xref: /dragonfly/contrib/ldns/str2host.c (revision c6ecc293)
1 /*
2  * str2host.c
3  *
4  * conversion routines from the presentation format
5  * to the host format
6  *
7  * a Net::DNS like library for C
8  *
9  * (c) NLnet Labs, 2004-2006
10  *
11  * See the file LICENSE for the license
12  */
13 #include <ldns/config.h>
14 
15 #include <ldns/ldns.h>
16 
17 #ifdef HAVE_SYS_SOCKET_H
18 #include <sys/socket.h>
19 #endif
20 #ifdef HAVE_ARPA_INET_H
21 #include <arpa/inet.h>
22 #endif
23 #include <time.h>
24 
25 #include <errno.h>
26 #ifdef HAVE_NETDB_H
27 #include <netdb.h>
28 #endif
29 
30 #include <limits.h>
31 #ifdef HAVE_SYS_PARAM_H
32 #include <sys/param.h>
33 #endif
34 
35 ldns_status
36 ldns_str2rdf_int16(ldns_rdf **rd, const char *shortstr)
37 {
38 	char *end = NULL;
39 	uint16_t *r;
40 	r = LDNS_MALLOC(uint16_t);
41         if(!r) return LDNS_STATUS_MEM_ERR;
42 
43 	*r = htons((uint16_t)strtol((char *)shortstr, &end, 10));
44 
45 	if(*end != 0) {
46 		LDNS_FREE(r);
47 		return LDNS_STATUS_INVALID_INT;
48 	} else {
49 		*rd = ldns_rdf_new_frm_data(
50 			LDNS_RDF_TYPE_INT16, sizeof(uint16_t), r);
51 		LDNS_FREE(r);
52 		return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
53 	}
54 }
55 
56 ldns_status
57 ldns_str2rdf_time(ldns_rdf **rd, const char *time)
58 {
59 	/* convert a time YYYYDDMMHHMMSS to wireformat */
60 	uint32_t *r = NULL;
61 	struct tm tm;
62 	uint32_t l;
63 	char *end;
64 
65 	/* Try to scan the time... */
66 	r = (uint32_t *)LDNS_MALLOC(uint32_t);
67         if(!r) return LDNS_STATUS_MEM_ERR;
68 
69 	memset(&tm, 0, sizeof(tm));
70 
71 	if (strlen(time) == 14 &&
72 	    sscanf(time, "%4d%2d%2d%2d%2d%2d", &tm.tm_year, &tm.tm_mon, &tm.tm_mday, &tm.tm_hour, &tm.tm_min, &tm.tm_sec) == 6
73 	   ) {
74 	   	tm.tm_year -= 1900;
75 	   	tm.tm_mon--;
76 	   	/* Check values */
77 		if (tm.tm_year < 70) {
78 			goto bad_format;
79 		}
80 		if (tm.tm_mon < 0 || tm.tm_mon > 11) {
81 			goto bad_format;
82 		}
83 		if (tm.tm_mday < 1 || tm.tm_mday > 31) {
84 			goto bad_format;
85 		}
86 
87 		if (tm.tm_hour < 0 || tm.tm_hour > 23) {
88 			goto bad_format;
89 		}
90 
91 		if (tm.tm_min < 0 || tm.tm_min > 59) {
92 			goto bad_format;
93 		}
94 
95 		if (tm.tm_sec < 0 || tm.tm_sec > 59) {
96 			goto bad_format;
97 		}
98 
99 		l = htonl(ldns_mktime_from_utc(&tm));
100 		memcpy(r, &l, sizeof(uint32_t));
101 		*rd = ldns_rdf_new_frm_data(
102 			LDNS_RDF_TYPE_TIME, sizeof(uint32_t), r);
103 		LDNS_FREE(r);
104 		return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
105 	} else {
106 		/* handle it as 32 bits timestamp */
107 		l = htonl((uint32_t)strtol((char*)time, &end, 10));
108 		if(*end != 0) {
109 			LDNS_FREE(r);
110 			return LDNS_STATUS_ERR;
111 		} else {
112 			memcpy(r, &l, sizeof(uint32_t));
113 			*rd = ldns_rdf_new_frm_data(
114 				LDNS_RDF_TYPE_INT32, sizeof(uint32_t), r);
115 			LDNS_FREE(r);
116 		        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
117 		}
118 	}
119 
120 	bad_format:
121 	LDNS_FREE(r);
122 	return LDNS_STATUS_INVALID_TIME;
123 }
124 
125 ldns_status
126 ldns_str2rdf_nsec3_salt(ldns_rdf **rd, const char *salt_str)
127 {
128 	uint8_t salt_length;
129 	int c;
