xref: /freebsd/contrib/unbound/sldns/str2wire.c (revision 190cef3d)
1 /**
2  * str2wire.c - read txt presentation of RRs
3  *
4  * (c) NLnet Labs, 2005-2006
5  *
6  * See the file LICENSE for the license
7  */
8 
9 /**
10  * \file
11  *
12  * Parses text to wireformat.
13  */
14 #include "config.h"
15 #include "sldns/str2wire.h"
16 #include "sldns/wire2str.h"
17 #include "sldns/sbuffer.h"
18 #include "sldns/parse.h"
19 #include "sldns/parseutil.h"
20 #include <ctype.h>
21 #ifdef HAVE_TIME_H
22 #include <time.h>
23 #endif
24 #ifdef HAVE_NETDB_H
25 #include <netdb.h>
26 #endif
27 
28 /** return an error */
29 #define RET_ERR(e, off) ((int)((e)|((off)<<LDNS_WIREPARSE_SHIFT)))
30 /** Move parse error but keep its ID */
31 #define RET_ERR_SHIFT(e, move) RET_ERR(LDNS_WIREPARSE_ERROR(e), LDNS_WIREPARSE_OFFSET(e)+(move));
32 #define LDNS_IP6ADDRLEN      (128/8)
33 
34 /*
35  * No special care is taken, all dots are translated into
36  * label separators.
37  * @param rel: true if the domain is not absolute (not terminated in .).
38  * 	The output is then still terminated with a '0' rootlabel.
39  */
40 static int sldns_str2wire_dname_buf_rel(const char* str, uint8_t* buf,
41 	size_t* olen, int* rel)
42 {
43 	size_t len;
44 
45 	const char *s;
46 	uint8_t *q, *pq, label_len;
47 
48 	if(rel) *rel = 0;
49 	len = strlen((char*)str);
50 	/* octet representation can make strings a lot longer than actual length */
51 	if (len > LDNS_MAX_DOMAINLEN * 4) {
52 		return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, 0);
53 	}
54 	if (0 == len) {
55 		return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, 0);
56 	}
57 
58 	/* root label */
59 	if (1 == len && *str == '.') {
60 		if(*olen < 1)
61 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
62 		buf[0] = 0;
63 		*olen = 1;
64 		return LDNS_WIREPARSE_ERR_OK;
65 	}
66 
67 	/* get on with the rest */
68 
69 	/* s is on the current character in the string
70          * pq points to where the labellength is going to go
71          * label_len keeps track of the current label's length
72 	 * q builds the dname inside the buf array
73 	 */
74 	len = 0;
75 	if(*olen < 1)
76 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, 0);
77 	q = buf+1;
78 	pq = buf;
79 	label_len = 0;
80 	for (s = str; *s; s++, q++) {
81 		if (q >= buf + *olen)
82 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
83 		if (q > buf + LDNS_MAX_DOMAINLEN)
84 			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
85 		switch (*s) {
86 		case '.':
87 			if (label_len > LDNS_MAX_LABELLEN) {
88 				return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
89 			}
90 			if (label_len == 0) {
91 				return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
92 			}
93 			len += label_len + 1;
94 			*q = 0;
95 			*pq = label_len;
96 			label_len = 0;
97 			pq = q;
98 			break;
99 		case '\\':
100 			/* octet value or literal char */
101 			s += 1;
102 			if (!sldns_parse_escape(q, &s)) {
103 				*q = 0;
104 				return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, q-buf);
105 			}
106 			s -= 1;
107 			label_len++;
108 			break;
109 		default:
110 			*q = (uint8_t)*s;
111 			label_len++;
112 		}
113 	}
114 
115 	/* add root label if last char was not '.' */
116 	if(label_len != 0) {
117 		if(rel) *rel = 1;
118 		if (q >= buf + *olen)
119 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, q-buf);
120 		if (q > buf + LDNS_MAX_DOMAINLEN) {
121 			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, q-buf);
122 		}
123                 if (label_len > LDNS_MAX_LABELLEN) {
124                         return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, q-buf);
125                 }
126                 if (label_len == 0) { /* label_len 0 but not . at end? */
127                         return RET_ERR(LDNS_WIREPARSE_ERR_EMPTY_LABEL, q-buf);
128                 }
129 		len += label_len + 1;
130 		*pq = label_len;
131 		*q = 0;
132 	}
133 	len++;
134 	*olen = len;
135 
136 	return LDNS_WIREPARSE_ERR_OK;
137 }
138 
139 int sldns_str2wire_dname_buf(const char* str, uint8_t* buf, size_t* len)
140 {
141 	return sldns_str2wire_dname_buf_rel(str, buf, len, NULL);
142 }
143 
144 int sldns_str2wire_dname_buf_origin(const char* str, uint8_t* buf, size_t* len,
145 	uint8_t* origin, size_t origin_len)
146 {
147 	size_t dlen = *len;
148 	int rel = 0;
149 	int s = sldns_str2wire_dname_buf_rel(str, buf, &dlen, &rel);
150 	if(s) return s;
151 
152 	if(rel && origin && dlen > 0) {
153 		if(dlen + origin_len - 1 > LDNS_MAX_DOMAINLEN)
154 			return RET_ERR(LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW,
155 				LDNS_MAX_DOMAINLEN);
156 		if(dlen + origin_len - 1 > *len)
157 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
158 				*len);
159 		memmove(buf+dlen-1, origin, origin_len);
160 		*len = dlen + origin_len - 1;
161 	} else
162 		*len = dlen;
163 	return LDNS_WIREPARSE_ERR_OK;
164 }
165 
166 uint8_t* sldns_str2wire_dname(const char* str, size_t* len)
167 {
168 	uint8_t dname[LDNS_MAX_DOMAINLEN+1];
169 	*len = sizeof(dname);
170 	if(sldns_str2wire_dname_buf(str, dname, len) == 0) {
171 		uint8_t* r = (uint8_t*)malloc(*len);
172 		if(r) return memcpy(r, dname, *len);
173 	}
174 	*len = 0;
175 	return NULL;
176 }
177 
178 /** read owner name */
179 static int
180 rrinternal_get_owner(sldns_buffer* strbuf, uint8_t* rr, size_t* len,
181 	size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
182 	size_t prev_len, char* token, size_t token_len)
183 {
184 	/* split the rr in its parts -1 signals trouble */
185 	if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
186 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
187 			sldns_buffer_position(strbuf));
188 	}
189 
190 	if(strcmp(token, "@") == 0) {
191 		uint8_t* tocopy;
192 		if (origin) {
193 			*dname_len = origin_len;
194 			tocopy = origin;
195 		} else if (prev) {
196 			*dname_len = prev_len;
197 			tocopy = prev;
198 		} else {
199 			/* default to root */
200 			*dname_len = 1;
201 			tocopy = (uint8_t*)"\0";
202 		}
203 		if(*len < *dname_len)
204 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
205 				sldns_buffer_position(strbuf));
206 		memmove(rr, tocopy, *dname_len);
207 	} else if(*token == '\0') {
208 		/* no ownername was given, try prev, if that fails
209 		 * origin, else default to root */
210 		uint8_t* tocopy;
211 		if(prev) {
212 			*dname_len = prev_len;
213 			tocopy = prev;
214 		} else if(origin) {
215 			*dname_len = origin_len;
216 			tocopy = origin;
217 		} else {
218 			*dname_len = 1;
219 			tocopy = (uint8_t*)"\0";
220 		}
221 		if(*len < *dname_len)
222 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
223 				sldns_buffer_position(strbuf));
224 		memmove(rr, tocopy, *dname_len);
225 	} else {
226 		size_t dlen = *len;
227 		int s = sldns_str2wire_dname_buf_origin(token, rr, &dlen,
228 			origin, origin_len);
229 		if(s) return RET_ERR_SHIFT(s,
230 			sldns_buffer_position(strbuf)-strlen(token));
231 		*dname_len = dlen;
232 	}
233 	return LDNS_WIREPARSE_ERR_OK;
234 }
235 
236 /** read ttl */
237 static int
238 rrinternal_get_ttl(sldns_buffer* strbuf, char* token, size_t token_len,
239 	int* not_there, uint32_t* ttl, uint32_t default_ttl)
240 {
241 	const char* endptr;
242 	if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
243 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TTL,
244 			sldns_buffer_position(strbuf));
245 	}
246 	*ttl = (uint32_t) sldns_str2period(token, &endptr);
247 
248 	if (strlen(token) > 0 && !isdigit((unsigned char)token[0])) {
249 		*not_there = 1;
250 		/* ah, it's not there or something */
251 		if (default_ttl == 0) {
252 			*ttl = LDNS_DEFAULT_TTL;
253 		} else {
254 			*ttl = default_ttl;
255 		}
256 	}
257 	return LDNS_WIREPARSE_ERR_OK;
258 }
259 
260 /** read class */
261 static int
262 rrinternal_get_class(sldns_buffer* strbuf, char* token, size_t token_len,
263 	int* not_there, uint16_t* cl)
264 {
265 	/* if 'not_there' then we got token from previous parse routine */
266 	if(!*not_there) {
267 		/* parse new token for class */
268 		if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
269 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_CLASS,
270 				sldns_buffer_position(strbuf));
271 		}
272 	} else *not_there = 0;
273 	*cl = sldns_get_rr_class_by_name(token);
274 	/* class can be left out too, assume IN, current token must be type */
275 	if(*cl == 0 && strcmp(token, "CLASS0") != 0) {
