]> CyberLeo.Net >> Repos - FreeBSD/releng/10.3.git/blob - contrib/unbound/sldns/wire2str.c
- Copy stable/10@296371 to releng/10.3 in preparation for 10.3-RC1
[FreeBSD/releng/10.3.git] / contrib / unbound / sldns / wire2str.c
1 /*
2  * wire2str.c
3  *
4  * conversion routines from the wire format
5  * to the presentation format (strings)
6  *
7  * (c) NLnet Labs, 2004-2006
8  *
9  * See the file LICENSE for the license
10  */
11 /**
12  * \file
13  *
14  * Contains functions to translate the wireformat to text
15  * representation, as well as functions to print them.
16  */
17 #include "config.h"
18 #include "sldns/wire2str.h"
19 #include "sldns/str2wire.h"
20 #include "sldns/rrdef.h"
21 #include "sldns/pkthdr.h"
22 #include "sldns/parseutil.h"
23 #include "sldns/sbuffer.h"
24 #include "sldns/keyraw.h"
25 #ifdef HAVE_TIME_H
26 #include <time.h>
27 #endif
28 #include <sys/time.h>
29 #include <stdarg.h>
30 #include <ctype.h>
31 #ifdef HAVE_NETDB_H
32 #include <netdb.h>
33 #endif
34
35 /* lookup tables for standard DNS stuff  */
36 /* Taken from RFC 2535, section 7.  */
37 static sldns_lookup_table sldns_algorithms_data[] = {
38         { LDNS_RSAMD5, "RSAMD5" },
39         { LDNS_DH, "DH" },
40         { LDNS_DSA, "DSA" },
41         { LDNS_ECC, "ECC" },
42         { LDNS_RSASHA1, "RSASHA1" },
43         { LDNS_DSA_NSEC3, "DSA-NSEC3-SHA1" },
44         { LDNS_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
45         { LDNS_RSASHA256, "RSASHA256"},
46         { LDNS_RSASHA512, "RSASHA512"},
47         { LDNS_ECC_GOST, "ECC-GOST"},
48         { LDNS_ECDSAP256SHA256, "ECDSAP256SHA256"},
49         { LDNS_ECDSAP384SHA384, "ECDSAP384SHA384"},
50         { LDNS_INDIRECT, "INDIRECT" },
51         { LDNS_PRIVATEDNS, "PRIVATEDNS" },
52         { LDNS_PRIVATEOID, "PRIVATEOID" },
53         { 0, NULL }
54 };
55 sldns_lookup_table* sldns_algorithms = sldns_algorithms_data;
56
57 /* hash algorithms in DS record */
58 static sldns_lookup_table sldns_hashes_data[] = {
59         { LDNS_SHA1, "SHA1" },
60         { LDNS_SHA256, "SHA256" },
61         { LDNS_HASH_GOST, "HASH-GOST" },
62         { LDNS_SHA384, "SHA384" },
63         { 0, NULL }
64 };
65 sldns_lookup_table* sldns_hashes = sldns_hashes_data;
66
67 /* Taken from RFC 4398  */
68 static sldns_lookup_table sldns_cert_algorithms_data[] = {
69         { LDNS_CERT_PKIX, "PKIX" },
70         { LDNS_CERT_SPKI, "SPKI" },
71         { LDNS_CERT_PGP, "PGP" },
72         { LDNS_CERT_IPKIX, "IPKIX" },
73         { LDNS_CERT_ISPKI, "ISPKI" },
74         { LDNS_CERT_IPGP, "IPGP" },
75         { LDNS_CERT_ACPKIX, "ACPKIX" },
76         { LDNS_CERT_IACPKIX, "IACPKIX" },
77         { LDNS_CERT_URI, "URI" },
78         { LDNS_CERT_OID, "OID" },
79         { 0, NULL }
80 };
81 sldns_lookup_table* sldns_cert_algorithms = sldns_cert_algorithms_data;
82
83 /* if these are used elsewhere */
84 static sldns_lookup_table sldns_rcodes_data[] = {
85         { LDNS_RCODE_NOERROR, "NOERROR" },
86         { LDNS_RCODE_FORMERR, "FORMERR" },
87         { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
88         { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
89         { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
90         { LDNS_RCODE_REFUSED, "REFUSED" },
91         { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
92         { LDNS_RCODE_YXRRSET, "YXRRSET" },
93         { LDNS_RCODE_NXRRSET, "NXRRSET" },
94         { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
95         { LDNS_RCODE_NOTZONE, "NOTZONE" },
96         { 0, NULL }
97 };
98 sldns_lookup_table* sldns_rcodes = sldns_rcodes_data;
99
100 static sldns_lookup_table sldns_opcodes_data[] = {
101         { LDNS_PACKET_QUERY, "QUERY" },
102         { LDNS_PACKET_IQUERY, "IQUERY" },
103         { LDNS_PACKET_STATUS, "STATUS" },
104         { LDNS_PACKET_NOTIFY, "NOTIFY" },
105         { LDNS_PACKET_UPDATE, "UPDATE" },
106         { 0, NULL }
107 };
108 sldns_lookup_table* sldns_opcodes = sldns_opcodes_data;
109
110 static sldns_lookup_table sldns_wireparse_errors_data[] = {
111         { LDNS_WIREPARSE_ERR_OK, "no parse error" },
112         { LDNS_WIREPARSE_ERR_GENERAL, "parse error" },
113         { LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, "Domainname length overflow" },
114         { LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, "Domainname length underflow (zero length)" },
115         { LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, "buffer too small" },
116         { LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, "Label length overflow" },
117         { LDNS_WIREPARSE_ERR_EMPTY_LABEL, "Empty label" },
118         { LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, "Syntax error, bad escape sequence" },
119         { LDNS_WIREPARSE_ERR_SYNTAX, "Syntax error, could not parse the RR" },
120         { LDNS_WIREPARSE_ERR_SYNTAX_TTL, "Syntax error, could not parse the RR's TTL" },
121         { LDNS_WIREPARSE_ERR_SYNTAX_TYPE, "Syntax error, could not parse the RR's type" },
122         { LDNS_WIREPARSE_ERR_SYNTAX_CLASS, "Syntax error, could not parse the RR's class" },
123         { LDNS_WIREPARSE_ERR_SYNTAX_RDATA, "Syntax error, could not parse the RR's rdata" },
124         { LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE, "Syntax error, value expected" },
125         { LDNS_WIREPARSE_ERR_INVALID_STR, "Conversion error, string expected" },
126         { LDNS_WIREPARSE_ERR_SYNTAX_B64, "Conversion error, b64 encoding expected" },
127         { LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT, "Conversion error, b32 ext encoding expected" },
128         { LDNS_WIREPARSE_ERR_SYNTAX_HEX, "Conversion error, hex encoding expected" },
129         { LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM, "Bad algorithm type for CERT record" },
130         { LDNS_WIREPARSE_ERR_SYNTAX_TIME, "Conversion error, time encoding expected" },
131         { LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, "Conversion error, time period encoding expected" },
132         { LDNS_WIREPARSE_ERR_SYNTAX_ILNP64, "Conversion error, 4 colon separated hex numbers expected" },
133         { LDNS_WIREPARSE_ERR_SYNTAX_EUI48,
134                 "Conversion error, 6 two character hex numbers "
135                 "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx" },
136         { LDNS_WIREPARSE_ERR_SYNTAX_EUI64,
137                 "Conversion error, 8 two character hex numbers "
138                 "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx-xx-xx" },
139         { LDNS_WIREPARSE_ERR_SYNTAX_TAG,
140                 "Conversion error, a non-zero sequence of US-ASCII letters "
141                 "and numbers in lower case expected" },
142         { LDNS_WIREPARSE_ERR_NOT_IMPL, "not implemented" },
143         { LDNS_WIREPARSE_ERR_SYNTAX_INT, "Conversion error, integer expected" },
144         { LDNS_WIREPARSE_ERR_SYNTAX_IP4, "Conversion error, ip4 addr expected" },
145         { LDNS_WIREPARSE_ERR_SYNTAX_IP6, "Conversion error, ip6 addr expected" },
146         { LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW, "Syntax error, integer overflow" },
147         { LDNS_WIREPARSE_ERR_INCLUDE, "$INCLUDE directive was seen in the zone" },
148         { LDNS_WIREPARSE_ERR_PARENTHESIS, "Parse error, parenthesis mismatch" },
149         { 0, NULL }
150 };
151 sldns_lookup_table* sldns_wireparse_errors = sldns_wireparse_errors_data;
152
153 static sldns_lookup_table sldns_edns_flags_data[] = {
154         { 3600, "do"},
155         { 0, NULL}
156 };
157 sldns_lookup_table* sldns_edns_flags = sldns_edns_flags_data;
158
159 static sldns_lookup_table sldns_edns_options_data[] = {
160         { 1, "LLQ" },
161         { 2, "UL" },
162         { 3, "NSID" },
163         /* 4 draft-cheshire-edns0-owner-option */
164         { 5, "DAU" },
165         { 6, "DHU" },
166         { 7, "N3U" },
167         { 8, "edns-client-subnet" },
168         { 0, NULL}
169 };
170 sldns_lookup_table* sldns_edns_options = sldns_edns_options_data;
171
172 char* sldns_wire2str_pkt(uint8_t* data, size_t len)
173 {
174         size_t slen = (size_t)sldns_wire2str_pkt_buf(data, len, NULL, 0);
175         char* result = (char*)malloc(slen+1);
176         if(!result) return NULL;
177         sldns_wire2str_pkt_buf(data, len, result, slen+1);
178         return result;
179 }
180
181 char* sldns_wire2str_rr(uint8_t* rr, size_t len)
182 {
183         size_t slen = (size_t)sldns_wire2str_rr_buf(rr, len, NULL, 0);
184         char* result = (char*)malloc(slen+1);
185         if(!result) return NULL;
186         sldns_wire2str_rr_buf(rr, len, result, slen+1);
187         return result;
188 }
189
190 char* sldns_wire2str_type(uint16_t rrtype)
191 {
192         char buf[16];
193         sldns_wire2str_type_buf(rrtype, buf, sizeof(buf));
194         return strdup(buf);
195 }
196
197 char* sldns_wire2str_class(uint16_t rrclass)
198 {
199         char buf[16];
200         sldns_wire2str_class_buf(rrclass, buf, sizeof(buf));
201         return strdup(buf);
202 }
203
204 char* sldns_wire2str_dname(uint8_t* dname, size_t dname_len)
205 {
206         size_t slen=(size_t)sldns_wire2str_dname_buf(dname, dname_len, NULL, 0);
207         char* result = (char*)malloc(slen+1);
208         if(!result) return NULL;
209         sldns_wire2str_dname_buf(dname, dname_len, result, slen+1);
210         return result;
211 }
212
213 char* sldns_wire2str_rcode(int rcode)
214 {
215         char buf[16];
216         sldns_wire2str_rcode_buf(rcode, buf, sizeof(buf));
217         return strdup(buf);
218 }
219
220 int sldns_wire2str_pkt_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
221 {
222         /* use arguments as temporary variables */
223         return sldns_wire2str_pkt_scan(&d, &dlen, &s, &slen);
224 }
225
226 int sldns_wire2str_rr_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
227 {
228         /* use arguments as temporary variables */
