_t)(rr_cur_len-dname_len-10));
714 *rr_len = rr_cur_len;
715 return LDNS_WIREPARSE_ERR_OK;
719 * trailing spaces are allowed
720 * leading spaces are not allowed
721 * allow ttl to be optional
722 * class is optional too
723 * if ttl is missing, and default_ttl is 0, use DEF_TTL
724 * allow ttl to be written as 1d3h
725 * So the RR should look like. e.g.
726 * miek.nl. 3600 IN MX 10 elektron.atoom.net
728 * miek.nl. 1h IN MX 10 elektron.atoom.net
730 * miek.nl. IN MX 10 elektron.atoom.net
733 sldns_str2wire_rr_buf_internal(const char* str, uint8_t* rr, size_t* len,
734 size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
735 size_t origin_len, uint8_t* prev, size_t prev_len, int question)
739 char token[LDNS_MAX_RDFLEN+1];
741 uint16_t tp = 0, cl = 0;
744 /* string in buffer */
746 sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
747 if(!dname_len) dname_len = &ddlen;
749 /* parse the owner */
750 if((status=rrinternal_get_owner(&strbuf, rr, len, dname_len, origin,
751 origin_len, prev, prev_len, token, sizeof(token))) != 0)
754 /* parse the [ttl] [class] <type> */
755 if((status=rrinternal_get_ttl(&strbuf, token, sizeof(token),
756 ¬_there, &ttl, default_ttl)) != 0)
758 if((status=rrinternal_get_class(&strbuf, token, sizeof(token),
759 ¬_there, &cl)) != 0)
761 if((status=rrinternal_get_type(&strbuf, token, sizeof(token),
762 ¬_there, &tp)) != 0)
764 /* put ttl, class, type into the rr result */
765 if((status=rrinternal_write_typeclassttl(&strbuf, rr, *len, *dname_len, tp, cl,
766 ttl, question)) != 0)
768 /* for a question-RR we are done, no rdata */
770 *len = *dname_len + 4;
771 return LDNS_WIREPARSE_ERR_OK;
775 if((status=rrinternal_parse_rdata(&strbuf, token, sizeof(token),
776 rr, len, *dname_len, tp, origin, origin_len)) != 0)
779 return LDNS_WIREPARSE_ERR_OK;
782 int sldns_str2wire_rr_buf(const char* str, uint8_t* rr, size_t* len,
783 size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
784 size_t origin_len, uint8_t* prev, size_t prev_len)
786 return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
787 default_ttl, origin, origin_len, prev, prev_len, 0);
790 int sldns_str2wire_rr_question_buf(const char* str, uint8_t* rr, size_t* len,
791 size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
794 return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
795 0, origin, origin_len, prev, prev_len, 1);
798 uint16_t sldns_wirerr_get_type(uint8_t* rr, size_t len, size_t dname_len)
800 if(len < dname_len+2)
802 return sldns_read_uint16(rr+dname_len);
805 uint16_t sldns_wirerr_get_class(uint8_t* rr, size_t len, size_t dname_len)
807 if(len < dname_len+4)
809 return sldns_read_uint16(rr+dname_len+2);
812 uint32_t sldns_wirerr_get_ttl(uint8_t* rr, size_t len, size_t dname_len)
814 if(len < dname_len+8)
816 return sldns_read_uint32(rr+dname_len+4);
819 uint16_t sldns_wirerr_get_rdatalen(uint8_t* rr, size_t len, size_t dname_len)
821 if(len < dname_len+10)
823 return sldns_read_uint16(rr+dname_len+8);
826 uint8_t* sldns_wirerr_get_rdata(uint8_t* rr, size_t len, size_t dname_len)
828 if(len < dname_len+10)
830 return rr+dname_len+10;
833 uint8_t* sldns_wirerr_get_rdatawl(uint8_t* rr, size_t len, size_t dname_len)
835 if(len < dname_len+10)
837 return rr+dname_len+8;
840 const char* sldns_get_errorstr_parse(int e)
842 sldns_lookup_table *lt;
843 lt = sldns_lookup_by_id(sldns_wireparse_errors, LDNS_WIREPARSE_ERROR(e));
844 return lt?lt->name:"unknown error";
847 /* Strip whitespace from the start and the end of <line>. */
849 sldns_strip_ws(char *line)
853 for (s = line; *s && isspace((unsigned char)*s); s++)
855 for (e = strchr(s, 0); e > s+2 && isspace((unsigned char)e[-1]) && e[-2] != '\\'; e--)
861 int sldns_fp2wire_rr_buf(FILE* in, uint8_t* rr, size_t* len, size_t* dname_len,
862 struct sldns_file_parse_state* parse_state)
864 char line[LDNS_RR_BUF_SIZE+1];
867 /* read an entire line in from the file */
868 if((size = sldns_fget_token_l(in, line, LDNS_PARSE_SKIP_SPACE,
869 LDNS_RR_BUF_SIZE, parse_state?&parse_state->lineno:NULL))
871 /* if last line was empty, we are now at feof, which is not
872 * always a parse error (happens when for instance last line
875 return LDNS_WIREPARSE_ERR_SYNTAX;
878 /* we can have the situation, where we've read ok, but still got
879 * no bytes to play with, in this case size is 0 */
885 return LDNS_WIREPARSE_ERR_OK;
888 if(strncmp(line, "$ORIGIN", 7) == 0 && isspace((unsigned char)line[7])) {
890 strlcpy((char*)rr, line, *len);
893 if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
894 parse_state->origin_len = sizeof(parse_state->origin);
895 s = sldns_str2wire_dname_buf(sldns_strip_ws(line+8),
896 parse_state->origin, &parse_state->origin_len);
897 if(s) parse_state->origin_len = 0;
899 } else if(strncmp(line, "$TTL", 4) == 0 && isspace((unsigned char)line[4])) {
900 const char* end = NULL;
901 strlcpy((char*)rr, line, *len);
904 if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
905 parse_state->default_ttl = sldns_str2period(
906 sldns_strip_ws(line+5), &end);
907 } else if (strncmp(line, "$INCLUDE", 8) == 0) {
908 strlcpy((char*)rr, line, *len);
911 return LDNS_WIREPARSE_ERR_INCLUDE;
912 } else if (strncmp(line, "$", 1) == 0) {
913 strlcpy((char*)rr, line, *len);
916 return LDNS_WIREPARSE_ERR_INCLUDE;
918 int r = sldns_str2wire_rr_buf(line, rr, len, dname_len,
919 parse_state?parse_state->default_ttl:0,
920 (parse_state&&parse_state->origin_len)?