276 		*not_there = 1;
277 		*cl = LDNS_RR_CLASS_IN;
278 	}
279 	return LDNS_WIREPARSE_ERR_OK;
280 }
281 
282 /** read type */
283 static int
284 rrinternal_get_type(sldns_buffer* strbuf, char* token, size_t token_len,
285 	int* not_there, uint16_t* tp)
286 {
287 	/* if 'not_there' then we got token from previous parse routine */
288 	if(!*not_there) {
289 		/* parse new token for type */
290 		if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) {
291 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
292 				sldns_buffer_position(strbuf));
293 		}
294 	}
295 	*tp = sldns_get_rr_type_by_name(token);
296 	if(*tp == 0 && strcmp(token, "TYPE0") != 0) {
297 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
298 			sldns_buffer_position(strbuf));
299 	}
300 	return LDNS_WIREPARSE_ERR_OK;
301 }
302 
303 /** put type, class, ttl into rr buffer */
304 static int
305 rrinternal_write_typeclassttl(sldns_buffer* strbuf, uint8_t* rr, size_t len,
306 	size_t dname_len, uint16_t tp, uint16_t cl, uint32_t ttl, int question)
307 {
308 	if(question) {
309 		/* question is : name, type, class */
310 		if(dname_len + 4 > len)
311 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
312 				sldns_buffer_position(strbuf));
313 		sldns_write_uint16(rr+dname_len, tp);
314 		sldns_write_uint16(rr+dname_len+2, cl);
315 		return LDNS_WIREPARSE_ERR_OK;
316 	}
317 
318 	/* type(2), class(2), ttl(4), rdatalen(2 (later)) = 10 */
319 	if(dname_len + 10 > len)
320 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
321 			sldns_buffer_position(strbuf));
322 	sldns_write_uint16(rr+dname_len, tp);
323 	sldns_write_uint16(rr+dname_len+2, cl);
324 	sldns_write_uint32(rr+dname_len+4, ttl);
325 	sldns_write_uint16(rr+dname_len+8, 0); /* rdatalen placeholder */
326 	return LDNS_WIREPARSE_ERR_OK;
327 }
328 
329 /** find delimiters for type */
330 static const char*
331 rrinternal_get_delims(sldns_rdf_type rdftype, size_t r_cnt, size_t r_max)
332 {
333 	switch(rdftype) {
334 	case LDNS_RDF_TYPE_B64        :
335 	case LDNS_RDF_TYPE_HEX        : /* These rdf types may con- */
336 	case LDNS_RDF_TYPE_LOC        : /* tain whitespace, only if */
337 	case LDNS_RDF_TYPE_WKS        : /* it is the last rd field. */
338 	case LDNS_RDF_TYPE_IPSECKEY   :
339 	case LDNS_RDF_TYPE_NSEC       :	if (r_cnt == r_max - 1) {
340 						return "\n";
341 					}
342 					break;
343 	default                       :	break;
344 	}
345 	return "\n\t ";
346 }
347 
348 /* Syntactic sugar for sldns_rr_new_frm_str_internal */
349 static int
350 sldns_rdf_type_maybe_quoted(sldns_rdf_type rdf_type)
351 {
352 	return  rdf_type == LDNS_RDF_TYPE_STR ||
353 		rdf_type == LDNS_RDF_TYPE_LONG_STR;
354 }
355 
356 /** see if rdata is quoted */
357 static int
358 rrinternal_get_quoted(sldns_buffer* strbuf, const char** delimiters,
359 	sldns_rdf_type rdftype)
360 {
361 	if(sldns_rdf_type_maybe_quoted(rdftype) &&
362 		sldns_buffer_remaining(strbuf) > 0) {
363 
364 		/* skip spaces */
365 		while(sldns_buffer_remaining(strbuf) > 0 &&
366 			*(sldns_buffer_current(strbuf)) == ' ') {
367 			sldns_buffer_skip(strbuf, 1);
368 		}
369 
370 		if(sldns_buffer_remaining(strbuf) > 0 &&
371 			*(sldns_buffer_current(strbuf)) == '\"') {
372 			*delimiters = "\"\0";
373 			sldns_buffer_skip(strbuf, 1);
374 			return 1;
375 		}
376 	}
377 	return 0;
378 }
379 
380 /** spool hex data into rdata */
381 static int
382 rrinternal_spool_hex(char* token, uint8_t* rr, size_t rr_len,
383 	size_t rr_cur_len, size_t* cur_hex_data_size, size_t hex_data_size)
384 {
385 	char* p = token;
386 	while(*p) {
387 		if(isspace((unsigned char)*p)) {
388 			p++;
389 			continue;
390 		}
391 		if(!isxdigit((unsigned char)*p))
392 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
393 				p-token);
394 		if(*cur_hex_data_size >= hex_data_size)
395 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
396 				p-token);
397 		/* extra robust check */
398 		if(rr_cur_len+(*cur_hex_data_size)/2 >= rr_len)
399 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
400 				p-token);
401 		/* see if 16s or 1s */
402 		if( ((*cur_hex_data_size)&1) == 0) {
403 			rr[rr_cur_len+(*cur_hex_data_size)/2] =
404 				(uint8_t)sldns_hexdigit_to_int(*p)*16;
405 		} else {
406 			rr[rr_cur_len+(*cur_hex_data_size)/2] +=
407 				(uint8_t)sldns_hexdigit_to_int(*p);
408 		}
409 		p++;
410 		(*cur_hex_data_size)++;
411 	}
412 	return LDNS_WIREPARSE_ERR_OK;
413 }
414 
415 /** read unknown rr type format */
416 static int
417 rrinternal_parse_unknown(sldns_buffer* strbuf, char* token, size_t token_len,
418         uint8_t* rr, size_t* rr_len, size_t* rr_cur_len, size_t pre_data_pos)
419 {
420 	const char* delim = "\n\t ";
421 	size_t hex_data_size, cur_hex_data_size;
422 	/* go back to before \#
423 	 * and skip it while setting delimiters better
424 	 */
425 	sldns_buffer_set_position(strbuf, pre_data_pos);
426 	if(sldns_bget_token(strbuf, token, delim, token_len) == -1)
427 		return LDNS_WIREPARSE_ERR_GENERAL; /* should not fail */
428 	/* read rdata octet length */
429 	if(sldns_bget_token(strbuf, token, delim, token_len) == -1) {
430 		/* something goes very wrong here */
431 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
432 			sldns_buffer_position(strbuf));
433 	}
434 	hex_data_size = (size_t)atoi(token);
435 	if(hex_data_size > LDNS_MAX_RDFLEN ||
436 		*rr_cur_len + hex_data_size > *rr_len) {
437 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
438 			sldns_buffer_position(strbuf));
439 	}
440 	/* copy hex chars into hex str (2 chars per byte) */
441 	hex_data_size *= 2;
442 	cur_hex_data_size = 0;
443 	while(cur_hex_data_size < hex_data_size) {
444 		int status;
445 		ssize_t c = sldns_bget_token(strbuf, token, delim, token_len);
446 		if((status = rrinternal_spool_hex(token, rr, *rr_len,
447 			*rr_cur_len, &cur_hex_data_size, hex_data_size)) != 0)
448 			return RET_ERR_SHIFT(status,
449 				sldns_buffer_position(strbuf)-strlen(token));
450 		if(c == -1) {
451 			if(cur_hex_data_size != hex_data_size)
452 				return RET_ERR(
453 					LDNS_WIREPARSE_ERR_SYNTAX_RDATA,
454 					sldns_buffer_position(strbuf));
455 			break;
456 		}
457 	}
458 	*rr_cur_len += hex_data_size/2;
459 	return LDNS_WIREPARSE_ERR_OK;
460 }
461 
462 /** parse normal RR rdata element */
463 static int
464 rrinternal_parse_rdf(sldns_buffer* strbuf, char* token, size_t token_len,
465 	uint8_t* rr, size_t rr_len, size_t* rr_cur_len, sldns_rdf_type rdftype,
466 	uint16_t rr_type, size_t r_cnt, size_t r_max, size_t dname_len,
467 	uint8_t* origin, size_t origin_len)
468 {
469 	size_t len;
470 	int status;
471 
472 	switch(rdftype) {
473 	case LDNS_RDF_TYPE_DNAME:
474 		/* check if the origin should be used or concatenated */
475 		if(strcmp(token, "@") == 0) {
476 			uint8_t* tocopy;
477 			size_t copylen;
478 			if(origin) {
479 				copylen = origin_len;
480 				tocopy = origin;
481 			} else if(rr_type == LDNS_RR_TYPE_SOA) {
482 				copylen = dname_len;
483 				tocopy = rr; /* copy rr owner name */
484 			} else {
485 				copylen = 1;
486 				tocopy = (uint8_t*)"\0";
487 			}
488 			if((*rr_cur_len) + copylen > rr_len)
489 				return RET_ERR(
490 					LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
491 					sldns_buffer_position(strbuf));
492 			memmove(rr+*rr_cur_len, tocopy, copylen);
493 			(*rr_cur_len) += copylen;
494 		} else {
495 			size_t dlen = rr_len - (*rr_cur_len);
496 			int s = sldns_str2wire_dname_buf_origin(token,
497 				rr+*rr_cur_len, &dlen, origin, origin_len);
498 			if(s) return RET_ERR_SHIFT(s,
499 				sldns_buffer_position(strbuf)-strlen(token));
500 			(*rr_cur_len) += dlen;
501 		}
502 		return LDNS_WIREPARSE_ERR_OK;
503 
504 	case LDNS_RDF_TYPE_HEX:
505 	case LDNS_RDF_TYPE_B64:
506 		/* When this is the last rdata field, then the
507 		 * rest should be read in (cause then these
508 		 * rdf types may contain spaces). */
509 		if(r_cnt == r_max - 1) {
510 			size_t tlen = strlen(token);
511 			(void)sldns_bget_token(strbuf, token+tlen, "\n",
512 				token_len - tlen);
513 		}
514 		break;
515 	default:
516 		break;
517 	}
518 
519 	len = rr_len - (*rr_cur_len);
520 	if((status=sldns_str2wire_rdf_buf(token, rr+(*rr_cur_len), &len,
521 		rdftype)) != 0)
522 		return RET_ERR_SHIFT(status,
523 			sldns_buffer_position(strbuf)-strlen(token));
524 	*rr_cur_len += len;
525 	return LDNS_WIREPARSE_ERR_OK;
526 }
527 
528 /**
529  * Parse one rdf token.  Takes care of quotes and parenthesis.