229         return sldns_wire2str_rr_scan(&d, &dlen, &s, &slen, NULL, 0);
230 }
231
232 int sldns_wire2str_rdata_buf(uint8_t* rdata, size_t rdata_len, char* str,
233         size_t str_len, uint16_t rrtype)
234 {
235         /* use arguments as temporary variables */
236         return sldns_wire2str_rdata_scan(&rdata, &rdata_len, &str, &str_len,
237                 rrtype, NULL, 0);
238 }
239
240 int sldns_wire2str_rr_unknown_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
241 {
242         /* use arguments as temporary variables */
243         return sldns_wire2str_rr_unknown_scan(&d, &dlen, &s, &slen, NULL, 0);
244 }
245
246 int sldns_wire2str_rr_comment_buf(uint8_t* rr, size_t rrlen, size_t dname_len,
247         char* s, size_t slen)
248 {
249         uint16_t rrtype = sldns_wirerr_get_type(rr, rrlen, dname_len);
250         return sldns_wire2str_rr_comment_print(&s, &slen, rr, rrlen, dname_len,
251                 rrtype);
252 }
253
254 int sldns_wire2str_type_buf(uint16_t rrtype, char* s, size_t slen)
255 {
256         /* use arguments as temporary variables */
257         return sldns_wire2str_type_print(&s, &slen, rrtype);
258 }
259
260 int sldns_wire2str_class_buf(uint16_t rrclass, char* s, size_t slen)
261 {
262         /* use arguments as temporary variables */
263         return sldns_wire2str_class_print(&s, &slen, rrclass);
264 }
265
266 int sldns_wire2str_rcode_buf(int rcode, char* s, size_t slen)
267 {
268         /* use arguments as temporary variables */
269         return sldns_wire2str_rcode_print(&s, &slen, rcode);
270 }
271
272 int sldns_wire2str_dname_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
273 {
274         /* use arguments as temporary variables */
275         return sldns_wire2str_dname_scan(&d, &dlen, &s, &slen, NULL, 0);
276 }
277
278 int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args)
279 {
280         int w = vsnprintf(*str, *slen, format, args);
281         if(w < 0) {
282                 /* error in printout */
283                 return 0;
284         } else if((size_t)w >= *slen) {
285                 *str = NULL; /* we do not want str to point outside of buffer*/
286                 *slen = 0;
287         } else {
288                 *str += w;
289                 *slen -= w;
290         }
291         return w;
292 }
293
294 int sldns_str_print(char** str, size_t* slen, const char* format, ...)
295 {
296         int w;
297         va_list args;
298         va_start(args, format);
299         w = sldns_str_vprint(str, slen, format, args);
300         va_end(args);
301         return w;
302 }
303
304 /** print hex format into text buffer for specified length */
305 static int print_hex_buf(char** s, size_t* slen, uint8_t* buf, size_t len)
306 {
307         const char* hex = "0123456789ABCDEF";
308         size_t i;
309         for(i=0; i<len; i++) {
310                 (void)sldns_str_print(s, slen, "%c%c", hex[(buf[i]&0xf0)>>4],
311                         hex[buf[i]&0x0f]);
312         }
313         return (int)len*2;
314 }
315
316 /** print remainder of buffer in hex format with prefixed text */
317 static int print_remainder_hex(const char* pref, uint8_t** d, size_t* dlen,
318         char** s, size_t* slen)
319 {
320         int w = 0;
321         w += sldns_str_print(s, slen, "%s", pref);
322         w += print_hex_buf(s, slen, *d, *dlen);
323         *d += *dlen;
324         *dlen = 0;
325         return w;
326 }
327
328 int sldns_wire2str_pkt_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
329 {
330         int w = 0;
331         unsigned qdcount, ancount, nscount, arcount, i;
332         uint8_t* pkt = *d;
333         size_t pktlen = *dlen;
334         if(*dlen >= LDNS_HEADER_SIZE) {
335                 qdcount = (unsigned)LDNS_QDCOUNT(*d);
336                 ancount = (unsigned)LDNS_ANCOUNT(*d);
337                 nscount = (unsigned)LDNS_NSCOUNT(*d);
338                 arcount = (unsigned)LDNS_ARCOUNT(*d);
339         } else {
340                 qdcount = ancount = nscount = arcount = 0;
341         }
342         w += sldns_wire2str_header_scan(d, dlen, s, slen);
343         w += sldns_str_print(s, slen, "\n");
344         w += sldns_str_print(s, slen, ";; QUESTION SECTION:\n");
345         for(i=0; i<qdcount; i++) {
346                 w += sldns_wire2str_rrquestion_scan(d, dlen, s, slen,
347                         pkt, pktlen);
348                 if(!*dlen) break;
349         }
350         w += sldns_str_print(s, slen, "\n");
351         w += sldns_str_print(s, slen, ";; ANSWER SECTION:\n");
352         for(i=0; i<ancount; i++) {
353                 w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen);
354                 if(!*dlen) break;
355         }
356         w += sldns_str_print(s, slen, "\n");
357         w += sldns_str_print(s, slen, ";; AUTHORITY SECTION:\n");
358         for(i=0; i<nscount; i++) {
359                 w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen);
360                 if(!*dlen) break;
361         }
362         w += sldns_str_print(s, slen, "\n");
363         w += sldns_str_print(s, slen, ";; ADDITIONAL SECTION:\n");
364         for(i=0; i<arcount; i++) {
365                 w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen);
366                 if(!*dlen) break;
367         }
368         /* other fields: WHEN(time), SERVER(IP) not available here. */
369         w += sldns_str_print(s, slen, ";; MSG SIZE  rcvd: %d\n", (int)pktlen);
370         if(*dlen > 0) {
371                 w += print_remainder_hex(";; trailing garbage 0x",
372                         d, dlen, s, slen);
373                 w += sldns_str_print(s, slen, "\n");
374         }
375         return w;
376 }
377
378 /** scan type, class and ttl and printout, for rr */
379 static int sldns_rr_tcttl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
380 {
381         int w = 0;
382         uint16_t t, c;
383         uint32_t ttl;
384         if(*dl < 8) {
385                 if(*dl < 4)
386                         return w + print_remainder_hex("; Error malformed 0x",
387                                 d, dl, s, sl);
388                 /* these print values or 0x.. if none left */
389                 t = sldns_read_uint16(*d);
390                 c = sldns_read_uint16((*d)+2);
391                 (*d)+=4;
392                 (*dl)-=4;
393                 w += sldns_wire2str_class_print(s, sl, c);
394                 w += sldns_str_print(s, sl, "\t");
395                 w += sldns_wire2str_type_print(s, sl, t);
396                 if(*dl == 0)
397                         return w + sldns_str_print(s, sl, "; Error no ttl");
398                 return w + print_remainder_hex(
399                         "; Error malformed ttl 0x", d, dl, s, sl);
400         }
401         t = sldns_read_uint16(*d);
402         c = sldns_read_uint16((*d)+2);
403         ttl = sldns_read_uint32((*d)+4);
404         (*d)+=8;
405         (*dl)-=8;
406         w += sldns_str_print(s, sl, "%lu\t", (unsigned long)ttl);
407         w += sldns_wire2str_class_print(s, sl, c);
408         w += sldns_str_print(s, sl, "\t");
409         w += sldns_wire2str_type_print(s, sl, t);
410         return w;
411 }
412
413 int sldns_wire2str_rr_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
414         uint8_t* pkt, size_t pktlen)
415 {
416         int w = 0;
417         uint8_t* rr = *d;
418         size_t rrlen = *dlen, dname_off, rdlen, ordlen;
419         uint16_t rrtype = 0;
420         
421         if(*dlen >= 3 && (*d)[0]==0 &&
422                 sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
423                 /* perform EDNS OPT processing */
424                 return sldns_wire2str_edns_scan(d, dlen, s, slen, pkt, pktlen);
425         }
426
427         /* try to scan the rdata with pretty-printing, but if that fails, then
428          * scan the rdata as an unknown RR type */
429         w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
430         w += sldns_str_print(s, slen, "\t");
431         dname_off = rrlen-(*dlen);
432         if(*dlen == 4) {
433                 /* like a question-RR */
434                 uint16_t t = sldns_read_uint16(*d);
435                 uint16_t c = sldns_read_uint16((*d)+2);
436                 (*d)+=4;
437                 (*dlen)-=4;
438                 w += sldns_wire2str_class_print(s, slen, c);
439                 w += sldns_str_print(s, slen, "\t");
440                 w += sldns_wire2str_type_print(s, slen, t);
441                 w += sldns_str_print(s, slen, " ; Error no ttl,rdata\n");
442                 return w;
443         }
444         if(*dlen < 8) {
445                 if(*dlen == 0)
446                         return w + sldns_str_print(s, slen, ";Error missing RR\n");
447                 w += print_remainder_hex(";Error partial RR 0x", d, dlen, s, slen);
448                 return w + sldns_str_print(s, slen, "\n");
449         }
450         rrtype = sldns_read_uint16(*d);
451         w += sldns_rr_tcttl_scan(d, dlen, s, slen);
452         w += sldns_str_print(s, slen, "\t");
453
454         /* rdata */
455         if(*dlen < 2) {
456                 if(*dlen == 0)
457                         return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
458                 w += print_remainder_hex(";Error missing rdatalen 0x",
459                         d, dlen, s, slen);
460                 return w + sldns_str_print(s, slen, "\n");
461         }
462         rdlen = sldns_read_uint16(*d);
463         ordlen = rdlen;
464         (*d)+=2;
465         (*dlen)-=2;
466         if(*dlen < rdlen) {
467                 w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
468                 if(*dlen == 0)
469                         return w + sldns_str_print(s, slen, ";Error missing rdata\n");
470                 w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
471                 return w + sldns_str_print(s, slen, "\n");