921 parse_state->origin:NULL,
922 parse_state?parse_state->origin_len:0,
923 (parse_state&&parse_state->prev_rr_len)?
924 parse_state->prev_rr:NULL,
925 parse_state?parse_state->prev_rr_len:0);
926 if(r == LDNS_WIREPARSE_ERR_OK && (*dname_len) != 0 &&
928 (*dname_len) <= sizeof(parse_state->prev_rr)) {
929 memmove(parse_state->prev_rr, rr, *dname_len);
930 parse_state->prev_rr_len = (*dname_len);
934 return LDNS_WIREPARSE_ERR_OK;
937 int sldns_str2wire_rdf_buf(const char* str, uint8_t* rd, size_t* len,
938 sldns_rdf_type rdftype)
941 case LDNS_RDF_TYPE_DNAME:
942 return sldns_str2wire_dname_buf(str, rd, len);
943 case LDNS_RDF_TYPE_INT8:
944 return sldns_str2wire_int8_buf(str, rd, len);
945 case LDNS_RDF_TYPE_INT16:
946 return sldns_str2wire_int16_buf(str, rd, len);
947 case LDNS_RDF_TYPE_INT32:
948 return sldns_str2wire_int32_buf(str, rd, len);
949 case LDNS_RDF_TYPE_A:
950 return sldns_str2wire_a_buf(str, rd, len);
951 case LDNS_RDF_TYPE_AAAA:
952 return sldns_str2wire_aaaa_buf(str, rd, len);
953 case LDNS_RDF_TYPE_STR:
954 return sldns_str2wire_str_buf(str, rd, len);
955 case LDNS_RDF_TYPE_APL:
956 return sldns_str2wire_apl_buf(str, rd, len);
957 case LDNS_RDF_TYPE_B64:
958 return sldns_str2wire_b64_buf(str, rd, len);
959 case LDNS_RDF_TYPE_B32_EXT:
960 return sldns_str2wire_b32_ext_buf(str, rd, len);
961 case LDNS_RDF_TYPE_HEX:
962 return sldns_str2wire_hex_buf(str, rd, len);
963 case LDNS_RDF_TYPE_NSEC:
964 return sldns_str2wire_nsec_buf(str, rd, len);
965 case LDNS_RDF_TYPE_TYPE:
966 return sldns_str2wire_type_buf(str, rd, len);
967 case LDNS_RDF_TYPE_CLASS:
968 return sldns_str2wire_class_buf(str, rd, len);
969 case LDNS_RDF_TYPE_CERT_ALG:
970 return sldns_str2wire_cert_alg_buf(str, rd, len);
971 case LDNS_RDF_TYPE_ALG:
972 return sldns_str2wire_alg_buf(str, rd, len);
973 case LDNS_RDF_TYPE_TIME:
974 return sldns_str2wire_time_buf(str, rd, len);
975 case LDNS_RDF_TYPE_PERIOD:
976 return sldns_str2wire_period_buf(str, rd, len);
977 case LDNS_RDF_TYPE_TSIGTIME:
978 return sldns_str2wire_tsigtime_buf(str, rd, len);
979 case LDNS_RDF_TYPE_LOC:
980 return sldns_str2wire_loc_buf(str, rd, len);
981 case LDNS_RDF_TYPE_WKS:
982 return sldns_str2wire_wks_buf(str, rd, len);
983 case LDNS_RDF_TYPE_NSAP:
984 return sldns_str2wire_nsap_buf(str, rd, len);
985 case LDNS_RDF_TYPE_ATMA:
986 return sldns_str2wire_atma_buf(str, rd, len);
987 case LDNS_RDF_TYPE_IPSECKEY:
988 return sldns_str2wire_ipseckey_buf(str, rd, len);
989 case LDNS_RDF_TYPE_NSEC3_SALT:
990 return sldns_str2wire_nsec3_salt_buf(str, rd, len);
991 case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
992 return sldns_str2wire_b32_ext_buf(str, rd, len);
993 case LDNS_RDF_TYPE_ILNP64:
994 return sldns_str2wire_ilnp64_buf(str, rd, len);
995 case LDNS_RDF_TYPE_EUI48:
996 return sldns_str2wire_eui48_buf(str, rd, len);
997 case LDNS_RDF_TYPE_EUI64:
998 return sldns_str2wire_eui64_buf(str, rd, len);
999 case LDNS_RDF_TYPE_TAG:
1000 return sldns_str2wire_tag_buf(str, rd, len);
1001 case LDNS_RDF_TYPE_LONG_STR:
1002 return sldns_str2wire_long_str_buf(str, rd, len);
1003 case LDNS_RDF_TYPE_TSIGERROR:
1004 return sldns_str2wire_tsigerror_buf(str, rd, len);
1005 case LDNS_RDF_TYPE_HIP:
1006 return sldns_str2wire_hip_buf(str, rd, len);
1007 case LDNS_RDF_TYPE_INT16_DATA:
1008 return sldns_str2wire_int16_data_buf(str, rd, len);
1009 case LDNS_RDF_TYPE_UNKNOWN:
1010 case LDNS_RDF_TYPE_SERVICE:
1011 return LDNS_WIREPARSE_ERR_NOT_IMPL;
1012 case LDNS_RDF_TYPE_NONE:
1016 return LDNS_WIREPARSE_ERR_GENERAL;
1019 int sldns_str2wire_int8_buf(const char* str, uint8_t* rd, size_t* len)
1022 uint8_t r = (uint8_t)strtol((char*)str, &end, 10);
1024 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1026 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1029 return LDNS_WIREPARSE_ERR_OK;
1032 int sldns_str2wire_int16_buf(const char* str, uint8_t* rd, size_t* len)
1035 uint16_t r = (uint16_t)strtol((char*)str, &end, 10);
1037 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1039 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1040 sldns_write_uint16(rd, r);
1042 return LDNS_WIREPARSE_ERR_OK;
1045 int sldns_str2wire_int32_buf(const char* str, uint8_t* rd, size_t* len)
1049 errno = 0; /* must set to zero before call,