530  */
531 static int
532 sldns_parse_rdf_token(sldns_buffer* strbuf, char* token, size_t token_len,
533 	int* quoted, int* parens, size_t* pre_data_pos,
534 	const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
535 {
536 	size_t slen;
537 
538 	/* skip spaces */
539 	while(sldns_buffer_remaining(strbuf) > 0 && !*quoted &&
540 		*(sldns_buffer_current(strbuf)) == ' ') {
541 		sldns_buffer_skip(strbuf, 1);
542 	}
543 
544 	*pre_data_pos = sldns_buffer_position(strbuf);
545 	if(sldns_bget_token_par(strbuf, token, (*quoted)?"\"":delimiters,
546 		token_len, parens, (*quoted)?NULL:" \t") == -1) {
547 		return 0;
548 	}
549 	slen = strlen(token);
550 	/* check if not quoted yet, and we have encountered quotes */
551 	if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
552 		slen >= 2 &&
553 		(token[0] == '"' || token[0] == '\'') &&
554 		(token[slen-1] == '"' || token[slen-1] == '\'')) {
555 		/* move token two smaller (quotes) with endnull */
556 		memmove(token, token+1, slen-2);
557 		token[slen-2] = 0;
558 		slen -= 2;
559 		*quoted = 1;
560 	} else if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
561 		slen >= 2 &&
562 		(token[0] == '"' || token[0] == '\'')) {
563 		/* got the start quote (remove it) but read remainder
564 		 * of quoted string as well into remainder of token */
565 		memmove(token, token+1, slen-1);
566 		token[slen-1] = 0;
567 		slen -= 1;
568 		*quoted = 1;
569 		/* rewind buffer over skipped whitespace */
570 		while(sldns_buffer_position(strbuf) > 0 &&
571 			(sldns_buffer_current(strbuf)[-1] == ' ' ||
572 			sldns_buffer_current(strbuf)[-1] == '\t')) {
573 			sldns_buffer_skip(strbuf, -1);
574 		}
575 		if(sldns_bget_token_par(strbuf, token+slen,
576 			"\"", token_len-slen,
577 			parens, NULL) == -1) {
578 			return 0;
579 		}
580 		slen = strlen(token);
581 	}
582 	*token_strlen = slen;
583 	return 1;
584 }
585 
586 /** Add space and one more rdf token onto the existing token string. */
587 static int
588 sldns_affix_token(sldns_buffer* strbuf, char* token, size_t* token_len,
589 	int* quoted, int* parens, size_t* pre_data_pos,
590 	const char* delimiters, sldns_rdf_type rdftype, size_t* token_strlen)
591 {
592 	size_t addlen = *token_len - *token_strlen;
593 	size_t addstrlen = 0;
594 
595 	/* add space */
596 	if(addlen < 1) return 0;
597 	token[*token_strlen] = ' ';
598 	token[++(*token_strlen)] = 0;
599 
600 	/* read another token */
601 	addlen = *token_len - *token_strlen;
602 	if(!sldns_parse_rdf_token(strbuf, token+*token_strlen, addlen, quoted,
603 		parens, pre_data_pos, delimiters, rdftype, &addstrlen))
604 		return 0;
605 	(*token_strlen) += addstrlen;
606 	return 1;
607 }
608 
609 /** parse rdata from string into rr buffer(-remainder after dname). */
610 static int
611 rrinternal_parse_rdata(sldns_buffer* strbuf, char* token, size_t token_len,
612 	uint8_t* rr, size_t* rr_len, size_t dname_len, uint16_t rr_type,
613 	uint8_t* origin, size_t origin_len)
614 {
615 	const sldns_rr_descriptor *desc = sldns_rr_descript((uint16_t)rr_type);
616 	size_t r_cnt, r_min, r_max;
617 	size_t rr_cur_len = dname_len + 10, pre_data_pos, token_strlen;
618 	int was_unknown_rr_format = 0, parens = 0, status, quoted;
619 	const char* delimiters;
620 	sldns_rdf_type rdftype;
621 	/* a desc is always returned */
622 	if(!desc) return LDNS_WIREPARSE_ERR_GENERAL;
623 	r_max = sldns_rr_descriptor_maximum(desc);
624 	r_min = sldns_rr_descriptor_minimum(desc);
625 	/* robust check */
626 	if(rr_cur_len > *rr_len)
627 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
628 			sldns_buffer_position(strbuf));
629 
630 	/* because number of fields can be variable, we can't rely on
631 	 * _maximum() only */
632 	for(r_cnt=0; r_cnt < r_max; r_cnt++) {
633 		rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
634 		delimiters = rrinternal_get_delims(rdftype, r_cnt, r_max);
635 		quoted = rrinternal_get_quoted(strbuf, &delimiters, rdftype);
636 
637 		if(!sldns_parse_rdf_token(strbuf, token, token_len, &quoted,
638 			&parens, &pre_data_pos, delimiters, rdftype,
639 			&token_strlen))
640 			break;
641 
642 		/* rfc3597 specifies that any type can be represented
643 		 * with \# method, which can contain spaces...
644 		 * it does specify size though... */
645 
646 		/* unknown RR data */
647 		if(token_strlen>=2 && strncmp(token, "\\#", 2) == 0 &&
648 			!quoted && (token_strlen == 2 || token[2]==' ')) {
649 			was_unknown_rr_format = 1;
650 			if((status=rrinternal_parse_unknown(strbuf, token,
651 				token_len, rr, rr_len, &rr_cur_len,
652 				pre_data_pos)) != 0)
653 				return status;
654 		} else if(token_strlen > 0 || quoted) {
655 			if(rdftype == LDNS_RDF_TYPE_HIP) {
656 				/* affix the HIT and PK fields, with a space */
657 				if(!sldns_affix_token(strbuf, token,
658 					&token_len, &quoted, &parens,
659 					&pre_data_pos, delimiters,
660 					rdftype, &token_strlen))
661 					break;
662 				if(!sldns_affix_token(strbuf, token,
663 					&token_len, &quoted, &parens,
664 					&pre_data_pos, delimiters,
665 					rdftype, &token_strlen))
666 					break;
667 			} else if(rdftype == LDNS_RDF_TYPE_INT16_DATA &&
668 				strcmp(token, "0")!=0) {
669 				/* affix len and b64 fields */
670 				if(!sldns_affix_token(strbuf, token,
671 					&token_len, &quoted, &parens,
672 					&pre_data_pos, delimiters,
673 					rdftype, &token_strlen))
674 					break;
675 			}
676 
677 			/* normal RR */
678 			if((status=rrinternal_parse_rdf(strbuf, token,
679 				token_len, rr, *rr_len, &rr_cur_len, rdftype,
680 				rr_type, r_cnt, r_max, dname_len, origin,
681 				origin_len)) != 0) {
682 				return status;
683 			}
684 		}
685 	}
686 	if(!was_unknown_rr_format && r_cnt+1 < r_min) {
687 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE,
688 			sldns_buffer_position(strbuf));
689 	}
690 	while(parens != 0) {
691 		/* read remainder, must be "" */
692 		if(sldns_bget_token_par(strbuf, token, "\n", token_len,
693 			&parens, " \t") == -1) {
694 			if(parens != 0)
695 				return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
696 					sldns_buffer_position(strbuf));
697 			break;
698 		}
699 		if(strcmp(token, "") != 0)
700 			return RET_ERR(LDNS_WIREPARSE_ERR_PARENTHESIS,
701 				sldns_buffer_position(strbuf));
702 	}
703 	/* write rdata length */
704 	sldns_write_uint16(rr+dname_len+8, (uint16_t)(rr_cur_len-dname_len-10));
705 	*rr_len = rr_cur_len;
706 	return LDNS_WIREPARSE_ERR_OK;
707 }
708 
709 /*
710  * trailing spaces are allowed
711  * leading spaces are not allowed
712  * allow ttl to be optional
713  * class is optional too
714  * if ttl is missing, and default_ttl is 0, use DEF_TTL
715  * allow ttl to be written as 1d3h
716  * So the RR should look like. e.g.
717  * miek.nl. 3600 IN MX 10 elektron.atoom.net
718  * or
719  * miek.nl. 1h IN MX 10 elektron.atoom.net
720  * or
721  * miek.nl. IN MX 10 elektron.atoom.net
722  */
723 static int
724 sldns_str2wire_rr_buf_internal(const char* str, uint8_t* rr, size_t* len,
725 	size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
726 	size_t origin_len, uint8_t* prev, size_t prev_len, int question)
727 {
728 	int status;
729 	int not_there = 0;
730 	char token[LDNS_MAX_RDFLEN+1];
731 	uint32_t ttl = 0;
732 	uint16_t tp = 0, cl = 0;
733 	size_t ddlen = 0;
734 
735 	/* string in buffer */
736 	sldns_buffer strbuf;
737 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
738 	if(!dname_len) dname_len = &ddlen;
739 
740 	/* parse the owner */
741 	if((status=rrinternal_get_owner(&strbuf, rr, len, dname_len, origin,
742 		origin_len, prev, prev_len, token, sizeof(token))) != 0)
743 		return status;
744 
745 	/* parse the [ttl] [class] <type> */
746 	if((status=rrinternal_get_ttl(&strbuf, token, sizeof(token),
747 		&not_there, &ttl, default_ttl)) != 0)
748 		return status;
749 	if((status=rrinternal_get_class(&strbuf, token, sizeof(token),
750 		&not_there, &cl)) != 0)
751 		return status;
752 	if((status=rrinternal_get_type(&strbuf, token, sizeof(token),
753 		&not_there, &tp)) != 0)
754 		return status;
755 	/* put ttl, class, type into the rr result */
756 	if((status=rrinternal_write_typeclassttl(&strbuf, rr, *len, *dname_len, tp, cl,
757 		ttl, question)) != 0)
758 		return status;
759 	/* for a question-RR we are done, no rdata */
760 	if(question) {
761 		*len = *dname_len + 4;
762 		return LDNS_WIREPARSE_ERR_OK;
763 	}
764 
765 	/* rdata */
766 	if((status=rrinternal_parse_rdata(&strbuf, token, sizeof(token),
767 		rr, len, *dname_len, tp, origin, origin_len)) != 0)
768 		return status;
769 
770 	return LDNS_WIREPARSE_ERR_OK;