472         }
473         w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen);
474         (*dlen) -= (ordlen-rdlen);
475
476         /* default comment */
477         w += sldns_wire2str_rr_comment_print(s, slen, rr, rrlen, dname_off,
478                 rrtype);
479         w += sldns_str_print(s, slen, "\n");
480         return w;
481 }
482
483 int sldns_wire2str_rrquestion_scan(uint8_t** d, size_t* dlen, char** s,
484         size_t* slen, uint8_t* pkt, size_t pktlen)
485 {
486         int w = 0;
487         uint16_t t, c;
488         w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
489         w += sldns_str_print(s, slen, "\t");
490         if(*dlen < 4) {
491                 if(*dlen == 0)
492                         return w + sldns_str_print(s, slen, "Error malformed\n");
493                 w += print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
494                 return w + sldns_str_print(s, slen, "\n");
495         }
496         t = sldns_read_uint16(*d);
497         c = sldns_read_uint16((*d)+2);
498         (*d)+=4;
499         (*dlen)-=4;
500         w += sldns_wire2str_class_print(s, slen, c);
501         w += sldns_str_print(s, slen, "\t");
502         w += sldns_wire2str_type_print(s, slen, t);
503         w += sldns_str_print(s, slen, "\n");
504         return w;
505 }
506
507 int sldns_wire2str_rr_unknown_scan(uint8_t** d, size_t* dlen, char** s,
508         size_t* slen, uint8_t* pkt, size_t pktlen)
509 {
510         size_t rdlen, ordlen;
511         int w = 0;
512         w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
513         w += sldns_str_print(s, slen, "\t");
514         w += sldns_rr_tcttl_scan(d, dlen, s, slen);
515         w += sldns_str_print(s, slen, "\t");
516         if(*dlen < 2) {
517                 if(*dlen == 0)
518                         return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
519                 w += print_remainder_hex(";Error missing rdatalen 0x",
520                         d, dlen, s, slen);
521                 return w + sldns_str_print(s, slen, "\n");
522         }
523         rdlen = sldns_read_uint16(*d);
524         ordlen = rdlen;
525         (*d) += 2;
526         (*dlen) -= 2;
527         if(*dlen < rdlen) {
528                 w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
529                 if(*dlen == 0)
530                         return w + sldns_str_print(s, slen, ";Error missing rdata\n");
531                 w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
532                 return w + sldns_str_print(s, slen, "\n");
533         }
534         w += sldns_wire2str_rdata_unknown_scan(d, &rdlen, s, slen);
535         (*dlen) -= (ordlen-rdlen);
536         w += sldns_str_print(s, slen, "\n");
537         return w;
538 }
539
540 /** print rr comment for type DNSKEY */
541 static int rr_comment_dnskey(char** s, size_t* slen, uint8_t* rr,
542         size_t rrlen, size_t dname_off)
543 {
544         size_t rdlen;
545         uint8_t* rdata;
546         int flags, w = 0;
547         if(rrlen < dname_off + 10) return 0;
548         rdlen = sldns_read_uint16(rr+dname_off+8);
549         if(rrlen < dname_off + 10 + rdlen) return 0;
550         rdata = rr + dname_off + 10;
551         flags = (int)sldns_read_uint16(rdata);
552         w += sldns_str_print(s, slen, " ;{");
553
554         /* id */
555         w += sldns_str_print(s, slen, "id = %u",
556                 sldns_calc_keytag_raw(rdata, rdlen));
557
558         /* flags */
559         if((flags&LDNS_KEY_ZONE_KEY)) {
560                 if((flags&LDNS_KEY_SEP_KEY))
561                         w += sldns_str_print(s, slen, " (ksk)");
562                 else    w += sldns_str_print(s, slen, " (zsk)");
563         }
564
565         /* keysize */
566         if(rdlen > 4) {
567                 w += sldns_str_print(s, slen, ", ");
568                 w += sldns_str_print(s, slen, "size = %db",
569                         (int)sldns_rr_dnskey_key_size_raw(
570                         (unsigned char*)rdata+4, rdlen-4, (int)(rdata[3])));
571         }
572
573         w += sldns_str_print(s, slen, "}");
574         return w;
575 }
576
577 /** print rr comment for type RRSIG */
578 static int rr_comment_rrsig(char** s, size_t* slen, uint8_t* rr,
579         size_t rrlen, size_t dname_off)
580 {
581         size_t rdlen;
582         uint8_t* rdata;
583         if(rrlen < dname_off + 10) return 0;
584         rdlen = sldns_read_uint16(rr+dname_off+8);
585         if(rrlen < dname_off + 10 + rdlen) return 0;
586         rdata = rr + dname_off + 10;
587         if(rdlen < 18) return 0;
588         return sldns_str_print(s, slen, " ;{id = %d}",
589                 (int)sldns_read_uint16(rdata+16));
590 }
591
592 /** print rr comment for type NSEC3 */
593 static int rr_comment_nsec3(char** s, size_t* slen, uint8_t* rr,
594         size_t rrlen, size_t dname_off)
595 {
596         size_t rdlen;
597         uint8_t* rdata;
598         int w = 0;
599         if(rrlen < dname_off + 10) return 0;
600         rdlen = sldns_read_uint16(rr+dname_off+8);
601         if(rrlen < dname_off + 10 + rdlen) return 0;
602         rdata = rr + dname_off + 10;
603         if(rdlen < 2) return 0;
604         if((rdata[1] & LDNS_NSEC3_VARS_OPTOUT_MASK))
605                 w += sldns_str_print(s, slen, " ;{flags: optout}");
606         return w;
607 }
608
609 int sldns_wire2str_rr_comment_print(char** s, size_t* slen, uint8_t* rr,
610         size_t rrlen, size_t dname_off, uint16_t rrtype)
611 {
612         if(rrtype == LDNS_RR_TYPE_DNSKEY) {
613                 return rr_comment_dnskey(s, slen, rr, rrlen, dname_off);
614         } else if(rrtype == LDNS_RR_TYPE_RRSIG) {
615                 return rr_comment_rrsig(s, slen, rr, rrlen, dname_off);
616         } else if(rrtype == LDNS_RR_TYPE_NSEC3) {
617                 return rr_comment_nsec3(s, slen, rr, rrlen, dname_off);
618         }
619         return 0;
620 }
621
622 int sldns_wire2str_header_scan(uint8_t** d, size_t* dlen, char** s,
623         size_t* slen)
624 {
625         int w = 0;
626         int opcode, rcode;
627         w += sldns_str_print(s, slen, ";; ->>HEADER<<- ");
628         if(*dlen == 0)
629                 return w+sldns_str_print(s, slen, "Error empty packet");
630         if(*dlen < 4)
631                 return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
632         opcode = (int)LDNS_OPCODE_WIRE(*d);
633         rcode = (int)LDNS_RCODE_WIRE(*d);
634         w += sldns_str_print(s, slen, "opcode: ");
635         w += sldns_wire2str_opcode_print(s, slen, opcode);
636         w += sldns_str_print(s, slen, ", ");
637         w += sldns_str_print(s, slen, "rcode: ");
638         w += sldns_wire2str_rcode_print(s, slen, rcode);
639         w += sldns_str_print(s, slen, ", ");
640         w += sldns_str_print(s, slen, "id: %d\n", (int)LDNS_ID_WIRE(*d));
641         w += sldns_str_print(s, slen, ";; flags:");
642         if(LDNS_QR_WIRE(*d)) w += sldns_str_print(s, slen, " qr");
643         if(LDNS_AA_WIRE(*d)) w += sldns_str_print(s, slen, " aa");
644         if(LDNS_TC_WIRE(*d)) w += sldns_str_print(s, slen, " tc");
645         if(LDNS_RD_WIRE(*d)) w += sldns_str_print(s, slen, " rd");
646         if(LDNS_CD_WIRE(*d)) w += sldns_str_print(s, slen, " cd");
647         if(LDNS_RA_WIRE(*d)) w += sldns_str_print(s, slen, " ra");
648         if(LDNS_AD_WIRE(*d)) w += sldns_str_print(s, slen, " ad");
649         if(LDNS_Z_WIRE(*d))  w += sldns_str_print(s, slen, " z");
650         w += sldns_str_print(s, slen, " ; ");
651         if(*dlen < LDNS_HEADER_SIZE)
652                 return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
653         w += sldns_str_print(s, slen, "QUERY: %d, ", (int)LDNS_QDCOUNT(*d));
654         w += sldns_str_print(s, slen, "ANSWER: %d, ", (int)LDNS_ANCOUNT(*d));
655         w += sldns_str_print(s, slen, "AUTHORITY: %d, ", (int)LDNS_NSCOUNT(*d));
656         w += sldns_str_print(s, slen, "ADDITIONAL: %d ", (int)LDNS_ARCOUNT(*d));
657         *d += LDNS_HEADER_SIZE;
658         *dlen -= LDNS_HEADER_SIZE;
659         return w;
660 }
661
662 int sldns_wire2str_rdata_scan(uint8_t** d, size_t* dlen, char** s,
663         size_t* slen, uint16_t rrtype, uint8_t* pkt, size_t pktlen)
664 {
665         /* try to prettyprint, but if that fails, use unknown format */
666         uint8_t* origd = *d;
667         char* origs = *s;
668         size_t origdlen = *dlen, origslen = *slen;
669         uint16_t r_cnt, r_max;
670         sldns_rdf_type rdftype;
671         int w = 0, n;
672
673         const sldns_rr_descriptor *desc = sldns_rr_descript(rrtype);
674         if(!desc) /* unknown format */
675                 return sldns_wire2str_rdata_unknown_scan(d, dlen, s, slen);
676         /* dlen equals the rdatalen for the rdata */
677
678         r_max = sldns_rr_descriptor_maximum(desc);
679         for(r_cnt=0; r_cnt < r_max; r_cnt++) {
680                 if(*dlen == 0) {
681                         if(r_cnt < sldns_rr_descriptor_minimum(desc))
682                                 goto failed;
683                         break; /* nothing more to print */
684                 }
685                 rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
686                 if(r_cnt != 0)
687                         w += sldns_str_print(s, slen, " ");
688                 n = sldns_wire2str_rdf_scan(d, dlen, s, slen, rdftype,
689                         pkt, pktlen);
690                 if(n == -1) {
691                 failed:
692                         /* failed, use unknown format */
693                         *d = origd; *s = origs;
694                         *dlen = origdlen; *slen = origslen;
695                         return sldns_wire2str_rdata_unknown_scan(d, dlen,
696                                 s, slen);
697                 }
698                 w += n;
699         }
700         if(*dlen != 0) {
701                 goto failed;