130 	int salt_length_str;
131 
132 	uint8_t *salt;
133 	uint8_t *data;
134 	if(rd == NULL) {
135 		return LDNS_STATUS_NULL;
136 	}
137 
138 	salt_length_str = (int)strlen(salt_str);
139 	if (salt_length_str == 1 && salt_str[0] == '-') {
140 		salt_length_str = 0;
141 	} else if (salt_length_str % 2 != 0) {
142 		return LDNS_STATUS_INVALID_HEX;
143 	}
144 	if (salt_length_str > 512) {
145 		return LDNS_STATUS_INVALID_HEX;
146 	}
147 
148 	salt = LDNS_XMALLOC(uint8_t, salt_length_str / 2);
149         if(!salt) {
150                 return LDNS_STATUS_MEM_ERR;
151         }
152 	for (c = 0; c < salt_length_str; c += 2) {
153 		if (isxdigit((int) salt_str[c]) && isxdigit((int) salt_str[c+1])) {
154 			salt[c/2] = (uint8_t) ldns_hexdigit_to_int(salt_str[c]) * 16 +
155 					  ldns_hexdigit_to_int(salt_str[c+1]);
156 		} else {
157 			LDNS_FREE(salt);
158 			return LDNS_STATUS_INVALID_HEX;
159 		}
160 	}
161 	salt_length = (uint8_t) (salt_length_str / 2);
162 
163 	data = LDNS_XMALLOC(uint8_t, 1 + salt_length);
164         if(!data) {
165 	        LDNS_FREE(salt);
166                 return LDNS_STATUS_MEM_ERR;
167         }
168 	data[0] = salt_length;
169 	memcpy(&data[1], salt, salt_length);
170 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_NSEC3_SALT, 1 + salt_length, data);
171 	LDNS_FREE(data);
172 	LDNS_FREE(salt);
173 
174 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
175 }
176 
177 ldns_status
178 ldns_str2rdf_period(ldns_rdf **rd,const char *period)
179 {
180         uint32_t p;
181         const char *end;
182 
183         /* Allocate required space... */
184         p = ldns_str2period(period, &end);
185 
186         if (*end != 0) {
187 		return LDNS_STATUS_ERR;
188         } else {
189                 p = (uint32_t) htonl(p);
190 		*rd = ldns_rdf_new_frm_data(
191 			LDNS_RDF_TYPE_PERIOD, sizeof(uint32_t), &p);
192         }
193 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
194 }
195 
196 ldns_status
197 ldns_str2rdf_int32(ldns_rdf **rd, const char *longstr)
198 {
199 	char *end;
200 	uint32_t *r = NULL;
201 	uint32_t l;
202 
203 	r = (uint32_t*)LDNS_MALLOC(uint32_t);
204         if(!r) return LDNS_STATUS_MEM_ERR;
205 	errno = 0; /* must set to zero before call,
206 			note race condition on errno */
207 	if(*longstr == '-')
208 		l = htonl((uint32_t)strtol((char*)longstr, &end, 10));
209 	else	l = htonl((uint32_t)strtoul((char*)longstr, &end, 10));
210 
211 	if(*end != 0) {
212 		LDNS_FREE(r);
213 		return LDNS_STATUS_ERR;
214      } else {
215 		if (errno == ERANGE) {
216 			LDNS_FREE(r);
217 			return LDNS_STATUS_SYNTAX_INTEGER_OVERFLOW;
218 		}
219 		memcpy(r, &l, sizeof(uint32_t));
220 		*rd = ldns_rdf_new_frm_data(
221 			LDNS_RDF_TYPE_INT32, sizeof(uint32_t), r);
222 		LDNS_FREE(r);
223 	        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
224 	}
225 }
226 
227 ldns_status
228 ldns_str2rdf_int8(ldns_rdf **rd, const char *bytestr)
229 {
230 	char *end;
231 	uint8_t *r = NULL;
232 
233 	r = LDNS_MALLOC(uint8_t);
234         if(!r) return LDNS_STATUS_MEM_ERR;
235 
236 	*r = (uint8_t)strtol((char*)bytestr, &end, 10);
237 
238         if(*end != 0) {
239 		LDNS_FREE(r);
240 		return LDNS_STATUS_ERR;