771 }
772 
773 int sldns_str2wire_rr_buf(const char* str, uint8_t* rr, size_t* len,
774 	size_t* dname_len, uint32_t default_ttl, uint8_t* origin,
775 	size_t origin_len, uint8_t* prev, size_t prev_len)
776 {
777 	return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
778 		default_ttl, origin, origin_len, prev, prev_len, 0);
779 }
780 
781 int sldns_str2wire_rr_question_buf(const char* str, uint8_t* rr, size_t* len,
782 	size_t* dname_len, uint8_t* origin, size_t origin_len, uint8_t* prev,
783 	size_t prev_len)
784 {
785 	return sldns_str2wire_rr_buf_internal(str, rr, len, dname_len,
786 		0, origin, origin_len, prev, prev_len, 1);
787 }
788 
789 uint16_t sldns_wirerr_get_type(uint8_t* rr, size_t len, size_t dname_len)
790 {
791 	if(len < dname_len+2)
792 		return 0;
793 	return sldns_read_uint16(rr+dname_len);
794 }
795 
796 uint16_t sldns_wirerr_get_class(uint8_t* rr, size_t len, size_t dname_len)
797 {
798 	if(len < dname_len+4)
799 		return 0;
800 	return sldns_read_uint16(rr+dname_len+2);
801 }
802 
803 uint32_t sldns_wirerr_get_ttl(uint8_t* rr, size_t len, size_t dname_len)
804 {
805 	if(len < dname_len+8)
806 		return 0;
807 	return sldns_read_uint32(rr+dname_len+4);
808 }
809 
810 uint16_t sldns_wirerr_get_rdatalen(uint8_t* rr, size_t len, size_t dname_len)
811 {
812 	if(len < dname_len+10)
813 		return 0;
814 	return sldns_read_uint16(rr+dname_len+8);
815 }
816 
817 uint8_t* sldns_wirerr_get_rdata(uint8_t* rr, size_t len, size_t dname_len)
818 {
819 	if(len < dname_len+10)
820 		return NULL;
821 	return rr+dname_len+10;
822 }
823 
824 uint8_t* sldns_wirerr_get_rdatawl(uint8_t* rr, size_t len, size_t dname_len)
825 {
826 	if(len < dname_len+10)
827 		return NULL;
828 	return rr+dname_len+8;
829 }
830 
831 const char* sldns_get_errorstr_parse(int e)
832 {
833 	sldns_lookup_table *lt;
834 	lt = sldns_lookup_by_id(sldns_wireparse_errors, LDNS_WIREPARSE_ERROR(e));
835 	return lt?lt->name:"unknown error";
836 }
837 
838 /* Strip whitespace from the start and the end of <line>.  */
839 char *
840 sldns_strip_ws(char *line)
841 {
842         char *s = line, *e;
843 
844         for (s = line; *s && isspace((unsigned char)*s); s++)
845                 ;
846         for (e = strchr(s, 0); e > s+2 && isspace((unsigned char)e[-1]) && e[-2] != '\\'; e--)
847                 ;
848         *e = 0;
849         return s;
850 }
851 
852 int sldns_fp2wire_rr_buf(FILE* in, uint8_t* rr, size_t* len, size_t* dname_len,
853 	struct sldns_file_parse_state* parse_state)
854 {
855 	char line[LDNS_RR_BUF_SIZE+1];
856 	ssize_t size;
857 
858 	/* read an entire line in from the file */
859 	if((size = sldns_fget_token_l(in, line, LDNS_PARSE_SKIP_SPACE,
860 		LDNS_RR_BUF_SIZE, parse_state?&parse_state->lineno:NULL))
861 		== -1) {
862 		/* if last line was empty, we are now at feof, which is not
863 		 * always a parse error (happens when for instance last line
864 		 * was a comment)
865 		 */
866 		return LDNS_WIREPARSE_ERR_SYNTAX;
867 	}
868 
869 	/* we can have the situation, where we've read ok, but still got
870 	 * no bytes to play with, in this case size is 0 */
871 	if(size == 0) {
872 		if(*len > 0)
873 			rr[0] = 0;
874 		*len = 0;
875 		*dname_len = 0;
876 		return LDNS_WIREPARSE_ERR_OK;
877 	}
878 
879 	if(strncmp(line, "$ORIGIN", 7) == 0 && isspace((unsigned char)line[7])) {
880 		int s;
881 		strlcpy((char*)rr, line, *len);
882 		*len = 0;
883 		*dname_len = 0;
884 		if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
885 		parse_state->origin_len = sizeof(parse_state->origin);
886 		s = sldns_str2wire_dname_buf(sldns_strip_ws(line+8),
887 			parse_state->origin, &parse_state->origin_len);
888 		if(s) parse_state->origin_len = 0;
889 		return s;
890 	} else if(strncmp(line, "$TTL", 4) == 0 && isspace((unsigned char)line[4])) {
891 		const char* end = NULL;
892 		strlcpy((char*)rr, line, *len);
893 		*len = 0;
894 		*dname_len = 0;
895 		if(!parse_state) return LDNS_WIREPARSE_ERR_OK;
896 		parse_state->default_ttl = sldns_str2period(
897 			sldns_strip_ws(line+5), &end);
898 	} else if (strncmp(line, "$INCLUDE", 8) == 0) {
899 		strlcpy((char*)rr, line, *len);
900 		*len = 0;
901 		*dname_len = 0;
902 		return LDNS_WIREPARSE_ERR_INCLUDE;
903 	} else if (strncmp(line, "$", 1) == 0) {
904 		strlcpy((char*)rr, line, *len);
905 		*len = 0;
906 		*dname_len = 0;
907 		return LDNS_WIREPARSE_ERR_INCLUDE;
908 	} else {
909 		int r = sldns_str2wire_rr_buf(line, rr, len, dname_len,
910 			parse_state?parse_state->default_ttl:0,
911 			(parse_state&&parse_state->origin_len)?
912 				parse_state->origin:NULL,
913 			parse_state?parse_state->origin_len:0,
914 			(parse_state&&parse_state->prev_rr_len)?
915 				parse_state->prev_rr:NULL,
916 			parse_state?parse_state->prev_rr_len:0);
917 		if(r == LDNS_WIREPARSE_ERR_OK && (*dname_len) != 0 &&
918 			parse_state &&
919 			(*dname_len) <= sizeof(parse_state->prev_rr)) {
920 			memmove(parse_state->prev_rr, rr, *dname_len);
921 			parse_state->prev_rr_len = (*dname_len);
922 		}
923 		return r;
924 	}
925 	return LDNS_WIREPARSE_ERR_OK;
926 }
927 
928 int sldns_str2wire_rdf_buf(const char* str, uint8_t* rd, size_t* len,
929 	sldns_rdf_type rdftype)
930 {
931 	switch (rdftype) {
932 	case LDNS_RDF_TYPE_DNAME:
933 		return sldns_str2wire_dname_buf(str, rd, len);
934 	case LDNS_RDF_TYPE_INT8:
935 		return sldns_str2wire_int8_buf(str, rd, len);
936 	case LDNS_RDF_TYPE_INT16:
937 		return sldns_str2wire_int16_buf(str, rd, len);
938 	case LDNS_RDF_TYPE_INT32:
939 		return sldns_str2wire_int32_buf(str, rd, len);
940 	case LDNS_RDF_TYPE_A:
941 		return sldns_str2wire_a_buf(str, rd, len);
942 	case LDNS_RDF_TYPE_AAAA:
943 		return sldns_str2wire_aaaa_buf(str, rd, len);
944 	case LDNS_RDF_TYPE_STR:
945 		return sldns_str2wire_str_buf(str, rd, len);
946 	case LDNS_RDF_TYPE_APL:
947 		return sldns_str2wire_apl_buf(str, rd, len);
948 	case LDNS_RDF_TYPE_B64:
949 		return sldns_str2wire_b64_buf(str, rd, len);
950 	case LDNS_RDF_TYPE_B32_EXT:
951 		return sldns_str2wire_b32_ext_buf(str, rd, len);
952 	case LDNS_RDF_TYPE_HEX:
953 		return sldns_str2wire_hex_buf(str, rd, len);
954 	case LDNS_RDF_TYPE_NSEC:
955 		return sldns_str2wire_nsec_buf(str, rd, len);
956 	case LDNS_RDF_TYPE_TYPE:
957 		return sldns_str2wire_type_buf(str, rd, len);
958 	case LDNS_RDF_TYPE_CLASS:
959 		return sldns_str2wire_class_buf(str, rd, len);
960 	case LDNS_RDF_TYPE_CERT_ALG:
961 		return sldns_str2wire_cert_alg_buf(str, rd, len);
962 	case LDNS_RDF_TYPE_ALG:
963 		return sldns_str2wire_alg_buf(str, rd, len);
964 	case LDNS_RDF_TYPE_TIME:
965 		return sldns_str2wire_time_buf(str, rd, len);
966 	case LDNS_RDF_TYPE_PERIOD:
967 		return sldns_str2wire_period_buf(str, rd, len);
968 	case LDNS_RDF_TYPE_TSIGTIME:
969 		return sldns_str2wire_tsigtime_buf(str, rd, len);
970 	case LDNS_RDF_TYPE_LOC:
971 		return sldns_str2wire_loc_buf(str, rd, len);
972 	case LDNS_RDF_TYPE_WKS:
973 		return sldns_str2wire_wks_buf(str, rd, len);
974 	case LDNS_RDF_TYPE_NSAP:
975 		return sldns_str2wire_nsap_buf(str, rd, len);
976 	case LDNS_RDF_TYPE_ATMA:
977 		return sldns_str2wire_atma_buf(str, rd, len);
978 	case LDNS_RDF_TYPE_IPSECKEY:
979 		return sldns_str2wire_ipseckey_buf(str, rd, len);
980 	case LDNS_RDF_TYPE_NSEC3_SALT:
981 		return sldns_str2wire_nsec3_salt_buf(str, rd, len);
982 	case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
983 		return sldns_str2wire_b32_ext_buf(str, rd, len);
984 	case LDNS_RDF_TYPE_ILNP64:
985 		return sldns_str2wire_ilnp64_buf(str, rd, len);
986 	case LDNS_RDF_TYPE_EUI48:
987 		return sldns_str2wire_eui48_buf(str, rd, len);
988 	case LDNS_RDF_TYPE_EUI64:
989 		return sldns_str2wire_eui64_buf(str, rd, len);
990 	case LDNS_RDF_TYPE_TAG:
991 		return sldns_str2wire_tag_buf(str, rd, len);
992 	case LDNS_RDF_TYPE_LONG_STR:
993 		return sldns_str2wire_long_str_buf(str, rd, len);
994 	case LDNS_RDF_TYPE_TSIGERROR:
995 		return sldns_str2wire_tsigerror_buf(str, rd, len);
996 	case LDNS_RDF_TYPE_HIP:
997 		return sldns_str2wire_hip_buf(str, rd, len);
998 	case LDNS_RDF_TYPE_INT16_DATA:
999 		return sldns_str2wire_int16_data_buf(str, rd, len);
1000 	case LDNS_RDF_TYPE_UNKNOWN:
1001 	case LDNS_RDF_TYPE_SERVICE:
1002 		return LDNS_WIREPARSE_ERR_NOT_IMPL;
1003 	case LDNS_RDF_TYPE_NONE:
1004 	default:
1005 		break;
1006 	}
1007 	return LDNS_WIREPARSE_ERR_GENERAL;
1008 }
1009 
1010 int sldns_str2wire_int8_buf(const char* str, uint8_t* rd, size_t* len)
1011 {
1012 	char* end;
1013 	uint8_t r = (uint8_t)strtol((char*)str, &end, 10);
1014 	if(*end != 0)
1015 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1016 	if(*len < 1)