702         }
703         return w;
704 }
705
706 int sldns_wire2str_rdata_unknown_scan(uint8_t** d, size_t* dlen, char** s,
707         size_t* slen)
708 {
709         int w = 0;
710
711         /* print length */
712         w += sldns_str_print(s, slen, "\\# %u", (unsigned)*dlen);
713
714         /* print rdlen in hex */
715         if(*dlen != 0)
716                 w += sldns_str_print(s, slen, " ");
717         w += print_hex_buf(s, slen, *d, *dlen);
718         (*d) += *dlen;
719         (*dlen) = 0;
720         return w;
721 }
722
723 /** print and escape one character for a domain dname */
724 static int dname_char_print(char** s, size_t* slen, uint8_t c)
725 {
726         if(c == '.' || c == ';' || c == '(' || c == ')' || c == '\\')
727                 return sldns_str_print(s, slen, "\\%c", c);
728         else if(!(isascii((unsigned char)c) && isgraph((unsigned char)c)))
729                 return sldns_str_print(s, slen, "\\%03u", (unsigned)c);
730         /* plain printout */
731         if(*slen) {
732                 **s = (char)c;
733                 (*s)++;
734                 (*slen)--;
735         }
736         return 1;
737 }
738
739 int sldns_wire2str_dname_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
740         uint8_t* pkt, size_t pktlen)
741 {
742         int w = 0;
743         /* spool labels onto the string, use compression if its there */
744         uint8_t* pos = *d;
745         unsigned i, counter=0;
746         const unsigned maxcompr = 1000; /* loop detection, max compr ptrs */
747         int in_buf = 1;
748         if(*dlen == 0) return sldns_str_print(s, slen, "ErrorMissingDname");
749         if(*pos == 0) {
750                 (*d)++;
751                 (*dlen)--;
752                 return sldns_str_print(s, slen, ".");
753         }
754         while(*pos) {
755                 /* read label length */
756                 uint8_t labellen = *pos++;
757                 if(in_buf) { (*d)++; (*dlen)--; }
758
759                 /* find out what sort of label we have */
760                 if((labellen&0xc0) == 0xc0) {
761                         /* compressed */
762                         uint16_t target = 0;
763                         if(in_buf && *dlen == 0)
764                                 return w + sldns_str_print(s, slen,
765                                         "ErrorPartialDname");
766                         else if(!in_buf && pos+1 > pkt+pktlen)
767                                 return w + sldns_str_print(s, slen,
768                                         "ErrorPartialDname");
769                         target = ((labellen&0x3f)<<8) | *pos;
770                         if(in_buf) { (*d)++; (*dlen)--; }
771                         /* move to target, if possible */
772                         if(!pkt || target >= pktlen)
773                                 return w + sldns_str_print(s, slen,
774                                         "ErrorComprPtrOutOfBounds");
775                         if(counter++ > maxcompr)
776                                 return w + sldns_str_print(s, slen,
777                                         "ErrorComprPtrLooped");
778                         in_buf = 0;
779                         pos = pkt+target;
780                         continue;
781                 } else if((labellen&0xc0)) {
782                         /* notimpl label type */
783                         w += sldns_str_print(s, slen,
784                                 "ErrorLABELTYPE%xIsUnknown",
785                                 (int)(labellen&0xc0));
786                         return w;
787                 }
788
789                 /* spool label characters, end with '.' */
790                 if(in_buf && *dlen < labellen) labellen = *dlen;
791                 else if(!in_buf && pos+labellen > pkt+pktlen)
792                         labellen = (uint8_t)(pkt + pktlen - pos);
793                 for(i=0; i<(unsigned)labellen; i++) {
794                         w += dname_char_print(s, slen, *pos++);
795                 }
796                 if(in_buf) {
797                         (*d) += labellen;
798                         (*dlen) -= labellen;
799                         if(*dlen == 0) break;
800                 }
801                 w += sldns_str_print(s, slen, ".");
802         }
803         /* skip over final root label */
804         if(in_buf && *dlen > 0) { (*d)++; (*dlen)--; }
805         /* in case we printed no labels, terminate dname */
806         if(w == 0) w += sldns_str_print(s, slen, ".");
807         return w;
808 }
809
810 int sldns_wire2str_opcode_print(char** s, size_t* slen, int opcode)
811 {
812         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_opcodes, opcode);
813         if (lt && lt->name) {
814                 return sldns_str_print(s, slen, "%s", lt->name);
815         }
816         return sldns_str_print(s, slen, "OPCODE%u", (unsigned)opcode);
817 }
818
819 int sldns_wire2str_rcode_print(char** s, size_t* slen, int rcode)
820 {
821         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rcodes, rcode);
822         if (lt && lt->name) {
823                 return sldns_str_print(s, slen, "%s", lt->name);
824         }
825         return sldns_str_print(s, slen, "RCODE%u", (unsigned)rcode);
826 }
827
828 int sldns_wire2str_class_print(char** s, size_t* slen, uint16_t rrclass)
829 {
830         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rr_classes,
831                 (int)rrclass);
832         if (lt && lt->name) {
833                 return sldns_str_print(s, slen, "%s", lt->name);
834         }
835         return sldns_str_print(s, slen, "CLASS%u", (unsigned)rrclass);
836 }
837
838 int sldns_wire2str_type_print(char** s, size_t* slen, uint16_t rrtype)
839 {
840         const sldns_rr_descriptor *descriptor = sldns_rr_descript(rrtype);
841         if (descriptor && descriptor->_name) {
842                 return sldns_str_print(s, slen, "%s", descriptor->_name);
843         }
844         return sldns_str_print(s, slen, "TYPE%u", (unsigned)rrtype);
845 }
846
847 int sldns_wire2str_edns_option_code_print(char** s, size_t* slen,
848         uint16_t opcode)
849 {
850         sldns_lookup_table *lt = sldns_lookup_by_id(sldns_edns_options,
851                 (int)opcode);
852         if (lt && lt->name) {
853                 return sldns_str_print(s, slen, "%s", lt->name);
854         }
855         return sldns_str_print(s, slen, "OPT%u", (unsigned)opcode);
856 }
857
858 int sldns_wire2str_class_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
859 {
860         uint16_t c;
861         if(*dlen == 0) return 0;
862         if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
863         c = sldns_read_uint16(*d);
864         (*d)+=2;
865         (*dlen)-=2;
866         return sldns_wire2str_class_print(s, slen, c);
867 }
868
869 int sldns_wire2str_type_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
870 {
871         uint16_t t;
872         if(*dlen == 0) return 0;
873         if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
874         t = sldns_read_uint16(*d);
875         (*d)+=2;
876         (*dlen)-=2;
877         return sldns_wire2str_type_print(s, slen, t);
878 }
879
880 int sldns_wire2str_ttl_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
881 {
882         uint32_t ttl;
883         if(*dlen == 0) return 0;
884         if(*dlen < 4) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
885         ttl = sldns_read_uint32(*d);
886         (*d)+=4;
887         (*dlen)-=4;
888         return sldns_str_print(s, slen, "%u", (unsigned)ttl);
889 }
890
891 int sldns_wire2str_rdf_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
892         int rdftype, uint8_t* pkt, size_t pktlen)
893 {
894         if(*dlen == 0) return 0;
895         switch(rdftype) {
896         case LDNS_RDF_TYPE_NONE:
897                 return 0;
898         case LDNS_RDF_TYPE_DNAME:
899                 return sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen);
900         case LDNS_RDF_TYPE_INT8:
901                 return sldns_wire2str_int8_scan(d, dlen, s, slen);
902         case LDNS_RDF_TYPE_INT16:
903                 return sldns_wire2str_int16_scan(d, dlen, s, slen);
904         case LDNS_RDF_TYPE_INT32:
905                 return sldns_wire2str_int32_scan(d, dlen, s, slen);
906         case LDNS_RDF_TYPE_PERIOD:
907                 return sldns_wire2str_period_scan(d, dlen, s, slen);
908         case LDNS_RDF_TYPE_TSIGTIME:
909                 return sldns_wire2str_tsigtime_scan(d, dlen, s, slen);
910         case LDNS_RDF_TYPE_A:
911                 return sldns_wire2str_a_scan(d, dlen, s, slen);
912         case LDNS_RDF_TYPE_AAAA:
913                 return sldns_wire2str_aaaa_scan(d, dlen, s, slen);
914         case LDNS_RDF_TYPE_STR:
915                 return sldns_wire2str_str_scan(d, dlen, s, slen);
916         case LDNS_RDF_TYPE_APL:
917                 return sldns_wire2str_apl_scan(d, dlen, s, slen);
918         case LDNS_RDF_TYPE_B32_EXT:
919                 return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
920         case LDNS_RDF_TYPE_B64:
921                 return sldns_wire2str_b64_scan(d, dlen, s, slen);
922         case LDNS_RDF_TYPE_HEX:
923                 return sldns_wire2str_hex_scan(d, dlen, s, slen);
924         case LDNS_RDF_TYPE_NSEC:
925                 return sldns_wire2str_nsec_scan(d, dlen, s, slen);
926         case LDNS_RDF_TYPE_NSEC3_SALT:
927                 return sldns_wire2str_nsec3_salt_scan(d, dlen, s, slen);
928         case LDNS_RDF_TYPE_TYPE:
929                 return sldns_wire2str_type_scan(d, dlen, s, slen);
930         case LDNS_RDF_TYPE_CLASS:
931                 return sldns_wire2str_class_scan(d, dlen, s, slen);
932         case LDNS_RDF_TYPE_CERT_ALG:
933                 return sldns_wire2str_cert_alg_scan(d, dlen, s, slen);
934         case LDNS_RDF_TYPE_ALG:
935                 return sldns_wire2str_alg_scan(d, dlen, s, slen);
936         case LDNS_RDF_TYPE_UNKNOWN:
937                 return sldns_wire2str_unknown_scan(d, dlen, s, slen);
938         case LDNS_RDF_TYPE_TIME:
939                 return sldns_wire2str_time_scan(d, dlen, s, slen);
940         case LDNS_RDF_TYPE_LOC:
941                 return sldns_wire2str_loc_scan(d, dlen, s, slen);
942         case LDNS_RDF_TYPE_WKS:
943         case LDNS_RDF_TYPE_SERVICE:
944                 return sldns_wire2str_wks_scan(d, dlen, s, slen);
945         case LDNS_RDF_TYPE_NSAP:
946                 return sldns_wire2str_nsap_scan(d, dlen, s, slen);
947         case LDNS_RDF_TYPE_ATMA:
948                 return sldns_wire2str_atma_scan(d, dlen, s, slen);
949         case LDNS_RDF_TYPE_IPSECKEY:
950                 return sldns_wire2str_ipseckey_scan(d, dlen, s, slen, pkt,
951                         pktlen);
952         case LDNS_RDF_TYPE_HIP:
953                 return sldns_wire2str_hip_scan(d, dlen, s, slen);
954         case LDNS_RDF_TYPE_INT16_DATA:
955                 return sldns_wire2str_int16_data_scan(d, dlen, s, slen);
956         case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
957                 return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
958         case LDNS_RDF_TYPE_ILNP64:
959                 return sldns_wire2str_ilnp64_scan(d, dlen, s, slen);
960         case LDNS_RDF_TYPE_EUI48:
961                 return sldns_wire2str_eui48_scan(d, dlen, s, slen);
962         case LDNS_RDF_TYPE_EUI64:
963                 return sldns_wire2str_eui64_scan(d, dlen, s, slen);
964         case LDNS_RDF_TYPE_TAG:
965                 return sldns_wire2str_tag_scan(d, dlen, s, slen);
966         case LDNS_RDF_TYPE_LONG_STR:
967                 return sldns_wire2str_long_str_scan(d, dlen, s, slen);
968         }
969         /* unknown rdf type */
970         return -1;
971 }
972
973 int sldns_wire2str_int8_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
974 {
975         int w;
976         if(*dl < 1) return -1;
977         w = sldns_str_print(s, sl, "%u", (unsigned)**d);
978         (*d)++;
979         (*dl)--;
980         return w;
981 }
982
983 int sldns_wire2str_int16_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
984 {
985         int w;
986         if(*dl < 2) return -1;
987         w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint16(*d));
988         (*d)+=2;
989         (*dl)-=2;
990         return w;
991 }
992
993 int sldns_wire2str_int32_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
994 {
995         int w;
996         if(*dl < 4) return -1;
997         w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint32(*d));
998         (*d)+=4;
999         (*dl)-=4;
1000         return w;
1001 }
1002
1003 int sldns_wire2str_period_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1004 {
1005         int w;
1006         if(*dl < 4) return -1;
1007         w = sldns_str_print(s, sl, "%u", (unsigned)sldns_read_uint32(*d));
1008         (*d)+=4;
1009         (*dl)-=4;
1010         return w;
1011 }
1012
1013 int sldns_wire2str_tsigtime_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1014 {
1015         /* tsigtime is 48 bits network order unsigned integer */
1016         int w;
1017         uint64_t tsigtime = 0;
1018         uint64_t d0, d1, d2, d3, d4, d5;
1019         if(*dl < 6) return -1;
1020         d0 = (*d)[0]; /* cast to uint64 for shift operations */
1021         d1 = (*d)[1];
1022         d2 = (*d)[2];
1023         d3 = (*d)[3];
1024         d4 = (*d)[4];
1025         d5 = (*d)[5];
1026         tsigtime = (d0<<40) | (d1<<32) | (d2<<24) | (d3<<16) | (d4<<8) | d5;
1027 #ifndef USE_WINSOCK
1028         w = sldns_str_print(s, sl, "%llu", (long long)tsigtime);
1029 #else
1030         w = sldns_str_print(s, sl, "%I64u", (long long)tsigtime);
1031 #endif
1032         (*d)+=6;
1033         (*dl)-=6;
1034         return w;
1035 }
1036
1037 int sldns_wire2str_a_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1038 {
1039         char buf[32];
1040         int w;
1041         if(*dl < 4) return -1;
1042         if(!inet_ntop(AF_INET, *d, buf, (socklen_t)sizeof(buf)))
1043                 return -1;
1044         w = sldns_str_print(s, sl, "%s", buf);
1045         (*d)+=4;
1046         (*dl)-=4;
1047         return w;
1048 }
1049
1050 int sldns_wire2str_aaaa_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1051 {
1052 #ifdef AF_INET6
1053         char buf[64];
1054         int w;
1055         if(*dl < 16) return -1;
1056         if(!inet_ntop(AF_INET6, *d, buf, (socklen_t)sizeof(buf)))
1057                 return -1;
1058         w = sldns_str_print(s, sl, "%s", buf);
1059         (*d)+=16;
1060         (*dl)-=16;
1061         return w;
1062 #else
1063         return -1;
1064 #endif
1065 }
1066
1067 /** printout escaped TYPE_STR character */
1068 static int str_char_print(char** s, size_t* sl, uint8_t c)
1069 {
1070         if(isprint((unsigned char)c) || c == '\t') {
1071                 if(c == '\"' || c == '\\')
1072                         return sldns_str_print(s, sl, "\\%c", c);
1073                 if(*sl) {
1074                         **s = (char)c;
1075                         (*s)++;
1076                         (*sl)--;
1077                 }
1078                 return 1;
1079         }
1080         return sldns_str_print(s, sl, "\\%03u", (unsigned)c);
1081 }
1082
1083 int sldns_wire2str_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1084 {
1085         int w = 0;
1086         size_t i, len;
1087         if(*dl < 1) return -1;
1088         len = **d;
1089         if(*dl < 1+len) return -1;
1090         (*d)++;
1091         (*dl)--;
1092         w += sldns_str_print(s, sl, "\"");
1093         for(i=0; i<len; i++)
1094                 w += str_char_print(s, sl, (*d)[i]);
1095         w += sldns_str_print(s, sl, "\"");
1096         (*d)+=len;
1097         (*dl)-=len;
1098         return w;
1099 }
1100
1101 int sldns_wire2str_apl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1102 {
1103         int i, w = 0;
1104         uint16_t family;
1105         uint8_t negation, prefix, adflength;
1106         if(*dl < 4) return -1;
1107         family = sldns_read_uint16(*d);
1108         prefix = (*d)[2];
1109         negation = ((*d)[3] & LDNS_APL_NEGATION);
1110         adflength = ((*d)[3] & LDNS_APL_MASK);
1111         if(*dl < 4+(size_t)adflength) return -1;
1112         if(family != LDNS_APL_IP4 && family != LDNS_APL_IP6)
1113                 return -1; /* unknown address family */
1114         if(negation)
1115                 w += sldns_str_print(s, sl, "!");
1116         w += sldns_str_print(s, sl, "%u:", (unsigned)family);
1117         if(family == LDNS_APL_IP4) {
1118                 /* check if prefix <32 ? */
1119                 /* address is variable length 0 - 4 */
1120                 for(i=0; i<4; i++) {
1121                         if(i > 0)
1122                                 w += sldns_str_print(s, sl, ".");
1123                         if(i < (int)adflength)
1124                                 w += sldns_str_print(s, sl, "%d", (*d)[4+i]);
1125                         else    w += sldns_str_print(s, sl, "0");
1126                 }
1127         } else if(family == LDNS_APL_IP6) {
1128                 /* check if prefix <128 ? */
1129                 /* address is variable length 0 - 16 */
1130                 for(i=0; i<16; i++) {
1131                         if(i%2 == 0 && i>0)
1132                                 w += sldns_str_print(s, sl, ":");
1133                         if(i < (int)adflength)
1134                                 w += sldns_str_print(s, sl, "%02x", (*d)[4+i]);
1135                         else    w += sldns_str_print(s, sl, "00");
1136                 }
1137         }
1138         w += sldns_str_print(s, sl, "/%u", (unsigned)prefix);
1139         (*d) += 4+adflength;
1140         (*dl) -= 4+adflength;
1141         return w;
1142 }
1143
1144 int sldns_wire2str_b32_ext_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1145 {
1146         size_t datalen;
1147         size_t sz;
1148         if(*dl < 1) return -1;
1149         datalen = (*d)[0];
1150         if(*dl < 1+datalen) return -1;
1151         sz = sldns_b32_ntop_calculate_size(datalen);
1152         if(*sl < sz+1) {
1153                 (*d) += datalen+1;
1154                 (*dl) -= (datalen+1);
1155                 return (int)sz; /* out of space really, but would need buffer
1156                         in order to truncate the output */
1157         }
1158         sldns_b32_ntop_extended_hex((*d)+1, datalen, *s, *sl);
1159         (*d) += datalen+1;
1160         (*dl) -= (datalen+1);
1161         (*s) += sz;
1162         (*sl) -= sz;
1163         return (int)sz;
1164 }
1165
1166 /** scan number of bytes from wire into b64 presentation format */
1167 static int sldns_wire2str_b64_scan_num(uint8_t** d, size_t* dl, char** s,
1168         size_t* sl, size_t num)
1169 {
1170         /* b64_ntop_calculate size includes null at the end */
1171         size_t sz = sldns_b64_ntop_calculate_size(num)-1;
1172         if(*sl < sz+1) {
1173                 (*d) += num;
1174                 (*dl) -= num;
1175                 return (int)sz; /* out of space really, but would need buffer
1176                         in order to truncate the output */
1177         }
1178         sldns_b64_ntop(*d, num, *s, *sl);
1179         (*d) += num;
1180         (*dl) -= num;
1181         (*s) += sz;
1182         (*sl) -= sz;
1183         return (int)sz;
1184 }
1185
1186 int sldns_wire2str_b64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1187 {
1188         return sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1189 }
1190
1191 int sldns_wire2str_hex_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1192 {
1193         return print_remainder_hex("", d, dl, s, sl);
1194 }
1195