1050 note race condition on errno */
1052 r = (uint32_t)strtol((char*)str, &end, 10);
1053 else r = (uint32_t)strtoul((char*)str, &end, 10);
1055 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1057 return LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW;
1059 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1060 sldns_write_uint32(rd, r);
1062 return LDNS_WIREPARSE_ERR_OK;
1065 int sldns_str2wire_a_buf(const char* str, uint8_t* rd, size_t* len)
1067 struct in_addr address;
1068 if(inet_pton(AF_INET, (char*)str, &address) != 1)
1069 return LDNS_WIREPARSE_ERR_SYNTAX_IP4;
1070 if(*len < sizeof(address))
1071 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1072 memmove(rd, &address, sizeof(address));
1073 *len = sizeof(address);
1074 return LDNS_WIREPARSE_ERR_OK;
1077 int sldns_str2wire_aaaa_buf(const char* str, uint8_t* rd, size_t* len)
1080 uint8_t address[LDNS_IP6ADDRLEN + 1];
1081 if(inet_pton(AF_INET6, (char*)str, address) != 1)
1082 return LDNS_WIREPARSE_ERR_SYNTAX_IP6;
1083 if(*len < LDNS_IP6ADDRLEN)
1084 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1085 memmove(rd, address, LDNS_IP6ADDRLEN);
1086 *len = LDNS_IP6ADDRLEN;
1087 return LDNS_WIREPARSE_ERR_OK;
1089 return LDNS_WIREPARSE_ERR_NOT_IMPL;
1093 int sldns_str2wire_str_buf(const char* str, uint8_t* rd, size_t* len)
1097 const char* s = str;
1098 /* skip length byte */
1100 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1102 /* read characters */
1103 while(sldns_parse_char(&ch, &s)) {
1105 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR, s-str);
1107 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1112 return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
1113 rd[0] = (uint8_t)sl;
1115 return LDNS_WIREPARSE_ERR_OK;
1118 int sldns_str2wire_apl_buf(const char* str, uint8_t* rd, size_t* len)
1120 const char *my_str = str;
1127 size_t adflength = 0;
1132 if(*my_str == '\0') {
1133 /* empty APL element, no data, no string */
1135 return LDNS_WIREPARSE_ERR_OK;
1138 /* [!]afi:address/prefix */
1139 if (strlen(my_str) < 2
1140 || strchr(my_str, ':') == NULL
1141 || strchr(my_str, '/') == NULL
1142 || strchr(my_str, ':') > strchr(my_str, '/')) {
1143 return LDNS_WIREPARSE_ERR_INVALID_STR;
1146 if (my_str[0] == '!') {
1153 family = (uint16_t) atoi(my_str);
1155 my_str = strchr(my_str, ':') + 1;
1157 /* need ip addr and only ip addr for inet_pton */
1158 ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
1159 if(ip_str_len+1 > sizeof(my_ip_str))
1160 return LDNS_WIREPARSE_ERR_INVALID_STR;
1161 (void)strlcpy(my_ip_str, my_str, sizeof(my_ip_str));
1162 my_ip_str[ip_str_len] = 0;
1166 if(inet_pton(AF_INET, my_ip_str, data+4) == 0)
1167 return LDNS_WIREPARSE_ERR_INVALID_STR;
1168 for (i = 0; i < 4; i++) {
1169 if (data[i+4] != 0) {
1173 } else if (family == 2) {
1175 if (inet_pton(AF_INET6, my_ip_str, data+4) == 0)
1176 return LDNS_WIREPARSE_ERR_INVALID_STR;
1177 for (i = 0; i < 16; i++) {
1178 if (data[i+4] != 0) {
1183 /* unknown family */
1184 return LDNS_WIREPARSE_ERR_INVALID_STR;
1187 my_str = strchr(my_str, '/') + 1;
1188 prefix = (uint8_t) atoi(my_str);
1190 sldns_write_uint16(data, family);
1192 data[3] = (uint8_t)adflength;
1194 /* set bit 1 of byte 3 */
1195 data[3] = data[3] | 0x80;
1198 if(*len < 4+adflength)
1199 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1200 memmove(rd, data, 4+adflength);
1202 return LDNS_WIREPARSE_ERR_OK;
1205 int sldns_str2wire_b64_buf(const char* str, uint8_t* rd, size_t* len)
1207 size_t sz = sldns_b64_pton_calculate_size(strlen(str));
1209 if(strcmp(str, "0") == 0) {
1211 return LDNS_WIREPARSE_ERR_OK;
1214 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1215 n = sldns_b64_pton(str, rd, *len);
1217 return LDNS_WIREPARSE_ERR_SYNTAX_B64;
1219 return LDNS_WIREPARSE_ERR_OK;
1222 int sldns_str2wire_b32_ext_buf(const char* str, uint8_t* rd, size_t* len)
1224 size_t slen = strlen(str);
1225 size_t sz = sldns_b32_pton_calculate_size(slen);
1228 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1229 rd[0] = (uint8_t)sz;
1230 n = sldns_b32_pton_extended_hex(str, slen, rd+1, *len-1);
1232 return LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT;
1234 return LDNS_WIREPARSE_ERR_OK;