1017 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1018 	rd[0] = r;
1019 	*len = 1;
1020 	return LDNS_WIREPARSE_ERR_OK;
1021 }
1022 
1023 int sldns_str2wire_int16_buf(const char* str, uint8_t* rd, size_t* len)
1024 {
1025 	char* end;
1026 	uint16_t r = (uint16_t)strtol((char*)str, &end, 10);
1027 	if(*end != 0)
1028 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1029 	if(*len < 2)
1030 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1031 	sldns_write_uint16(rd, r);
1032 	*len = 2;
1033 	return LDNS_WIREPARSE_ERR_OK;
1034 }
1035 
1036 int sldns_str2wire_int32_buf(const char* str, uint8_t* rd, size_t* len)
1037 {
1038 	char* end;
1039 	uint32_t r;
1040 	errno = 0; /* must set to zero before call,
1041 			note race condition on errno */
1042 	if(*str == '-')
1043 		r = (uint32_t)strtol((char*)str, &end, 10);
1044 	else	r = (uint32_t)strtoul((char*)str, &end, 10);
1045 	if(*end != 0)
1046 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, end-(char*)str);
1047 	if(errno == ERANGE)
1048 		return LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW;
1049 	if(*len < 4)
1050 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1051 	sldns_write_uint32(rd, r);
1052 	*len = 4;
1053 	return LDNS_WIREPARSE_ERR_OK;
1054 }
1055 
1056 int sldns_str2wire_a_buf(const char* str, uint8_t* rd, size_t* len)
1057 {
1058 	struct in_addr address;
1059 	if(inet_pton(AF_INET, (char*)str, &address) != 1)
1060 		return LDNS_WIREPARSE_ERR_SYNTAX_IP4;
1061 	if(*len < sizeof(address))
1062 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1063 	memmove(rd, &address, sizeof(address));
1064 	*len = sizeof(address);
1065 	return LDNS_WIREPARSE_ERR_OK;
1066 }
1067 
1068 int sldns_str2wire_aaaa_buf(const char* str, uint8_t* rd, size_t* len)
1069 {
1070 #ifdef AF_INET6
1071 	uint8_t address[LDNS_IP6ADDRLEN + 1];
1072 	if(inet_pton(AF_INET6, (char*)str, address) != 1)
1073 		return LDNS_WIREPARSE_ERR_SYNTAX_IP6;
1074 	if(*len < LDNS_IP6ADDRLEN)
1075 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1076 	memmove(rd, address, LDNS_IP6ADDRLEN);
1077 	*len = LDNS_IP6ADDRLEN;
1078 	return LDNS_WIREPARSE_ERR_OK;
1079 #else
1080 	return LDNS_WIREPARSE_ERR_NOT_IMPL;
1081 #endif
1082 }
1083 
1084 int sldns_str2wire_str_buf(const char* str, uint8_t* rd, size_t* len)
1085 {
1086 	uint8_t ch = 0;
1087 	size_t sl = 0;
1088 	const char* s = str;
1089 	/* skip length byte */
1090 	if(*len < 1)
1091 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1092 
1093 	/* read characters */
1094 	while(sldns_parse_char(&ch, &s)) {
1095 		if(sl >= 255)
1096 			return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR, s-str);
1097 		if(*len < sl+1)
1098 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1099 				s-str);
1100 		rd[++sl] = ch;
1101 	}
1102 	if(!s)
1103 		return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
1104 	rd[0] = (uint8_t)sl;
1105 	*len = sl+1;
1106 	return LDNS_WIREPARSE_ERR_OK;
1107 }
1108 
1109 int sldns_str2wire_apl_buf(const char* str, uint8_t* rd, size_t* len)
1110 {
1111 	const char *my_str = str;
1112 
1113 	char my_ip_str[64];
1114 	size_t ip_str_len;
1115 
1116 	uint16_t family;
1117 	int negation;
1118 	size_t adflength = 0;
1119 	uint8_t data[16+4];
1120 	uint8_t prefix;
1121 	size_t i;
1122 
1123 	if(*my_str == '\0') {
1124 		/* empty APL element, no data, no string */
1125 		*len = 0;
1126 		return LDNS_WIREPARSE_ERR_OK;
1127 	}
1128 
1129 	/* [!]afi:address/prefix */
1130 	if (strlen(my_str) < 2
1131 			|| strchr(my_str, ':') == NULL
1132 			|| strchr(my_str, '/') == NULL
1133 			|| strchr(my_str, ':') > strchr(my_str, '/')) {
1134 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1135 	}
1136 
1137 	if (my_str[0] == '!') {
1138 		negation = 1;
1139 		my_str += 1;
1140 	} else {
1141 		negation = 0;
1142 	}
1143 
1144 	family = (uint16_t) atoi(my_str);
1145 
1146 	my_str = strchr(my_str, ':') + 1;
1147 
1148 	/* need ip addr and only ip addr for inet_pton */
1149 	ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
1150 	if(ip_str_len+1 > sizeof(my_ip_str))
1151 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1152 	(void)strlcpy(my_ip_str, my_str, sizeof(my_ip_str));
1153 	my_ip_str[ip_str_len] = 0;
1154 
1155 	if (family == 1) {
1156 		/* ipv4 */
1157 		if(inet_pton(AF_INET, my_ip_str, data+4) == 0)
1158 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1159 		for (i = 0; i < 4; i++) {
1160 			if (data[i+4] != 0) {
1161 				adflength = i + 1;
1162 			}
1163 		}
1164 	} else if (family == 2) {
1165 		/* ipv6 */
1166 		if (inet_pton(AF_INET6, my_ip_str, data+4) == 0)
1167 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1168 		for (i = 0; i < 16; i++) {
1169 			if (data[i+4] != 0) {
1170 				adflength = i + 1;
1171 			}
1172 		}
1173 	} else {
1174 		/* unknown family */
1175 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1176 	}
1177 
1178 	my_str = strchr(my_str, '/') + 1;
1179 	prefix = (uint8_t) atoi(my_str);
1180 
1181 	sldns_write_uint16(data, family);
1182 	data[2] = prefix;
1183 	data[3] = (uint8_t)adflength;
1184 	if (negation) {
1185 		/* set bit 1 of byte 3 */
1186 		data[3] = data[3] | 0x80;
1187 	}
1188 
1189 	if(*len < 4+adflength)
1190 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1191 	memmove(rd, data, 4+adflength);
1192 	*len = 4+adflength;
1193 	return LDNS_WIREPARSE_ERR_OK;
1194 }
1195 
1196 int sldns_str2wire_b64_buf(const char* str, uint8_t* rd, size_t* len)
1197 {
1198 	size_t sz = sldns_b64_pton_calculate_size(strlen(str));
1199 	int n;
1200 	if(strcmp(str, "0") == 0) {
1201 		*len = 0;
1202 		return LDNS_WIREPARSE_ERR_OK;
1203 	}
1204 	if(*len < sz)
1205 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1206 	n = sldns_b64_pton(str, rd, *len);
1207 	if(n < 0)
1208 		return LDNS_WIREPARSE_ERR_SYNTAX_B64;
1209 	*len = (size_t)n;
1210 	return LDNS_WIREPARSE_ERR_OK;
1211 }
1212 
1213 int sldns_str2wire_b32_ext_buf(const char* str, uint8_t* rd, size_t* len)
1214 {
1215 	size_t slen = strlen(str);
1216 	size_t sz = sldns_b32_pton_calculate_size(slen);
1217 	int n;
1218 	if(*len < 1+sz)
1219 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1220 	rd[0] = (uint8_t)sz;
1221 	n = sldns_b32_pton_extended_hex(str, slen, rd+1, *len-1);
1222 	if(n < 0)
1223 		return LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT;
1224 	*len = (size_t)n+1;
1225 	return LDNS_WIREPARSE_ERR_OK;
1226 }
1227 
1228 /** see if the string ends, or ends in whitespace */
1229 static int
1230 sldns_is_last_of_string(const char* str)
1231 {
1232 	if(*str == 0) return 1;
1233 	while(isspace((unsigned char)*str))
1234 		str++;
1235 	if(*str == 0) return 1;
1236 	return 0;
1237 }
1238 
1239 int sldns_str2wire_hex_buf(const char* str, uint8_t* rd, size_t* len)
1240 {
1241 	const char* s = str;
1242 	size_t dlen = 0; /* number of hexdigits parsed */
1243 	while(*s) {
1244 		if(isspace((unsigned char)*s)) {
1245 			s++;
1246 			continue;
1247 		}
1248 		if(dlen == 0 && *s == '0' && sldns_is_last_of_string(s+1)) {
1249 			*len = 0;
1250 			return LDNS_WIREPARSE_ERR_OK;
1251 		}
1252 		if(!isxdigit((unsigned char)*s))
1253 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1254 		if(*len < dlen/2 + 1)
1255 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1256 				s-str);
1257 		if((dlen&1)==0)
1258 			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1259 		else	rd[dlen/2] += (uint8_t)sldns_hexdigit_to_int(*s++);
1260 		dlen++;
1261 	}
1262 	if((dlen&1)!=0)
1263 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1264 	*len = dlen/2;
1265 	return LDNS_WIREPARSE_ERR_OK;
1266 }
1267 
1268 int sldns_str2wire_nsec_buf(const char* str, uint8_t* rd, size_t* len)
1269 {
1270 	const char *delim = "\n\t ";
1271 	char token[64]; /* for a type name */
1272 	size_t type_count = 0;
1273 	int block;
1274 	size_t used = 0;
1275 	uint16_t maxtype = 0;
1276 	uint8_t typebits[8192]; /* 65536 bits */
1277 	uint8_t window_in_use[256];
1278 
1279 	/* string in buffer */
1280 	sldns_buffer strbuf;
1281 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1282 
1283 	/* parse the types */
1284 	memset(typebits, 0, sizeof(typebits));
1285 	memset(window_in_use, 0, sizeof(window_in_use));
1286 	while(sldns_buffer_remaining(&strbuf) > 0 &&
1287 		sldns_bget_token(&strbuf, token, delim, sizeof(token)) != -1) {
1288 		uint16_t t = sldns_get_rr_type_by_name(token);
1289 		if(token[0] == 0)
1290 			continue;
1291 		if(t == 0 && strcmp(token, "TYPE0") != 0)
1292 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TYPE,
1293 				sldns_buffer_position(&strbuf));