1196 int sldns_wire2str_nsec_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1197 {
1198         uint8_t* p = *d;
1199         size_t pl = *dl;
1200         unsigned i, bit, window, block_len;
1201         uint16_t t;
1202         int w = 0;
1203         
1204         /* check for errors */
1205         while(pl) {
1206                 if(pl < 2) return -1;
1207                 block_len = (unsigned)p[1];
1208                 if(pl < 2+block_len) return -1;
1209                 p += block_len+2;
1210                 pl -= block_len+2;
1211         }
1212
1213         /* do it */
1214         p = *d;
1215         pl = *dl;
1216         while(pl) {
1217                 if(pl < 2) return -1; /* cannot happen */
1218                 window = (unsigned)p[0];
1219                 block_len = (unsigned)p[1];
1220                 if(pl < 2+block_len) return -1; /* cannot happen */
1221                 p += 2;
1222                 for(i=0; i<block_len; i++) {
1223                         if(p[i] == 0) continue;
1224                         /* base type number for this octet */
1225                         t = ((window)<<8) | (i << 3);
1226                         for(bit=0; bit<8; bit++) {
1227                                 if((p[i]&(0x80>>bit))) {
1228                                         if(w) w += sldns_str_print(s, sl, " ");
1229                                         w += sldns_wire2str_type_print(s, sl,
1230                                                 t+bit);
1231                                 }
1232                         }
1233                 }
1234                 p += block_len;
1235                 pl -= block_len+2;
1236         }
1237         (*d) += *dl;
1238         (*dl) = 0;
1239         return w;
1240 }
1241
1242 int sldns_wire2str_nsec3_salt_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1243 {
1244         size_t salt_len;
1245         int w;
1246         if(*dl < 1) return -1;
1247         salt_len = (size_t)(*d)[0];
1248         if(*dl < 1+salt_len) return -1;
1249         (*d)++;
1250         (*dl)--;
1251         if(salt_len == 0) {
1252                 return sldns_str_print(s, sl, "-");
1253         }
1254         w = print_hex_buf(s, sl, *d, salt_len);
1255         (*dl)-=salt_len;
1256         (*d)+=salt_len;
1257         return w;
1258 }
1259
1260 int sldns_wire2str_cert_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1261 {
1262         sldns_lookup_table *lt;
1263         int data, w;
1264         if(*dl < 2) return -1;
1265         data = (int)sldns_read_uint16(*d);
1266         lt = sldns_lookup_by_id(sldns_cert_algorithms, data);
1267         if(lt && lt->name)
1268                 w = sldns_str_print(s, sl, "%s", lt->name);
1269         else    w = sldns_str_print(s, sl, "%d", data);
1270         (*dl)-=2;
1271         (*d)+=2;
1272         return w;
1273 }
1274
1275 int sldns_wire2str_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1276 {
1277         /* don't use algorithm mnemonics in the presentation format
1278          * this kind of got sneaked into the rfc's */
1279         return sldns_wire2str_int8_scan(d, dl, s, sl);
1280 }
1281
1282 int sldns_wire2str_unknown_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1283 {
1284         return sldns_wire2str_rdata_unknown_scan(d, dl, s, sl);
1285 }
1286
1287 int sldns_wire2str_time_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1288 {
1289         /* create a YYYYMMDDHHMMSS string if possible */
1290         struct tm tm;
1291         char date_buf[16];
1292         uint32_t t;
1293         memset(&tm, 0, sizeof(tm));
1294         if(*dl < 4) return -1;
1295         t = sldns_read_uint32(*d);
1296         date_buf[15]=0;
1297         if(sldns_serial_arithmitics_gmtime_r(t, time(NULL), &tm) &&
1298                 strftime(date_buf, 15, "%Y%m%d%H%M%S", &tm)) {
1299                 (*d) += 4;
1300                 (*dl) -= 4;
1301                 return sldns_str_print(s, sl, "%s", date_buf);
1302         }
1303         return -1;
1304 }
1305
1306 static int
1307 loc_cm_print(char** str, size_t* sl, uint8_t mantissa, uint8_t exponent)
1308 {
1309         int w = 0;
1310         uint8_t i;
1311         /* is it 0.<two digits> ? */
1312         if(exponent < 2) {
1313                 if(exponent == 1)
1314                         mantissa *= 10;
1315                 return sldns_str_print(str, sl, "0.%02ld", (long)mantissa);
1316         }
1317         /* always <digit><string of zeros> */
1318         w += sldns_str_print(str, sl, "%d", (int)mantissa);
1319         for(i=0; i<exponent-2; i++)
1320                 w += sldns_str_print(str, sl, "0");
1321         return w;
1322 }
1323
1324 int sldns_wire2str_loc_scan(uint8_t** d, size_t* dl, char** str, size_t* sl)
1325 {
1326         /* we could do checking (ie degrees < 90 etc)? */
1327         uint8_t version;
1328         uint8_t size;
1329         uint8_t horizontal_precision;
1330         uint8_t vertical_precision;
1331         uint32_t longitude;
1332         uint32_t latitude;
1333         uint32_t altitude;
1334         char northerness;
1335         char easterness;
1336         uint32_t h;
1337         uint32_t m;
1338         double s;
1339         uint32_t equator = (uint32_t)1 << 31; /* 2**31 */
1340         int w = 0;
1341
1342         if(*dl < 16) return -1;
1343         version = (*d)[0];
1344         if(version != 0)
1345                 return sldns_wire2str_hex_scan(d, dl, str, sl);
1346         size = (*d)[1];
1347         horizontal_precision = (*d)[2];
1348         vertical_precision = (*d)[3];
1349
1350         latitude = sldns_read_uint32((*d)+4);
1351         longitude = sldns_read_uint32((*d)+8);
1352         altitude = sldns_read_uint32((*d)+12);
1353
1354         if (latitude > equator) {
1355                 northerness = 'N';
1356                 latitude = latitude - equator;
1357         } else {
1358                 northerness = 'S';
1359                 latitude = equator - latitude;
1360         }
1361         h = latitude / (1000 * 60 * 60);
1362         latitude = latitude % (1000 * 60 * 60);
1363         m = latitude / (1000 * 60);
1364         latitude = latitude % (1000 * 60);
1365         s = (double) latitude / 1000.0;
1366         w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1367                 h, m, s, northerness);
1368
1369         if (longitude > equator) {
1370                 easterness = 'E';
1371                 longitude = longitude - equator;
1372         } else {
1373                 easterness = 'W';
1374                 longitude = equator - longitude;
1375         }
1376         h = longitude / (1000 * 60 * 60);
1377         longitude = longitude % (1000 * 60 * 60);
1378         m = longitude / (1000 * 60);
1379         longitude = longitude % (1000 * 60);
1380         s = (double) longitude / (1000.0);
1381         w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1382                 h, m, s, easterness);
1383
1384         s = ((double) altitude) / 100;
1385         s -= 100000;
1386
1387         if(altitude%100 != 0)
1388                 w += sldns_str_print(str, sl, "%.2f", s);
1389         else
1390                 w += sldns_str_print(str, sl, "%.0f", s);
1391
1392         w += sldns_str_print(str, sl, "m ");
1393
1394         w += loc_cm_print(str, sl, (size & 0xf0) >> 4, size & 0x0f);
1395         w += sldns_str_print(str, sl, "m ");
1396
1397         w += loc_cm_print(str, sl, (horizontal_precision & 0xf0) >> 4,
1398                 horizontal_precision & 0x0f);
1399         w += sldns_str_print(str, sl, "m ");
1400
1401         w += loc_cm_print(str, sl, (vertical_precision & 0xf0) >> 4,
1402                 vertical_precision & 0x0f);
1403         w += sldns_str_print(str, sl, "m");
1404
1405         (*d)+=16;
1406         (*dl)-=16;
1407         return w;
1408 }
1409
1410 int sldns_wire2str_wks_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1411 {
1412         /* protocol, followed by bitmap of services */
1413         const char* proto_name = NULL;
1414         struct protoent *protocol;
1415         struct servent *service;
1416         uint8_t protocol_nr;
1417         int bit, port, w = 0;
1418         size_t i;
1419         /* we cannot print with strings because they
1420          * are not portable, the presentation format may
1421          * not be able to be read in on another computer.  */
1422         int print_symbols = 0;
1423
1424         /* protocol */
1425         if(*dl < 1) return -1;
1426         protocol_nr = (*d)[0];
1427         (*d)++;
1428         (*dl)--;
1429         protocol = getprotobynumber((int)protocol_nr);
1430         if(protocol && (protocol->p_name != NULL)) {
1431                 w += sldns_str_print(s, sl, "%s", protocol->p_name);
1432                 proto_name = protocol->p_name;
1433         } else  {
1434                 w += sldns_str_print(s, sl, "%u", (unsigned)protocol_nr);
1435         }
1436
1437         for(i=0; i<*dl; i++) {
1438                 if((*d)[i] == 0)
1439                         continue;
1440                 for(bit=0; bit<8; bit++) {
1441                         if(!(((*d)[i])&(0x80>>bit)))
1442                                 continue;
1443                         port = (int)i*8 + bit;
1444
1445                         if(!print_symbols)
1446                                 service = NULL;
1447                         else
1448                                 service = getservbyport(
1449                                         (int)htons((uint16_t)port), proto_name);
1450                         if(service && service->s_name)
1451                                 w += sldns_str_print(s, sl, " %s",
1452                                         service->s_name);
1453                         else    w += sldns_str_print(s, sl, " %u",
1454                                         (unsigned)port);
1455                 }
1456         }
1457
1458 #ifdef HAVE_ENDSERVENT