1237 /** see if the string ends, or ends in whitespace */
1239 sldns_is_last_of_string(const char* str)
1241 if(*str == 0) return 1;
1242 while(isspace((unsigned char)*str))
1244 if(*str == 0) return 1;
1248 int sldns_str2wire_hex_buf(const char* str, uint8_t* rd, size_t* len)
1250 const char* s = str;
1251 size_t dlen = 0; /* number of hexdigits parsed */
1253 if(isspace((unsigned char)*s)) {
1257 if(dlen == 0 && *s == '0' && sldns_is_last_of_string(s+1)) {
1259 return LDNS_WIREPARSE_ERR_OK;
1261 if(!isxdigit((unsigned char)*s))
1262 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1263 if(*len < dlen/2 + 1)
1264 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1267 rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1268 else rd[dlen/2] += (uint8_t)sldns_hexdigit_to_int(*s++);
1272 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1274 return LDNS_WIREPARSE_ERR_OK;
1277 int sldns_str2wire_nsec_buf(const char* str, uint8_t* rd, size_t* len)
1279 const char *delim = "\n\t ";
1280 char token[64]; /* for a type name */
1281 size_t type_count = 0;
1284 uint16_t maxtype = 0;
1285 uint8_t typebits[8192]; /* 65536 bits */
1286 uint8_t window_in_use[256];
1288 /* string in buffer */
1289 sldns_buffer strbuf;
1290 sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1292 /* parse the types */
1293 memset(typebits, 0, sizeof(typebits));
1294 memset(window_in_use, 0, sizeof(window_in_use));
1295 while(sldns_buffer_remaining(&strbuf) > 0 &&
1296 sldns_bget_token(&strbuf, token, delim, sizeof(token)) != -1) {
1297 uint16_t t = sldns_get_rr_type_by_name(token);
1300 if(t == 0 && strcmp(token, "TYPE0") != 0)
1301 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
1302 sldns_buffer_position(&strbuf));
1303 typebits[t/8] |= (0x80>>(t%8));
1304 window_in_use[t/256] = 1;
1306 if(t > maxtype) maxtype = t;
1309 /* empty NSEC bitmap */
1310 if(type_count == 0) {
1312 return LDNS_WIREPARSE_ERR_OK;
1315 /* encode windows {u8 windowblock, u8 bitmaplength, 0-32u8 bitmap},
1316 * block is 0-255 upper octet of types, length if 0-32. */
1317 for(block = 0; block <= (int)maxtype/256; block++) {
1318 int i, blocklen = 0;
1319 if(!window_in_use[block])
1321 for(i=0; i<32; i++) {
1322 if(typebits[block*32+i] != 0)
1326 continue; /* empty window should have been !in_use */
1327 if(used+blocklen+2 > *len)
1328 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1329 rd[used+0] = (uint8_t)block;
1330 rd[used+1] = (uint8_t)blocklen;
1331 for(i=0; i<blocklen; i++) {
1332 rd[used+2+i] = typebits[block*32+i];
1337 return LDNS_WIREPARSE_ERR_OK;
1340 int sldns_str2wire_type_buf(const char* str, uint8_t* rd, size_t* len)
1342 uint16_t t = sldns_get_rr_type_by_name(str);
1343 if(t == 0 && strcmp(str, "TYPE0") != 0)
1344 return LDNS_WIREPARSE_ERR_SYNTAX_TYPE;
1346 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1347 sldns_write_uint16(rd, t);
1349 return LDNS_WIREPARSE_ERR_OK;
1352 int sldns_str2wire_class_buf(const char* str, uint8_t* rd, size_t* len)
1354 uint16_t c = sldns_get_rr_class_by_name(str);
1355 if(c == 0 && strcmp(str, "CLASS0") != 0)
1356 return LDNS_WIREPARSE_ERR_SYNTAX_CLASS;
1358 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1359 sldns_write_uint16(rd, c);
1361 return LDNS_WIREPARSE_ERR_OK;
1364 /* An certificate alg field can either be specified as a 8 bits number
1365 * or by its symbolic name. Handle both */
1366 int sldns_str2wire_cert_alg_buf(const char* str, uint8_t* rd, size_t* len)
1368 sldns_lookup_table *lt = sldns_lookup_by_name(sldns_cert_algorithms,
1371 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1373 sldns_write_uint16(rd, (uint16_t)lt->id);
1375 int s = sldns_str2wire_int16_buf(str, rd, len);
1377 if(sldns_read_uint16(rd) == 0)
1378 return LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM;
1381 return LDNS_WIREPARSE_ERR_OK;
1384 /* An alg field can either be specified as a 8 bits number
1385 * or by its symbolic name. Handle both */
1386 int sldns_str2wire_alg_buf(const char* str, uint8_t* rd, size_t* len)
1388 sldns_lookup_table *lt = sldns_lookup_by_name(sldns_algorithms, str);
1390 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1392 rd[0] = (uint8_t)lt->id;
1395 /* try as-is (a number) */
1396 return sldns_str2wire_int8_buf(str, rd, len);