1294 		typebits[t/8] |= (0x80>>(t%8));
1295 		window_in_use[t/256] = 1;
1296 		type_count++;
1297 		if(t > maxtype) maxtype = t;
1298 	}
1299 
1300 	/* empty NSEC bitmap */
1301 	if(type_count == 0) {
1302 		*len = 0;
1303 		return LDNS_WIREPARSE_ERR_OK;
1304 	}
1305 
1306 	/* encode windows {u8 windowblock, u8 bitmaplength, 0-32u8 bitmap},
1307 	 * block is 0-255 upper octet of types, length if 0-32. */
1308 	for(block = 0; block <= (int)maxtype/256; block++) {
1309 		int i, blocklen = 0;
1310 		if(!window_in_use[block])
1311 			continue;
1312 		for(i=0; i<32; i++) {
1313 			if(typebits[block*32+i] != 0)
1314 				blocklen = i+1;
1315 		}
1316 		if(blocklen == 0)
1317 			continue; /* empty window should have been !in_use */
1318 		if(used+blocklen+2 > *len)
1319 			return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1320 		rd[used+0] = (uint8_t)block;
1321 		rd[used+1] = (uint8_t)blocklen;
1322 		for(i=0; i<blocklen; i++) {
1323 			rd[used+2+i] = typebits[block*32+i];
1324 		}
1325 		used += blocklen+2;
1326 	}
1327 	*len = used;
1328 	return LDNS_WIREPARSE_ERR_OK;
1329 }
1330 
1331 int sldns_str2wire_type_buf(const char* str, uint8_t* rd, size_t* len)
1332 {
1333 	uint16_t t = sldns_get_rr_type_by_name(str);
1334 	if(t == 0 && strcmp(str, "TYPE0") != 0)
1335 		return LDNS_WIREPARSE_ERR_SYNTAX_TYPE;
1336 	if(*len < 2)
1337 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1338 	sldns_write_uint16(rd, t);
1339 	*len = 2;
1340 	return LDNS_WIREPARSE_ERR_OK;
1341 }
1342 
1343 int sldns_str2wire_class_buf(const char* str, uint8_t* rd, size_t* len)
1344 {
1345 	uint16_t c = sldns_get_rr_class_by_name(str);
1346 	if(c == 0 && strcmp(str, "CLASS0") != 0)
1347 		return LDNS_WIREPARSE_ERR_SYNTAX_CLASS;
1348 	if(*len < 2)
1349 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1350 	sldns_write_uint16(rd, c);
1351 	*len = 2;
1352 	return LDNS_WIREPARSE_ERR_OK;
1353 }
1354 
1355 /* An certificate alg field can either be specified as a 8 bits number
1356  * or by its symbolic name. Handle both */
1357 int sldns_str2wire_cert_alg_buf(const char* str, uint8_t* rd, size_t* len)
1358 {
1359 	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_cert_algorithms,
1360 		str);
1361 	if(*len < 2)
1362 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1363 	if(lt) {
1364 		sldns_write_uint16(rd, (uint16_t)lt->id);
1365 	} else {
1366 		int s = sldns_str2wire_int16_buf(str, rd, len);
1367 		if(s) return s;
1368 		if(sldns_read_uint16(rd) == 0)
1369 			return LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM;
1370 	}
1371 	*len = 2;
1372 	return LDNS_WIREPARSE_ERR_OK;
1373 }
1374 
1375 /* An alg field can either be specified as a 8 bits number
1376  * or by its symbolic name. Handle both */
1377 int sldns_str2wire_alg_buf(const char* str, uint8_t* rd, size_t* len)
1378 {
1379 	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_algorithms, str);
1380 	if(*len < 1)
1381 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1382 	if(lt) {
1383 		rd[0] = (uint8_t)lt->id;
1384 		*len = 1;
1385 	} else {
1386 		/* try as-is (a number) */
1387 		return sldns_str2wire_int8_buf(str, rd, len);
1388 	}
1389 	return LDNS_WIREPARSE_ERR_OK;
1390 }
1391 
1392 int sldns_str2wire_tsigerror_buf(const char* str, uint8_t* rd, size_t* len)
1393 {
1394 	sldns_lookup_table *lt = sldns_lookup_by_name(sldns_tsig_errors, str);
1395 	if(*len < 2)
1396 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1397 	if(lt) {
1398 		sldns_write_uint16(rd, (uint16_t)lt->id);
1399 		*len = 2;
1400 	} else {
1401 		/* try as-is (a number) */
1402 		return sldns_str2wire_int16_buf(str, rd, len);
1403 	}
1404 	return LDNS_WIREPARSE_ERR_OK;
1405 }
1406 
1407 int sldns_str2wire_time_buf(const char* str, uint8_t* rd, size_t* len)
1408 {
1409 	/* convert a time YYYYDDMMHHMMSS to wireformat */
1410 	struct tm tm;
1411 	if(*len < 4)
1412 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1413 
1414 	/* Try to scan the time... */
1415 	memset(&tm, 0, sizeof(tm));
1416 	if (strlen(str) == 14 && sscanf(str, "%4d%2d%2d%2d%2d%2d",
1417 		&tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour,
1418 		&tm.tm_min, &tm.tm_sec) == 6) {
1419 	   	tm.tm_year -= 1900;
1420 	   	tm.tm_mon--;
1421 	   	/* Check values */
1422 		if (tm.tm_year < 70)
1423 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1424 		if (tm.tm_mon < 0 || tm.tm_mon > 11)
1425 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1426 		if (tm.tm_mday < 1 || tm.tm_mday > 31)
1427 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1428 		if (tm.tm_hour < 0 || tm.tm_hour > 23)
1429 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1430 		if (tm.tm_min < 0 || tm.tm_min > 59)
1431 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1432 		if (tm.tm_sec < 0 || tm.tm_sec > 59)
1433 			return LDNS_WIREPARSE_ERR_SYNTAX_TIME;
1434 
1435 		sldns_write_uint32(rd, (uint32_t)sldns_mktime_from_utc(&tm));
1436 	} else {
1437 		/* handle it as 32 bits timestamp */
1438 		char *end;
1439 		uint32_t l = (uint32_t)strtol((char*)str, &end, 10);
1440 		if(*end != 0)
1441 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME,
1442 				end-(char*)str);
1443 		sldns_write_uint32(rd, l);
1444 	}
1445 	*len = 4;
1446 	return LDNS_WIREPARSE_ERR_OK;
1447 }
1448 
1449 int sldns_str2wire_tsigtime_buf(const char* str, uint8_t* rd, size_t* len)
1450 {
1451 	char* end;
1452 	uint64_t t = (uint64_t)strtol((char*)str, &end, 10);
1453 	uint16_t high;
1454 	uint32_t low;
1455 	if(*end != 0)
1456 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TIME, end-str);
1457 	if(*len < 6)
1458 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1459 	high = (uint16_t)(t>>32);
1460 	low = (uint32_t)(t);
1461 	sldns_write_uint16(rd, high);
1462 	sldns_write_uint32(rd+2, low);
1463 	*len = 6;
1464 	return LDNS_WIREPARSE_ERR_OK;
1465 }
1466 
1467 int sldns_str2wire_period_buf(const char* str, uint8_t* rd, size_t* len)
1468 {
1469 	const char* end;
1470 	uint32_t p = sldns_str2period(str, &end);
1471 	if(*end != 0)
1472 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, end-str);
1473 	if(*len < 4)
1474 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1475 	sldns_write_uint32(rd, p);
1476 	*len = 4;
1477 	return LDNS_WIREPARSE_ERR_OK;
1478 }
1479 
1480 /** read "<digits>[.<digits>][mM]" into mantissa exponent format for LOC type */
1481 static int
1482 loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
1483 {
1484 	uint32_t meters = 0, cm = 0, val;
1485 	while (isblank((unsigned char)*my_str)) {
1486 		my_str++;
1487 	}
1488 	meters = (uint32_t)strtol(my_str, &my_str, 10);
1489 	if (*my_str == '.') {
1490 		my_str++;
1491 		cm = (uint32_t)strtol(my_str, &my_str, 10);
1492 	}
1493 	if (meters >= 1) {
1494 		*e = 2;
1495 		val = meters;
1496 	} else	{
1497 		*e = 0;
1498 		val = cm;
1499 	}
1500 	while(val >= 10) {
1501 		(*e)++;
1502 		val /= 10;
1503 	}
1504 	*m = (uint8_t)val;
1505 
1506 	if (*e > 9)
1507 		return 0;
1508 	if (*my_str == 'm' || *my_str == 'M') {
1509 		my_str++;
1510 	}
1511 	*endstr = my_str;
1512 	return 1;
1513 }
1514 
1515 int sldns_str2wire_loc_buf(const char* str, uint8_t* rd, size_t* len)
1516 {
1517 	uint32_t latitude = 0;
1518 	uint32_t longitude = 0;
1519 	uint32_t altitude = 0;
1520 
1521 	uint32_t equator = (uint32_t)1<<31; /* 2**31 */
1522 
1523 	/* only support version 0 */
1524 	uint32_t h = 0;
1525 	uint32_t m = 0;
1526 	uint8_t size_b = 1, size_e = 2;
1527 	uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
1528 	uint8_t vert_pre_b = 1, vert_pre_e = 3;
1529 
1530 	double s = 0.0;
1531 	int northerness;
1532 	int easterness;
1533 
1534 	char *my_str = (char *) str;
1535 
1536 	if (isdigit((unsigned char) *my_str)) {
1537 		h = (uint32_t) strtol(my_str, &my_str, 10);
1538 	} else {
1539 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1540 	}
1541 
1542 	while (isblank((unsigned char) *my_str)) {
1543 		my_str++;
1544 	}
1545 
1546 	if (isdigit((unsigned char) *my_str)) {
1547 		m = (uint32_t) strtol(my_str, &my_str, 10);
1548 	} else if (*my_str == 'N' || *my_str == 'S') {
1549 		goto north;
1550 	} else {
1551 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1552 	}
1553 
1554 	while (isblank((unsigned char) *my_str)) {
1555 		my_str++;
1556 	}
1557 
1558 	if (isdigit((unsigned char) *my_str)) {
1559 		s = strtod(my_str, &my_str);
1560 	}
1561 
1562 	/* skip blanks before northerness */
1563 	while (isblank((unsigned char) *my_str)) {
1564 		my_str++;
1565 	}
1566 
1567 north:
1568 	if (*my_str == 'N') {
1569 		northerness = 1;
1570 	} else if (*my_str == 'S') {