241         } else {
242 		*rd = ldns_rdf_new_frm_data(
243 			LDNS_RDF_TYPE_INT8, sizeof(uint8_t), r);
244 		LDNS_FREE(r);
245 	        return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
246         }
247 }
248 
249 
250 /*
251  * Checks whether the escaped value at **s is an decimal value or
252  * a 'normally' escaped character (and not eos)
253  *
254  * The string pointer at *s is increased by either 0 (on error), 1 (on
255  * normal escapes), or 3 (on decimals)
256  *
257  * Returns the number of bytes read from the escaped string, or
258  * 0 on error
259  */
260 INLINE bool
261 parse_escape(uint8_t *ch_p, const char** str_p)
262 {
263 	uint16_t val;
264 
265 	if ((*str_p)[0] && isdigit((unsigned char)(*str_p)[0])  &&
266 	    (*str_p)[1] && isdigit((unsigned char)(*str_p)[1])  &&
267 	    (*str_p)[2] && isdigit((unsigned char)(*str_p)[2]))  {
268 
269 		val = (uint16_t)(((*str_p)[0] - '0') * 100 +
270 				 ((*str_p)[1] - '0') *  10 +
271 				 ((*str_p)[2] - '0'));
272 
273 		if (val > 255) {
274 			goto error;
275 		}
276 		*ch_p = (uint8_t)val;
277 		*str_p += 3;
278 		return true;
279 
280 	} else if ((*str_p)[0] && !isdigit((unsigned char)(*str_p)[0])) {
281 
282 		*ch_p = (uint8_t)*(*str_p)++;
283 		return true;
284 	}
285 error:
286 	*str_p = NULL;
287 	return false; /* LDNS_STATUS_SYNTAX_BAD_ESCAPE */
288 }
289 
290 INLINE bool
291 parse_char(uint8_t *ch_p, const char** str_p)
292 {
293 	switch (**str_p) {
294 
295 	case '\0':	return false;
296 
297 	case '\\':	*str_p += 1;
298 			return parse_escape(ch_p, str_p);
299 
300 	default:	*ch_p = (uint8_t)*(*str_p)++;
301 			return true;
302 	}
303 }
304 
305 /*
306  * No special care is taken, all dots are translated into
307  * label seperators.
308  * Could be made more efficient....we do 3 memcpy's in total...
309  */
310 ldns_status
311 ldns_str2rdf_dname(ldns_rdf **d, const char *str)
312 {
313 	size_t len;
314 
315 	const char *s;
316 	uint8_t *q, *pq, label_len;
317 	uint8_t buf[LDNS_MAX_DOMAINLEN + 1];
318 	*d = NULL;
319 
320 	len = strlen((char*)str);
321 	/* octet representation can make strings a lot longer than actual length */
322 	if (len > LDNS_MAX_DOMAINLEN * 4) {
323 		return LDNS_STATUS_DOMAINNAME_OVERFLOW;
324 	}
325 	if (0 == len) {
326 		return LDNS_STATUS_DOMAINNAME_UNDERFLOW;
327 	}
328 
329 	/* root label */
330 	if (1 == len && *str == '.') {
331 		*d = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, 1, "\0");
332 		return LDNS_STATUS_OK;
333 	}
334 
335 	/* get on with the rest */
336 
337 	/* s is on the current character in the string
338          * pq points to where the labellength is going to go
339          * label_len keeps track of the current label's length
340 	 * q builds the dname inside the buf array
341 	 */
342 	len = 0;
343 	q = buf+1;
344 	pq = buf;
345 	label_len = 0;
346 	for (s = str; *s; s++, q++) {
347 		if (q > buf + LDNS_MAX_DOMAINLEN) {
348 			return LDNS_STATUS_DOMAINNAME_OVERFLOW;
349 		}
350 		*q = 0;
351 		switch (*s) {
352 		case '.':
353 			if (label_len > LDNS_MAX_LABELLEN) {
354 				return LDNS_STATUS_LABEL_OVERFLOW;
355 			}
356 			if (label_len == 0) {
357 				return LDNS_STATUS_EMPTY_LABEL;