1398 return LDNS_WIREPARSE_ERR_OK;
1401 int sldns_str2wire_tsigerror_buf(const char* str, uint8_t* rd, size_t* len)
1403 sldns_lookup_table *lt = sldns_lookup_by_name(sldns_tsig_errors, str);
1405 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1407 sldns_write_uint16(rd, (uint16_t)lt->id);
1410 /* try as-is (a number) */
1411 return sldns_str2wire_int16_buf(str, rd, len);
1413 return LDNS_WIREPARSE_ERR_OK;
1416 int sldns_str2wire_time_buf(const char* str, uint8_t* rd, size_t* len)
1418 /* convert a time YYYYDDMMHHMMSS to wireformat */
1421 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1423 /* Try to scan the time... */
1424 memset(&tm, 0, sizeof(tm));
1425 if (strlen(str) == 14 && sscanf(str, "%4d%2d%2d%2d%2d%2d",
1426 &tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour,
1427 &tm.tm_min, &tm.tm_sec) == 6) {
1431 if (tm.tm_year < 70)
1432 return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1433 if (tm.tm_mon < 0 || tm.tm_mon > 11)
1434 return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1435 if (tm.tm_mday < 1 || tm.tm_mday > 31)
1436 return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1437 if (tm.tm_hour < 0 || tm.tm_hour > 23)
1438 return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1439 if (tm.tm_min < 0 || tm.tm_min > 59)
1440 return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1441 if (tm.tm_sec < 0 || tm.tm_sec > 59)
1442 return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1444 sldns_write_uint32(rd, (uint32_t)sldns_mktime_from_utc(&tm));
1446 /* handle it as 32 bits timestamp */
1448 uint32_t l = (uint32_t)strtol((char*)str, &end, 10);
1450 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME,
1452 sldns_write_uint32(rd, l);
1455 return LDNS_WIREPARSE_ERR_OK;
1458 int sldns_str2wire_tsigtime_buf(const char* str, uint8_t* rd, size_t* len)
1461 uint64_t t = (uint64_t)strtol((char*)str, &end, 10);
1465 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME, end-str);
1467 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1468 high = (uint16_t)(t>>32);
1469 low = (uint32_t)(t);
1470 sldns_write_uint16(rd, high);
1471 sldns_write_uint32(rd+2, low);
1473 return LDNS_WIREPARSE_ERR_OK;
1476 int sldns_str2wire_period_buf(const char* str, uint8_t* rd, size_t* len)
1479 uint32_t p = sldns_str2period(str, &end);
1481 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, end-str);
1483 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1484 sldns_write_uint32(rd, p);
1486 return LDNS_WIREPARSE_ERR_OK;
1489 /** read "<digits>[.<digits>][mM]" into mantissa exponent format for LOC type */
1491 loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
1493 uint32_t meters = 0, cm = 0, val;
1494 while (isblank((unsigned char)*my_str)) {
1497 meters = (uint32_t)strtol(my_str, &my_str, 10);
1498 if (*my_str == '.') {
1500 cm = (uint32_t)strtol(my_str, &my_str, 10);
1517 if (*my_str == 'm' || *my_str == 'M') {
1524 int sldns_str2wire_loc_buf(const char* str, uint8_t* rd, size_t* len)
1526 uint32_t latitude = 0;
1527 uint32_t longitude = 0;
1528 uint32_t altitude = 0;
1530 uint32_t equator = (uint32_t)1<<31; /* 2**31 */
1532 /* only support version 0 */
1535 uint8_t size_b = 1, size_e = 2;
1536 uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
1537 uint8_t vert_pre_b = 1, vert_pre_e = 3;
1543 char *my_str = (char *) str;
1545 if (isdigit((unsigned char) *my_str)) {
1546 h = (uint32_t) strtol(my_str, &my_str, 10);
1548 return LDNS_WIREPARSE_ERR_INVALID_STR;
1551 while (isblank((unsigned char) *my_str)) {
1555 if (isdigit((unsigned char) *my_str)) {
1556 m = (uint32_t) strtol(my_str, &my_str, 10);
1557 } else if (*my_str == 'N' || *my_str == 'S') {
1560 return LDNS_WIREPARSE_ERR_INVALID_STR;
1563 while (isblank((unsigned char) *my_str)) {
1567 if (isdigit((unsigned char) *my_str)) {
1568 s = strtod(my_str, &my_str);
1571 /* skip blanks before northerness */
1572 while (isblank((unsigned char) *my_str)) {
1577 if (*my_str == 'N') {
1579 } else if (*my_str == 'S') {
1582 return LDNS_WIREPARSE_ERR_INVALID_STR;
1589 /* add a little to make floor in conversion a round */
1591 latitude = (uint32_t) s;
1592 latitude += 1000 * 60 * m;
1593 latitude += 1000 * 60 * 60 * h;