1459         endservent();
1460 #endif
1461 #ifdef HAVE_ENDPROTOENT
1462         endprotoent();
1463 #endif
1464         (*d) += *dl;
1465         (*dl) = 0;
1466         return w;
1467 }
1468
1469 int sldns_wire2str_nsap_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1470 {
1471         return print_remainder_hex("0x", d, dl, s, sl);
1472 }
1473
1474 int sldns_wire2str_atma_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1475 {
1476         return print_remainder_hex("", d, dl, s, sl);
1477 }
1478
1479 /* internal scan routine that can modify arguments on failure */
1480 static int sldns_wire2str_ipseckey_scan_internal(uint8_t** d, size_t* dl,
1481         char** s, size_t* sl, uint8_t* pkt, size_t pktlen)
1482 {
1483         /* http://www.ietf.org/internet-drafts/draft-ietf-ipseckey-rr-12.txt*/
1484         uint8_t precedence, gateway_type, algorithm;
1485         int w = 0;
1486
1487         if(*dl < 3) return -1;
1488         precedence = (*d)[0];
1489         gateway_type = (*d)[1];
1490         algorithm = (*d)[2];
1491         if(gateway_type > 3)
1492                 return -1; /* unknown */
1493         (*d)+=3;
1494         (*dl)-=3;
1495         w += sldns_str_print(s, sl, "%d %d %d ",
1496                 (int)precedence, (int)gateway_type, (int)algorithm);
1497
1498         switch(gateway_type) {
1499         case 0: /* no gateway */
1500                 w += sldns_str_print(s, sl, ".");
1501                 break;
1502         case 1: /* ip4 */
1503                 w += sldns_wire2str_a_scan(d, dl, s, sl);
1504                 break;
1505         case 2: /* ip6 */
1506                 w += sldns_wire2str_aaaa_scan(d, dl, s, sl);
1507                 break;
1508         case 3: /* dname */
1509                 w += sldns_wire2str_dname_scan(d, dl, s, sl, pkt, pktlen);
1510                 break;
1511         default: /* unknown */
1512                 return -1;
1513         }
1514
1515         if(*dl < 1)
1516                 return -1;
1517         w += sldns_str_print(s, sl, " ");
1518         w += sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1519         return w;
1520 }
1521
1522 int sldns_wire2str_ipseckey_scan(uint8_t** d, size_t* dl, char** s, size_t* sl,
1523         uint8_t* pkt, size_t pktlen)
1524 {
1525         uint8_t* od = *d;
1526         char* os = *s;
1527         size_t odl = *dl, osl = *sl;
1528         int w=sldns_wire2str_ipseckey_scan_internal(d, dl, s, sl, pkt, pktlen);
1529         if(w == -1) {
1530                 *d = od;
1531                 *s = os;
1532                 *dl = odl;
1533                 *sl = osl;
1534                 return -1;
1535         }
1536         return w;
1537 }
1538
1539 int sldns_wire2str_hip_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1540 {
1541         int w;
1542         uint8_t algo, hitlen;
1543         uint16_t pklen;
1544
1545         /* read lengths */
1546         if(*dl < 4)
1547                 return -1;
1548         hitlen = (*d)[0];
1549         algo = (*d)[1];
1550         pklen = sldns_read_uint16((*d)+2);
1551         if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen)
1552                 return -1;
1553
1554         /* write: algo hit pubkey */
1555         w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
1556         w += print_hex_buf(s, sl, (*d)+4, hitlen);
1557         w += sldns_str_print(s, sl, " ");
1558         (*d)+=4+hitlen;
1559         (*dl)-= (4+hitlen);
1560         w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
1561         return w;
1562 }
1563
1564 int sldns_wire2str_int16_data_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1565 {
1566         uint16_t n;
1567         if(*dl < 2)
1568                 return -1;
1569         n = sldns_read_uint16(*d);
1570         if(*dl < 2+(size_t)n)
1571                 return -1;
1572         (*d)+=2;
1573         (*dl)-=2;
1574         return sldns_wire2str_b64_scan_num(d, dl, s, sl, n);
1575 }
1576
1577 int sldns_wire2str_nsec3_next_owner_scan(uint8_t** d, size_t* dl, char** s,
1578         size_t* sl)
1579 {
1580         return sldns_wire2str_b32_ext_scan(d, dl, s, sl);
1581 }
1582
1583 int sldns_wire2str_ilnp64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1584 {
1585         int w;
1586         if(*dl < 8)
1587                 return -1;
1588         w = sldns_str_print(s, sl, "%.4x:%.4x:%.4x:%.4x",
1589                 sldns_read_uint16(*d), sldns_read_uint16((*d)+2),
1590                 sldns_read_uint16((*d)+4), sldns_read_uint16((*d)+6));
1591         (*d)+=8;
1592         (*dl)-=8;
1593         return w;
1594 }
1595
1596 int sldns_wire2str_eui48_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1597 {
1598         int w;
1599         if(*dl < 6)
1600                 return -1;
1601         w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1602                 (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5]);
1603         (*d)+=6;
1604         (*dl)-=6;
1605         return w;
1606 }
1607
1608 int sldns_wire2str_eui64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1609 {
1610         int w;
1611         if(*dl < 8)
1612                 return -1;
1613         w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1614                 (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5],
1615                 (*d)[6], (*d)[7]);
1616         (*d)+=8;
1617         (*dl)-=8;
1618         return w;
1619 }
1620
1621 int sldns_wire2str_tag_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1622 {
1623         size_t i, n;
1624         int w = 0;
1625         if(*dl < 1)
1626                 return -1;
1627         n = (size_t)((*d)[0]);
1628         if(*dl < 1+n)
1629                 return -1;
1630         for(i=0; i<n; i++)
1631                 if(!isalnum((unsigned char)(*d)[i]))
1632                         return -1;
1633         for(i=0; i<n; i++)
1634                 w += sldns_str_print(s, sl, "%c", (char)(*d)[i]);
1635         (*d)+=n+1;
1636         (*dl)-=(n+1);
1637         return w;
1638 }
1639
1640 int sldns_wire2str_long_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1641 {
1642         size_t i;
1643         int w = 0;
1644         w += sldns_str_print(s, sl, "\"");
1645         for(i=0; i<*dl; i++)
1646                 w += str_char_print(s, sl, (*d)[i]);
1647         w += sldns_str_print(s, sl, "\"");
1648         (*d)+=*dl;
1649         (*dl)=0;
1650         return w;
1651 }
1652
1653 int sldns_wire2str_edns_llq_print(char** s, size_t* sl, uint8_t* data,
1654         size_t len)
1655 {
1656         /* LLQ constants */
1657         const char* llq_errors[] = {"NO-ERROR", "SERV-FULL", "STATIC",
1658                 "FORMAT-ERR", "NO-SUCH-LLQ", "BAD-VERS", "UNKNOWN_ERR"};
1659         const unsigned int llq_errors_num = 7;
1660         const char* llq_opcodes[] = {"LLQ-SETUP", "LLQ-REFRESH", "LLQ-EVENT"};
1661         const unsigned int llq_opcodes_num = 3;
1662         uint16_t version, llq_opcode, error_code;
1663         uint64_t llq_id;
1664         uint32_t lease_life; /* Requested or granted life of LLQ, in seconds */
1665         int w = 0;
1666
1667         /* read the record */
1668         if(len != 18) {
1669                 w += sldns_str_print(s, sl, "malformed LLQ ");
1670                 w += print_hex_buf(s, sl, data, len);
1671                 return w;
1672         }
1673         version = sldns_read_uint16(data);
1674         llq_opcode = sldns_read_uint16(data+2);
1675         error_code = sldns_read_uint16(data+4);
1676         memmove(&llq_id, data+6, sizeof(llq_id));
1677         lease_life = sldns_read_uint32(data+14);
1678
1679         /* print it */
1680         w += sldns_str_print(s, sl, "v%d ", (int)version);
1681         if(llq_opcode < llq_opcodes_num)
1682                 w += sldns_str_print(s, sl, "%s", llq_opcodes[llq_opcode]);
1683         else    w += sldns_str_print(s, sl, "opcode %d", (int)llq_opcode);
1684         if(error_code < llq_errors_num)
1685                 w += sldns_str_print(s, sl, " %s", llq_errors[error_code]);
1686         else    w += sldns_str_print(s, sl, " error %d", (int)error_code);
1687 #ifndef USE_WINSOCK
1688         w += sldns_str_print(s, sl, " id %llx lease-life %lu",
1689                 (unsigned long long)llq_id, (unsigned long)lease_life);
1690 #else
1691         w += sldns_str_print(s, sl, " id %I64x lease-life %lu",
1692                 (unsigned long long)llq_id, (unsigned long)lease_life);
1693 #endif
1694         return w;
1695 }
1696
1697 int sldns_wire2str_edns_ul_print(char** s, size_t* sl, uint8_t* data,
1698         size_t len)
1699 {
1700         uint32_t lease;
1701         int w = 0;
1702         if(len != 4) {
1703                 w += sldns_str_print(s, sl, "malformed UL ");
1704                 w += print_hex_buf(s, sl, data, len);
1705                 return w;
1706         }
1707         lease = sldns_read_uint32(data);
1708         w += sldns_str_print(s, sl, "lease %lu", (unsigned long)lease);
1709         return w;
1710 }
1711
1712 int sldns_wire2str_edns_nsid_print(char** s, size_t* sl, uint8_t* data,
1713         size_t len)
1714 {
1715         int w = 0;
1716         size_t i, printed=0;
1717         w += print_hex_buf(s, sl, data, len);
1718         for(i=0; i<len; i++) {
1719                 if(isprint((unsigned char)data[i]) || data[i] == '\t') {
1720                         if(!printed) {
1721                                 w += sldns_str_print(s, sl, " (");
1722                                 printed = 1;
1723                         }
1724                         w += sldns_str_print(s, sl, "%c", (char)data[i]);
1725                 }
1726         }
1727         if(printed)
1728                 w += sldns_str_print(s, sl, ")");
1729         return w;
1730 }
1731
1732 int sldns_wire2str_edns_dau_print(char** s, size_t* sl, uint8_t* data,
1733         size_t len)
1734 {
1735         sldns_lookup_table *lt;
1736         size_t i;