1571 		northerness = 0;
1572 	} else {
1573 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1574 	}
1575 
1576 	my_str++;
1577 
1578 	/* store number */
1579 	s = 1000.0 * s;
1580 	/* add a little to make floor in conversion a round */
1581 	s += 0.0005;
1582 	latitude = (uint32_t) s;
1583 	latitude += 1000 * 60 * m;
1584 	latitude += 1000 * 60 * 60 * h;
1585 	if (northerness) {
1586 		latitude = equator + latitude;
1587 	} else {
1588 		latitude = equator - latitude;
1589 	}
1590 	while (isblank((unsigned char)*my_str)) {
1591 		my_str++;
1592 	}
1593 
1594 	if (isdigit((unsigned char) *my_str)) {
1595 		h = (uint32_t) strtol(my_str, &my_str, 10);
1596 	} else {
1597 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1598 	}
1599 
1600 	while (isblank((unsigned char) *my_str)) {
1601 		my_str++;
1602 	}
1603 
1604 	if (isdigit((unsigned char) *my_str)) {
1605 		m = (uint32_t) strtol(my_str, &my_str, 10);
1606 	} else if (*my_str == 'E' || *my_str == 'W') {
1607 		goto east;
1608 	} else {
1609 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1610 	}
1611 
1612 	while (isblank((unsigned char)*my_str)) {
1613 		my_str++;
1614 	}
1615 
1616 	if (isdigit((unsigned char) *my_str)) {
1617 		s = strtod(my_str, &my_str);
1618 	}
1619 
1620 	/* skip blanks before easterness */
1621 	while (isblank((unsigned char)*my_str)) {
1622 		my_str++;
1623 	}
1624 
1625 east:
1626 	if (*my_str == 'E') {
1627 		easterness = 1;
1628 	} else if (*my_str == 'W') {
1629 		easterness = 0;
1630 	} else {
1631 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1632 	}
1633 
1634 	my_str++;
1635 
1636 	/* store number */
1637 	s *= 1000.0;
1638 	/* add a little to make floor in conversion a round */
1639 	s += 0.0005;
1640 	longitude = (uint32_t) s;
1641 	longitude += 1000 * 60 * m;
1642 	longitude += 1000 * 60 * 60 * h;
1643 
1644 	if (easterness) {
1645 		longitude += equator;
1646 	} else {
1647 		longitude = equator - longitude;
1648 	}
1649 
1650 	altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
1651 		10000000.0 + 0.5);
1652 	if (*my_str == 'm' || *my_str == 'M') {
1653 		my_str++;
1654 	}
1655 
1656 	if (strlen(my_str) > 0) {
1657 		if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1658 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1659 	}
1660 
1661 	if (strlen(my_str) > 0) {
1662 		if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1663 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1664 	}
1665 
1666 	if (strlen(my_str) > 0) {
1667 		if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1668 			return LDNS_WIREPARSE_ERR_INVALID_STR;
1669 	}
1670 
1671 	if(*len < 16)
1672 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1673 	rd[0] = 0;
1674 	rd[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1675 	rd[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1676 	rd[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1677 	sldns_write_uint32(rd + 4, latitude);
1678 	sldns_write_uint32(rd + 8, longitude);
1679 	sldns_write_uint32(rd + 12, altitude);
1680 	*len = 16;
1681 	return LDNS_WIREPARSE_ERR_OK;
1682 }
1683 
1684 static void
1685 ldns_tolower_str(char* s)
1686 {
1687 	if(s) {
1688 		while(*s) {
1689 			*s = (char)tolower((unsigned char)*s);
1690 			s++;
1691 		}
1692 	}
1693 }
1694 
1695 int sldns_str2wire_wks_buf(const char* str, uint8_t* rd, size_t* len)
1696 {
1697 	int rd_len = 1;
1698 	int have_proto = 0;
1699 	char token[50], proto_str[50];
1700 	sldns_buffer strbuf;
1701 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1702 	proto_str[0]=0;
1703 
1704 	/* check we have one byte for proto */
1705 	if(*len < 1)
1706 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1707 
1708 	while(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) > 0) {
1709 		ldns_tolower_str(token);
1710 		if(!have_proto) {
1711 			struct protoent *p = getprotobyname(token);
1712 			have_proto = 1;
1713 			if(p) rd[0] = (uint8_t)p->p_proto;
1714 			else if(strcasecmp(token, "tcp")==0) rd[0]=6;
1715 			else if(strcasecmp(token, "udp")==0) rd[0]=17;
1716 			else rd[0] = (uint8_t)atoi(token);
1717 			(void)strlcpy(proto_str, token, sizeof(proto_str));
1718 		} else {
1719 			int serv_port;
1720 			struct servent *serv = getservbyname(token, proto_str);
1721 			if(serv) serv_port=(int)ntohs((uint16_t)serv->s_port);
1722 			else if(strcasecmp(token, "domain")==0) serv_port=53;
1723 			else {
1724 				serv_port = atoi(token);
1725 				if(serv_port == 0 && strcmp(token, "0") != 0) {
1726 #ifdef HAVE_ENDSERVENT
1727 					endservent();
1728 #endif
1729 #ifdef HAVE_ENDPROTOENT
1730 					endprotoent();
1731 #endif
1732 					return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1733 						sldns_buffer_position(&strbuf));
1734 				}
1735 				if(serv_port < 0 || serv_port > 65535) {
1736 #ifdef HAVE_ENDSERVENT
1737 					endservent();
1738 #endif
1739 #ifdef HAVE_ENDPROTOENT
1740 					endprotoent();
1741 #endif
1742 					return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX,
1743 						sldns_buffer_position(&strbuf));
1744 				}
1745 			}
1746 			if(rd_len < 1+serv_port/8+1) {
1747 				/* bitmap is larger, init new bytes at 0 */
1748 				if(*len < 1+(size_t)serv_port/8+1) {
1749 #ifdef HAVE_ENDSERVENT
1750 					endservent();
1751 #endif
1752 #ifdef HAVE_ENDPROTOENT
1753 					endprotoent();
1754 #endif
1755 					return RET_ERR(
1756 					LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1757 					sldns_buffer_position(&strbuf));
1758 				}
1759 				memset(rd+rd_len, 0, 1+(size_t)serv_port/8+1-rd_len);
1760 				rd_len = 1+serv_port/8+1;
1761 			}
1762 			rd[1+ serv_port/8] |= (1 << (7 - serv_port % 8));
1763 		}
1764 	}
1765 	*len = (size_t)rd_len;
1766 
1767 #ifdef HAVE_ENDSERVENT
1768 	endservent();
1769 #endif
1770 #ifdef HAVE_ENDPROTOENT
1771 	endprotoent();
1772 #endif
1773 	return LDNS_WIREPARSE_ERR_OK;
1774 }
1775 
1776 int sldns_str2wire_nsap_buf(const char* str, uint8_t* rd, size_t* len)
1777 {
1778 	const char* s = str;
1779 	size_t slen;
1780 	size_t dlen = 0; /* number of hexdigits parsed */
1781 
1782 	/* just a hex string with optional dots? */
1783 	if (s[0] != '0' || s[1] != 'x')
1784 		return LDNS_WIREPARSE_ERR_INVALID_STR;
1785 	s += 2;
1786 	slen = strlen(s);
1787 	if(slen > LDNS_MAX_RDFLEN*2)
1788 		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1789 	while(*s) {
1790 		if(isspace((unsigned char)*s) || *s == '.') {
1791 			s++;
1792 			continue;
1793 		}
1794 		if(!isxdigit((unsigned char)*s))
1795 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1796 		if(*len < dlen/2 + 1)
1797 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1798 				s-str);
1799 		if((dlen&1)==0)
1800 			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1801 		else	rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1802 		dlen++;
1803 	}
1804 	if((dlen&1)!=0)
1805 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1806 	*len = dlen/2;
1807 	return LDNS_WIREPARSE_ERR_OK;
1808 }
1809 
1810 int sldns_str2wire_atma_buf(const char* str, uint8_t* rd, size_t* len)
1811 {
1812 	const char* s = str;
1813 	size_t slen = strlen(str);
1814 	size_t dlen = 0; /* number of hexdigits parsed */
1815 
1816 	/* just a hex string with optional dots? */
1817 	/* notimpl e.164 format */
1818 	if(slen > LDNS_MAX_RDFLEN*2)
1819 		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
1820 	while(*s) {
1821 		if(isspace((unsigned char)*s) || *s == '.') {
1822 			s++;
1823 			continue;
1824 		}
1825 		if(!isxdigit((unsigned char)*s))
1826 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1827 		if(*len < dlen/2 + 1)
1828 			return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1829 				s-str);
1830 		if((dlen&1)==0)
1831 			rd[dlen/2] = (uint8_t)sldns_hexdigit_to_int(*s++) * 16;
1832 		else	rd[dlen/2] += sldns_hexdigit_to_int(*s++);
1833 		dlen++;
1834 	}
1835 	if((dlen&1)!=0)
1836 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, s-str);
1837 	*len = dlen/2;
1838 	return LDNS_WIREPARSE_ERR_OK;
1839 }
1840 
1841 int sldns_str2wire_ipseckey_buf(const char* str, uint8_t* rd, size_t* len)
1842 {
1843 	size_t gwlen = 0, keylen = 0;
1844 	int s;
1845 	uint8_t gwtype;
1846 	char token[512];
1847 	sldns_buffer strbuf;
1848 	sldns_buffer_init_frm_data(&strbuf, (uint8_t*)str, strlen(str));
1849 
1850 	if(*len < 3)
1851 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1852 	/* precedence */
1853 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1854 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1855 			sldns_buffer_position(&strbuf));
1856 	rd[0] = (uint8_t)atoi(token);