1595 latitude = equator + latitude;
1597 latitude = equator - latitude;
1599 while (isblank((unsigned char)*my_str)) {
1603 if (isdigit((unsigned char) *my_str)) {
1604 h = (uint32_t) strtol(my_str, &my_str, 10);
1606 return LDNS_WIREPARSE_ERR_INVALID_STR;
1609 while (isblank((unsigned char) *my_str)) {
1613 if (isdigit((unsigned char) *my_str)) {
1614 m = (uint32_t) strtol(my_str, &my_str, 10);
1615 } else if (*my_str == 'E' || *my_str == 'W') {
1618 return LDNS_WIREPARSE_ERR_INVALID_STR;
1621 while (isblank((unsigned char)*my_str)) {
1625 if (isdigit((unsigned char) *my_str)) {
1626 s = strtod(my_str, &my_str);
1629 /* skip blanks before easterness */
1630 while (isblank((unsigned char)*my_str)) {
1635 if (*my_str == 'E') {
1637 } else if (*my_str == 'W') {
1640 return LDNS_WIREPARSE_ERR_INVALID_STR;
1647 /* add a little to make floor in conversion a round */
1649 longitude = (uint32_t) s;
1650 longitude += 1000 * 60 * m;
1651 longitude += 1000 * 60 * 60 * h;
1654 longitude += equator;
1656 longitude = equator - longitude;
1659 altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
1661 if (*my_str == 'm' || *my_str == 'M') {
1665 if (strlen(my_str) > 0) {
1666 if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1667 return LDNS_WIREPARSE_ERR_INVALID_STR;
1670 if (strlen(my_str) > 0) {
1671 if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1672 return LDNS_WIREPARSE_ERR_INVALID_STR;
1675 if (strlen(my_str) > 0) {
1676 if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1677 return LDNS_WIREPARSE_ERR_INVALID_STR;
1681 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1683 rd[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1684 rd[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1685 rd[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1686 sldns_write_uint32(rd + 4, latitude);
1687 sldns_write_uint32(rd + 8, longitude);
1688 sldns_write_uint32(rd + 12, altitude);
1690 return LDNS_WIREPARSE_ERR_OK;
1694 ldns_tolower_str(char* s)
1698 *s = (char)tolower((unsigned char)*s);
1704 int sldns_str2wire_wks_buf(const char* str, uint8_t* rd, size_t* len)
1708 char token[50], proto_str[50];
1709 sldns_buffer strbuf;
1710 sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1713 /* check we have one byte for proto */
1715 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1717 while(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) > 0) {
1718 ldns_tolower_str(token);
1720 struct protoent *p = getprotobyname(token);
1722 if(p) rd[0] = (uint8_t)p->p_proto;
1723 else if(strcasecmp(token, "tcp")==0) rd[0]=6;
1724 else if(strcasecmp(token, "udp")==0) rd[0]=17;
1725 else rd[0] = (uint8_t)atoi(token);
1726 (void)strlcpy(proto_str, token, sizeof(proto_str));
1729 struct servent *serv = getservbyname(token, proto_str);
1730 if(serv) serv_port=(int)ntohs((uint16_t)serv->s_port);
1731 else if(strcasecmp(token, "domain")==0) serv_port=53;
1733 serv_port = atoi(token);
1734 if(serv_port == 0 && strcmp(token, "0") != 0) {
1735 #ifdef HAVE_ENDSERVENT
1738 #ifdef HAVE_ENDPROTOENT
1741 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1742 sldns_buffer_position(&strbuf));
1744 if(serv_port < 0 || serv_port > 65535) {
1745 #ifdef HAVE_ENDSERVENT
1748 #ifdef HAVE_ENDPROTOENT
1751 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1752 sldns_buffer_position(&strbuf));
1755 if(rd_len < 1+serv_port/8+1) {
1756 /* bitmap is larger, init new bytes at 0 */
1757 if(*len < 1+(size_t)serv_port/8+1) {
1758 #ifdef HAVE_ENDSERVENT
1761 #ifdef HAVE_ENDPROTOENT
1765 LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1766 sldns_buffer_position(&strbuf));
1768 memset(rd+rd_len, 0, 1+(size_t)serv_port/8+1-rd_len);
1769 rd_len = 1+serv_port/8+1;
1771 rd[1+ serv_port/8] |= (1 << (7 - serv_port % 8));
1774 *len = (size_t)rd_len;
1776 #ifdef HAVE_ENDSERVENT
1779 #ifdef HAVE_ENDPROTOENT
1782 return LDNS_WIREPARSE_ERR_OK;
1785 int sldns_str2wire_nsap_buf(const char* str, uint8_t* rd, size_t* len)
1787 const char* s = str;
1789 size_t dlen = 0; /* number of hexdigits parsed */
1791 /* just a hex string with optional dots? */
1792 if (s[0] != '0' || s[1] != 'x')
1793 return LDNS_WIREPARSE_ERR_INVALID_STR;
1796 if(slen > LDNS_MAX_RDFLEN*2)