1737         int w = 0;
1738         for(i=0; i<len; i++) {
1739                 lt = sldns_lookup_by_id(sldns_algorithms, (int)data[i]);
1740                 if(lt && lt->name)
1741                         w += sldns_str_print(s, sl, " %s", lt->name);
1742                 else    w += sldns_str_print(s, sl, " %d", (int)data[i]);
1743         }
1744         return w;
1745 }
1746
1747 int sldns_wire2str_edns_dhu_print(char** s, size_t* sl, uint8_t* data,
1748         size_t len)
1749 {
1750         sldns_lookup_table *lt;
1751         size_t i;
1752         int w = 0;
1753         for(i=0; i<len; i++) {
1754                 lt = sldns_lookup_by_id(sldns_hashes, (int)data[i]);
1755                 if(lt && lt->name)
1756                         w += sldns_str_print(s, sl, " %s", lt->name);
1757                 else    w += sldns_str_print(s, sl, " %d", (int)data[i]);
1758         }
1759         return w;
1760 }
1761
1762 int sldns_wire2str_edns_n3u_print(char** s, size_t* sl, uint8_t* data,
1763         size_t len)
1764 {
1765         size_t i;
1766         int w = 0;
1767         for(i=0; i<len; i++) {
1768                 if(data[i] == 1)
1769                         w += sldns_str_print(s, sl, " SHA1");
1770                 else    w += sldns_str_print(s, sl, " %d", (int)data[i]);
1771         }
1772         return w;
1773 }
1774
1775 int sldns_wire2str_edns_subnet_print(char** s, size_t* sl, uint8_t* data,
1776         size_t len)
1777 {
1778         int w = 0;
1779         uint16_t family;
1780         uint8_t source, scope;
1781         if(len < 4) {
1782                 w += sldns_str_print(s, sl, "malformed subnet ");
1783                 w += print_hex_buf(s, sl, data, len);
1784                 return w;
1785         }
1786         family = sldns_read_uint16(data);
1787         source = data[2];
1788         scope = data[3];
1789         if(family == 1) {
1790                 /* IP4 */
1791                 char buf[64];
1792                 uint8_t ip4[4];
1793                 memset(ip4, 0, sizeof(ip4));
1794                 if(len-4 > 4) {
1795                         w += sldns_str_print(s, sl, "trailingdata:");
1796                         w += print_hex_buf(s, sl, data+4+4, len-4-4);
1797                         w += sldns_str_print(s, sl, " ");
1798                         len = 4+4;
1799                 }
1800                 memmove(ip4, data+4, len-4);
1801                 if(!inet_ntop(AF_INET, ip4, buf, (socklen_t)sizeof(buf))) {
1802                         w += sldns_str_print(s, sl, "ip4ntoperror ");
1803                         w += print_hex_buf(s, sl, data+4+4, len-4-4);
1804                 } else {
1805                         w += sldns_str_print(s, sl, "%s", buf);
1806                 }
1807         } else if(family == 2) {
1808                 /* IP6 */
1809                 char buf[64];
1810                 uint8_t ip6[16];
1811                 memset(ip6, 0, sizeof(ip6));
1812                 if(len-4 > 16) {
1813                         w += sldns_str_print(s, sl, "trailingdata:");
1814                         w += print_hex_buf(s, sl, data+4+16, len-4-16);
1815                         w += sldns_str_print(s, sl, " ");
1816                         len = 4+16;
1817                 }
1818                 memmove(ip6, data+4, len-4);
1819 #ifdef AF_INET6
1820                 if(!inet_ntop(AF_INET6, ip6, buf, (socklen_t)sizeof(buf))) {
1821                         w += sldns_str_print(s, sl, "ip6ntoperror ");
1822                         w += print_hex_buf(s, sl, data+4+4, len-4-4);
1823                 } else {
1824                         w += sldns_str_print(s, sl, "%s", buf);
1825                 }
1826 #else
1827                 w += print_hex_buf(s, sl, data+4+4, len-4-4);
1828 #endif
1829         } else {
1830                 /* unknown */
1831                 w += sldns_str_print(s, sl, "family %d ",
1832                         (int)family);
1833                 w += print_hex_buf(s, sl, data, len);
1834         }
1835         w += sldns_str_print(s, sl, "/%d scope /%d", (int)source, (int)scope);
1836         return w;
1837 }
1838
1839 int sldns_wire2str_edns_option_print(char** s, size_t* sl,
1840         uint16_t option_code, uint8_t* optdata, size_t optlen)
1841 {
1842         int w = 0;
1843         w += sldns_wire2str_edns_option_code_print(s, sl, option_code);
1844         w += sldns_str_print(s, sl, ": ");
1845         switch(option_code) {
1846         case LDNS_EDNS_LLQ:
1847                 w += sldns_wire2str_edns_llq_print(s, sl, optdata, optlen);
1848                 break;
1849         case LDNS_EDNS_UL:
1850                 w += sldns_wire2str_edns_ul_print(s, sl, optdata, optlen);
1851                 break;
1852         case LDNS_EDNS_NSID:
1853                 w += sldns_wire2str_edns_nsid_print(s, sl, optdata, optlen);
1854                 break;
1855         case LDNS_EDNS_DAU:
1856                 w += sldns_wire2str_edns_dau_print(s, sl, optdata, optlen);
1857                 break;
1858         case LDNS_EDNS_DHU:
1859                 w += sldns_wire2str_edns_dhu_print(s, sl, optdata, optlen);
1860                 break;
1861         case LDNS_EDNS_N3U:
1862                 w += sldns_wire2str_edns_n3u_print(s, sl, optdata, optlen);
1863                 break;
1864         case LDNS_EDNS_CLIENT_SUBNET:
1865                 w += sldns_wire2str_edns_subnet_print(s, sl, optdata, optlen);
1866                 break;
1867         default:
1868                 /* unknown option code */
1869                 w += print_hex_buf(s, sl, optdata, optlen);
1870                 break;
1871         }
1872         return w;
1873 }
1874
1875 /** print the edns options to string */
1876 static int
1877 print_edns_opts(char** s, size_t* sl, uint8_t* rdata, size_t rdatalen)
1878 {
1879         uint16_t option_code, option_len;
1880         int w = 0;
1881         while(rdatalen > 0) {
1882                 /* option name */
1883                 if(rdatalen < 4) {
1884                         w += sldns_str_print(s, sl, " ; malformed: ");
1885                         w += print_hex_buf(s, sl, rdata, rdatalen);
1886                         return w;
1887                 }
1888                 option_code = sldns_read_uint16(rdata);
1889                 option_len = sldns_read_uint16(rdata+2);
1890                 rdata += 4;
1891                 rdatalen -= 4;
1892
1893                 /* option value */
1894                 if(rdatalen < (size_t)option_len) {
1895                         w += sldns_str_print(s, sl, " ; malformed ");
1896                         w += sldns_wire2str_edns_option_code_print(s, sl,
1897                                 option_code);
1898                         w += sldns_str_print(s, sl, ": ");
1899                         w += print_hex_buf(s, sl, rdata, rdatalen);
1900                         return w;
1901                 }
1902                 w += sldns_str_print(s, sl, " ; ");
1903                 w += sldns_wire2str_edns_option_print(s, sl, option_code,
1904                         rdata, option_len);
1905                 rdata += option_len;
1906                 rdatalen -= option_len;
1907         }
1908         return w;
1909 }
1910
1911 int sldns_wire2str_edns_scan(uint8_t** data, size_t* data_len, char** str,
1912         size_t* str_len, uint8_t* pkt, size_t pktlen)
1913 {
1914         int w = 0;
1915         uint8_t ext_rcode, edns_version;
1916         uint16_t udpsize, edns_bits, rdatalen;
1917         w += sldns_str_print(str, str_len, "; EDNS:");
1918
1919         /* some input checks, domain name */
1920         if(*data_len < 1+10)
1921                 return w + print_remainder_hex("Error malformed 0x",
1922                         data, data_len, str, str_len);
1923         if(*data[0] != 0) {
1924                 return w + print_remainder_hex("Error nonrootdname 0x",
1925                         data, data_len, str, str_len);
1926         }
1927         (*data)++;
1928         (*data_len)--;
1929
1930         /* check type and read fixed contents */
1931         if(sldns_read_uint16((*data)) != LDNS_RR_TYPE_OPT) {
1932                 return w + print_remainder_hex("Error nottypeOPT 0x",
1933                         data, data_len, str, str_len);
1934         }
1935         udpsize = sldns_read_uint16((*data)+2);
1936         ext_rcode = (*data)[4];
1937         edns_version = (*data)[5];
1938         edns_bits = sldns_read_uint16((*data)+6);
1939         rdatalen = sldns_read_uint16((*data)+8);
1940         (*data)+=10;
1941         (*data_len)-=10;
1942
1943         w += sldns_str_print(str, str_len, " version: %u;",
1944                 (unsigned)edns_version);
1945         w += sldns_str_print(str, str_len, " flags:");
1946         if((edns_bits & LDNS_EDNS_MASK_DO_BIT))
1947                 w += sldns_str_print(str, str_len, " do");
1948         /* the extended rcode is the value set, shifted four bits,
1949          * and or'd with the original rcode */
1950         if(ext_rcode) {
1951                 int rc = ((int)ext_rcode)<<4;
1952                 if(pkt && pktlen >= LDNS_HEADER_SIZE)
1953                         rc |= LDNS_RCODE_WIRE(pkt);
1954                 w += sldns_str_print(str, str_len, " ; ext-rcode: %d", rc);
1955         }
1956         w += sldns_str_print(str, str_len, " ; udp: %u", (unsigned)udpsize);
1957
1958         if(rdatalen) {
1959                 if(*data_len < rdatalen) {
1960                         w += sldns_str_print(str, str_len,
1961                                 " ; Error EDNS rdata too short; ");
1962                         rdatalen = *data_len;
1963                 }
1964                 w += print_edns_opts(str, str_len, *data, rdatalen);
1965                 (*data) += rdatalen;
1966                 (*data_len) -= rdatalen;
1967         }
1968         w += sldns_str_print(str, str_len, "\n");
1969         return w;
1970 }