1857 	/* gateway_type */
1858 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1859 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1860 			sldns_buffer_position(&strbuf));
1861 	rd[1] = (uint8_t)atoi(token);
1862 	gwtype = rd[1];
1863 	/* algorithm */
1864 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1865 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1866 			sldns_buffer_position(&strbuf));
1867 	rd[2] = (uint8_t)atoi(token);
1868 
1869 	/* gateway */
1870 	if(sldns_bget_token(&strbuf, token, "\t\n ", sizeof(token)) <= 0)
1871 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1872 			sldns_buffer_position(&strbuf));
1873 	if(gwtype == 0) {
1874 		/* NOGATEWAY */
1875 		if(strcmp(token, ".") != 0)
1876 			return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1877 				sldns_buffer_position(&strbuf));
1878 		gwlen = 0;
1879 	} else if(gwtype == 1) {
1880 		/* IP4 */
1881 		gwlen = *len - 3;
1882 		s = sldns_str2wire_a_buf(token, rd+3, &gwlen);
1883 		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1884 	} else if(gwtype == 2) {
1885 		/* IP6 */
1886 		gwlen = *len - 3;
1887 		s = sldns_str2wire_aaaa_buf(token, rd+3, &gwlen);
1888 		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1889 	} else if(gwtype == 3) {
1890 		/* DNAME */
1891 		gwlen = *len - 3;
1892 		s = sldns_str2wire_dname_buf(token, rd+3, &gwlen);
1893 		if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1894 	} else {
1895 		/* unknown gateway type */
1896 		return RET_ERR(LDNS_WIREPARSE_ERR_INVALID_STR,
1897 			sldns_buffer_position(&strbuf));
1898 	}
1899 	/* double check for size */
1900 	if(*len < 3 + gwlen)
1901 		return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
1902 			sldns_buffer_position(&strbuf));
1903 
1904 	/* publickey in remainder of strbuf */
1905 	keylen = *len - 3 - gwlen;
1906 	s = sldns_str2wire_b64_buf((const char*)sldns_buffer_current(&strbuf),
1907 		rd+3+gwlen, &keylen);
1908 	if(s) return RET_ERR_SHIFT(s, sldns_buffer_position(&strbuf));
1909 
1910 	*len = 3 + gwlen + keylen;
1911 	return LDNS_WIREPARSE_ERR_OK;
1912 }
1913 
1914 int sldns_str2wire_nsec3_salt_buf(const char* str, uint8_t* rd, size_t* len)
1915 {
1916 	int i, salt_length_str = (int)strlen(str);
1917 	if (salt_length_str == 1 && str[0] == '-') {
1918 		salt_length_str = 0;
1919 	} else if (salt_length_str % 2 != 0) {
1920 		return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1921 	}
1922 	if (salt_length_str > 512)
1923 		return LDNS_WIREPARSE_ERR_SYNTAX_HEX;
1924 	if(*len < 1+(size_t)salt_length_str / 2)
1925 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1926 	rd[0] = (uint8_t) (salt_length_str / 2);
1927 	for (i = 0; i < salt_length_str; i += 2) {
1928 		if (isxdigit((unsigned char)str[i]) &&
1929 			isxdigit((unsigned char)str[i+1])) {
1930 			rd[1+i/2] = (uint8_t)(sldns_hexdigit_to_int(str[i])*16
1931 				+ sldns_hexdigit_to_int(str[i+1]));
1932 		} else {
1933 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_HEX, i);
1934 		}
1935 	}
1936 	*len = 1 + (size_t)rd[0];
1937 	return LDNS_WIREPARSE_ERR_OK;
1938 }
1939 
1940 int sldns_str2wire_ilnp64_buf(const char* str, uint8_t* rd, size_t* len)
1941 {
1942 	unsigned int a, b, c, d;
1943 	uint16_t shorts[4];
1944 	int l;
1945 	if(*len < sizeof(shorts))
1946 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1947 
1948 	if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1949 			l != (int)strlen(str) || /* more data to read */
1950 			strpbrk(str, "+-")       /* signed hexes */
1951 			)
1952 		return LDNS_WIREPARSE_ERR_SYNTAX_ILNP64;
1953 	shorts[0] = htons(a);
1954 	shorts[1] = htons(b);
1955 	shorts[2] = htons(c);
1956 	shorts[3] = htons(d);
1957 	memmove(rd, &shorts, sizeof(shorts));
1958 	*len = sizeof(shorts);
1959 	return LDNS_WIREPARSE_ERR_OK;
1960 }
1961 
1962 int sldns_str2wire_eui48_buf(const char* str, uint8_t* rd, size_t* len)
1963 {
1964 	unsigned int a, b, c, d, e, f;
1965 	int l;
1966 
1967 	if(*len < 6)
1968 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1969 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1970 			&a, &b, &c, &d, &e, &f, &l) != 6 ||
1971 			l != (int)strlen(str))
1972 		return LDNS_WIREPARSE_ERR_SYNTAX_EUI48;
1973 	rd[0] = a;
1974 	rd[1] = b;
1975 	rd[2] = c;
1976 	rd[3] = d;
1977 	rd[4] = e;
1978 	rd[5] = f;
1979 	*len = 6;
1980 	return LDNS_WIREPARSE_ERR_OK;
1981 }
1982 
1983 int sldns_str2wire_eui64_buf(const char* str, uint8_t* rd, size_t* len)
1984 {
1985 	unsigned int a, b, c, d, e, f, g, h;
1986 	int l;
1987 
1988 	if(*len < 8)
1989 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
1990 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
1991 			&a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
1992 			l != (int)strlen(str))
1993 		return LDNS_WIREPARSE_ERR_SYNTAX_EUI64;
1994 	rd[0] = a;
1995 	rd[1] = b;
1996 	rd[2] = c;
1997 	rd[3] = d;
1998 	rd[4] = e;
1999 	rd[5] = f;
2000 	rd[6] = g;
2001 	rd[7] = h;
2002 	*len = 8;
2003 	return LDNS_WIREPARSE_ERR_OK;
2004 }
2005 
2006 int sldns_str2wire_tag_buf(const char* str, uint8_t* rd, size_t* len)
2007 {
2008 	size_t slen = strlen(str);
2009 	const char* ptr;
2010 
2011 	if (slen > 255)
2012 		return LDNS_WIREPARSE_ERR_SYNTAX_TAG;
2013 	if(*len < slen+1)
2014 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2015 	for (ptr = str; *ptr; ptr++) {
2016 		if(!isalnum((unsigned char)*ptr))
2017 			return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_TAG, ptr-str);
2018 	}
2019 	rd[0] = (uint8_t)slen;
2020 	memmove(rd+1, str, slen);
2021 	*len = slen+1;
2022 	return LDNS_WIREPARSE_ERR_OK;
2023 }
2024 
2025 int sldns_str2wire_long_str_buf(const char* str, uint8_t* rd, size_t* len)
2026 {
2027 	uint8_t ch = 0;
2028 	const char* pstr = str;
2029 	size_t length = 0;
2030 
2031 	/* Fill data with parsed bytes */
2032 	while (sldns_parse_char(&ch, &pstr)) {
2033 		if(*len < length+1)
2034 			return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2035 		rd[length++] = ch;
2036 	}
2037 	if(!pstr)
2038 		return LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE;
2039 	*len = length;
2040 	return LDNS_WIREPARSE_ERR_OK;
2041 }
2042 
2043 int sldns_str2wire_hip_buf(const char* str, uint8_t* rd, size_t* len)
2044 {
2045 	char* s, *end;
2046 	int e;
2047 	size_t hitlen, pklen = 0;
2048 	/* presentation format:
2049 	 * 	pk-algo HIThex pubkeybase64
2050 	 * wireformat:
2051 	 * 	hitlen[1byte] pkalgo[1byte] pubkeylen[2byte] [hit] [pubkey] */
2052 	if(*len < 4)
2053 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2054 
2055 	/* read PK algorithm */
2056 	rd[1] = (uint8_t)strtol((char*)str, &s, 10);
2057 	if(*s != ' ')
2058 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2059 	s++;
2060 	while(*s == ' ')
2061 		s++;
2062 
2063 	/* read HIT hex tag */
2064 	/* zero terminate the tag (replace later) */
2065 	end = strchr(s, ' ');
2066 	if(!end) return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX, s-(char*)str);
2067 	*end = 0;
2068 	hitlen = *len - 4;
2069 	if((e = sldns_str2wire_hex_buf(s, rd+4, &hitlen)) != 0) {
2070 		*end = ' ';
2071 		return RET_ERR_SHIFT(e, s-(char*)str);
2072 	}
2073 	if(hitlen > 255) {
2074 		*end = ' ';
2075 		return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+255*2);
2076 	}
2077 	rd[0] = (uint8_t)hitlen;
2078 	*end = ' ';
2079 	s = end+1;
2080 
2081 	/* read pubkey base64 sequence */
2082 	pklen = *len - 4 - hitlen;
2083 	if((e = sldns_str2wire_b64_buf(s, rd+4+hitlen, &pklen)) != 0)
2084 		return RET_ERR_SHIFT(e, s-(char*)str);
2085 	if(pklen > 65535)
2086 		return RET_ERR(LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, s-(char*)str+65535);
2087 	sldns_write_uint16(rd+2, (uint16_t)pklen);
2088 
2089 	*len = 4 + hitlen + pklen;
2090 	return LDNS_WIREPARSE_ERR_OK;
2091 }
2092 
2093 int sldns_str2wire_int16_data_buf(const char* str, uint8_t* rd, size_t* len)
2094 {
2095 	char* s;
2096 	int n;
2097 	n = strtol(str, &s, 10);
2098 	if(*len < ((size_t)n)+2)
2099 		return LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL;
2100 	if(n > 65535)
2101 		return LDNS_WIREPARSE_ERR_LABEL_OVERFLOW;
2102 
2103 	if(n == 0) {
2104 		sldns_write_uint16(rd, 0);
2105 		*len = 2;
2106 		return LDNS_WIREPARSE_ERR_OK;
2107 	}
2108 	if(*s != ' ')
2109 		return RET_ERR(LDNS_WIREPARSE_ERR_SYNTAX_INT, s-(char*)str);
2110 	s++;
2111 	while(*s == ' ')
2112 		s++;
2113 
2114 	n = sldns_b64_pton(s, rd+2, (*len)-2);
2115 	if(n < 0)
2116 		return LDNS_WIREPARSE_ERR_SYNTAX_B64;
2117 	sldns_write_uint16(rd, (uint16_t)n);
2118 	*len = ((size_t)n)+2;
2119 	return LDNS_WIREPARSE_ERR_OK;
2120 }
2121