1797 return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1799 if(isspace((unsigned char)*s) || *s == '.') {
1803 if(!isxdigit((unsigned char)*s))
1804 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1805 if(*len < dlen/2 + 1)
1806 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1809 rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1810 else rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1814 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1816 return LDNS_WIREPARSE_ERR_OK;
1819 int sldns_str2wire_atma_buf(const char* str, uint8_t* rd, size_t* len)
1821 const char* s = str;
1822 size_t slen = strlen(str);
1823 size_t dlen = 0; /* number of hexdigits parsed */
1825 /* just a hex string with optional dots? */
1826 /* notimpl e.164 format */
1827 if(slen > LDNS_MAX_RDFLEN*2)
1828 return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1830 if(isspace((unsigned char)*s) || *s == '.') {
1834 if(!isxdigit((unsigned char)*s))
1835 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1836 if(*len < dlen/2 + 1)
1837 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1840 rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1841 else rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1845 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1847 return LDNS_WIREPARSE_ERR_OK;
1850 int sldns_str2wire_ipseckey_buf(const char* str, uint8_t* rd, size_t* len)
1852 size_t gwlen = 0, keylen = 0;
1856 sldns_buffer strbuf;
1857 sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1860 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1862 if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1863 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1864 sldns_buffer_position(&strbuf));
1865 rd[0] = (uint8_t)atoi(token);
1867 if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1868 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1869 sldns_buffer_position(&strbuf));
1870 rd[1] = (uint8_t)atoi(token);
1873 if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1874 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1875 sldns_buffer_position(&strbuf));
1876 rd[2] = (uint8_t)atoi(token);
1879 if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1880 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1881 sldns_buffer_position(&strbuf));
1884 if(strcmp(token, ".") != 0)
1885 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1886 sldns_buffer_position(&strbuf));
1888 } else if(gwtype == 1) {
1891 s = sldns_str2wire_a_buf(token, rd+3, &gwlen);
1892 if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1893 } else if(gwtype == 2) {
1896 s = sldns_str2wire_aaaa_buf(token, rd+3, &gwlen);
1897 if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1898 } else if(gwtype == 3) {
1901 s = sldns_str2wire_dname_buf(token, rd+3, &gwlen);
1902 if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1904 /* unknown gateway type */
1905 return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1906 sldns_buffer_position(&strbuf));
1908 /* double check for size */
1909 if(*len < 3 + gwlen)
1910 return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1911 sldns_buffer_position(&strbuf));
1913 /* publickey in remainder of strbuf */
1914 keylen = *len - 3 - gwlen;
1915 s = sldns_str2wire_b64_buf((const char*)sldns_buffer_current(&strbuf),
1916 rd+3+gwlen, &keylen);
1917 if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1919 *len = 3 + gwlen + keylen;
1920 return LDNS_WIREPARSE_ERR_OK;
1923 int sldns_str2wire_nsec3_salt_buf(const char* str, uint8_t* rd, size_t* len)
1925 int i, salt_length_str = (int)strlen(str);
1926 if (salt_length_str == 1 && str[0] == '-') {
1927 salt_length_str = 0;
1928 } else if (salt_length_str % 2 != 0) {
1929 return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1931 if (salt_length_str > 512)
1932 return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1933 if(*len < 1+(size_t)salt_length_str / 2)
1934 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1935 rd[0] = (uint8_t) (salt_length_str / 2);
1936 for (i = 0; i < salt_length_str; i += 2) {
1937 if (isxdigit((unsigned char)str[i]) &&
1938 isxdigit((unsigned char)str[i+1])) {
1939 rd[1+i/2] = (uint8_t)(sldns_hexdigit_to_int(str[i])*16
1940 + sldns_hexdigit_to_int(str[i+1]));
1942 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, i);
1945 *len = 1 + (size_t)rd[0];
1946 return LDNS_WIREPARSE_ERR_OK;
1949 int sldns_str2wire_ilnp64_buf(const char* str, uint8_t* rd, size_t* len)
1951 unsigned int a, b, c, d;
1954 if(*len < sizeof(shorts))
1955 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1957 if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1958 l != (int)strlen(str) || /* more data to read */
1959 strpbrk(str, "+-") /* signed hexes */
1961 return LDNS_WIREPARSE_ERR_SYNTAX_ILNP64;
1962 shorts[0] = htons(a);
1963 shorts[1] = htons(b);
1964 shorts[2] = htons(c);
1965 shorts[3] = htons(d);
1966 memmove(rd, &shorts, sizeof(shorts));
1967 *len = sizeof(shorts);
1968 return LDNS_WIREPARSE_ERR_OK;
1971 int sldns_str2wire_eui48_buf(const char* str, uint8_t* rd, size_t* len)
1973 unsigned int a, b, c, d, e, f;
1977 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1978 if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1979 &a, &b, &c, &d, &e, &f, &l) != 6 ||
1980 l != (int)strlen(str))
1981 return LDNS_WIREPARSE_ERR_SYNTAX_EUI48;
1989 return LDNS_WIREPARSE_ERR_OK;
1992 int sldns_str2wire_eui64_buf(const char* str, uint8_t* rd, size_t* len)
1994 unsigned int a, b, c, d, e, f, g, h;
1998 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1999 if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
2000 &a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
2001 l != (int)strlen(str))
2002 return LDNS_WIREPARSE_ERR_SYNTAX_EUI64;
2012 return LDNS_WIREPARSE_ERR_OK;
2015 int sldns_str2wire_tag_buf(const char* str, uint8_t* rd, size_t* len)
2017 size_t slen = strlen(str);
2021 return LDNS_WIREPARSE_ERR_SYNTAX_TAG;
2023 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2024 for (ptr = str; *ptr; ptr++) {
2025 if(!isalnum((unsigned char)*ptr))
2026 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TAG, ptr-str);
2028 rd[0] = (uint8_t)slen;
2029 memmove(rd+1, str, slen);
2031 return LDNS_WIREPARSE_ERR_OK;
2034 int sldns_str2wire_long_str_buf(const char* str, uint8_t* rd, size_t* len)
2037 const char* pstr = str;
2040 /* Fill data with parsed bytes */
2041 while (sldns_parse_char(&ch, &pstr)) {
2043 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2047 return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
2049 return LDNS_WIREPARSE_ERR_OK;
2052 int sldns_str2wire_hip_buf(const char* str, uint8_t* rd, size_t* len)
2056 size_t hitlen, pklen = 0;
2057 /* presentation format:
2058 * pk-algo HIThex pubkeybase64
2060 * hitlen[1byte] pkalgo[1byte] pubkeylen[2byte] [hit] [pubkey] */
2062 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2064 /* read PK algorithm */
2065 rd[1] = (uint8_t)strtol((char*)str, &s, 10);
2067 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2072 /* read HIT hex tag */
2073 /* zero terminate the tag (replace later) */
2074 end = strchr(s, ' ');
2075 if(!end) return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX, s-(char*)str);
2078 if((e = sldns_str2wire_hex_buf(s, rd+4, &hitlen)) != 0) {
2080 return RET_ERR_SHIFT(e, s-(char*)str);
2084 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+255*2);
2086 rd[0] = (uint8_t)hitlen;
2090 /* read pubkey base64 sequence */
2091 pklen = *len - 4 - hitlen;
2092 if((e = sldns_str2wire_b64_buf(s, rd+4+hitlen, &pklen)) != 0)
2093 return RET_ERR_SHIFT(e, s-(char*)str);
2095 return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+65535);
2096 sldns_write_uint16(rd+2, (uint16_t)pklen);
2098 *len = 4 + hitlen + pklen;
2099 return LDNS_WIREPARSE_ERR_OK;
2102 int sldns_str2wire_int16_data_buf(const char* str, uint8_t* rd, size_t* len)
2106 n = strtol(str, &s, 10);
2107 if(n < 0) /* negative number not allowed */
2108 return LDNS_WIREPARSE_ERR_SYNTAX;
2109 if(*len < ((size_t)n)+2)
2110 return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2112 return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
2115 sldns_write_uint16(rd, 0);
2117 return LDNS_WIREPARSE_ERR_OK;
2120 return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2125 n = sldns_b64_pton(s, rd+2, (*len)-2);
2127 return LDNS_WIREPARSE_ERR_SYNTAX_B64;
2128 sldns_write_uint16(rd, (uint16_t)n);
2129 *len = ((size_t)n)+2;
2130 return LDNS_WIREPARSE_ERR_OK;