358 			}
359 			len += label_len + 1;
360 			*pq = label_len;
361 			label_len = 0;
362 			pq = q;
363 			break;
364 		case '\\':
365 			/* octet value or literal char */
366 			s += 1;
367 			if (! parse_escape(q, &s)) {
368 				return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
369 			}
370 			s -= 1;
371 			label_len++;
372 			break;
373 		default:
374 			*q = (uint8_t)*s;
375 			label_len++;
376 		}
377 	}
378 
379 	/* add root label if last char was not '.' */
380 	if (!ldns_dname_str_absolute(str)) {
381 		if (q > buf + LDNS_MAX_DOMAINLEN) {
382 			return LDNS_STATUS_DOMAINNAME_OVERFLOW;
383 		}
384                 if (label_len > LDNS_MAX_LABELLEN) {
385                         return LDNS_STATUS_LABEL_OVERFLOW;
386                 }
387                 if (label_len == 0) { /* label_len 0 but not . at end? */
388                         return LDNS_STATUS_EMPTY_LABEL;
389                 }
390 		len += label_len + 1;
391 		*pq = label_len;
392 		*q = 0;
393 	}
394 	len++;
395 
396 	*d = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_DNAME, len, buf);
397 	return LDNS_STATUS_OK;
398 }
399 
400 ldns_status
401 ldns_str2rdf_a(ldns_rdf **rd, const char *str)
402 {
403 	in_addr_t address;
404         if (inet_pton(AF_INET, (char*)str, &address) != 1) {
405                 return LDNS_STATUS_INVALID_IP4;
406         } else {
407 		*rd = ldns_rdf_new_frm_data(
408 			LDNS_RDF_TYPE_A, sizeof(address), &address);
409         }
410 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
411 }
412 
413 ldns_status
414 ldns_str2rdf_aaaa(ldns_rdf **rd, const char *str)
415 {
416 	uint8_t address[LDNS_IP6ADDRLEN + 1];
417 
418 	if (inet_pton(AF_INET6, (char*)str, address) != 1) {
419 		return LDNS_STATUS_INVALID_IP6;
420 	} else {
421 		*rd = ldns_rdf_new_frm_data(
422 			LDNS_RDF_TYPE_AAAA, sizeof(address) - 1, &address);
423 	}
424 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
425 }
426 
427 ldns_status
428 ldns_str2rdf_str(ldns_rdf **rd, const char *str)
429 {
430 	uint8_t *data, *dp, ch = 0;
431 	size_t length;
432 
433 	/* Worst case space requirement. We'll realloc to actual size later. */
434 	dp = data = LDNS_XMALLOC(uint8_t, strlen(str) > 255 ? 256 : (strlen(str) + 1));
435 	if (! data) {
436 		return LDNS_STATUS_MEM_ERR;
437 	}
438 
439 	/* Fill data (up to 255 characters) */
440 	while (parse_char(&ch, &str)) {
441 		if (dp - data >= 255) {
442 			LDNS_FREE(data);
443 			return LDNS_STATUS_INVALID_STR;
444 		}
445 		*++dp = ch;
446 	}
447 	if (! str) {
448 		LDNS_FREE(data);
449 		return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
450 	}
451 	length = (size_t)(dp - data);
452 	/* Fix last length byte */
453 	data[0] = (uint8_t)length;
454 
455 	/* Lose the overmeasure */
456 	data = LDNS_XREALLOC(dp = data, uint8_t, length + 1);
457 	if (! data) {
458 		LDNS_FREE(dp);
459 		return LDNS_STATUS_MEM_ERR;
460 	}
461 
462 	/* Create rdf */
463 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_STR, length + 1, data);
464 	if (! *rd) {
465 		LDNS_FREE(data);
466 		return LDNS_STATUS_MEM_ERR;
467 	}
468 	return LDNS_STATUS_OK;
469 }
470 
471 ldns_status
472 ldns_str2rdf_apl(ldns_rdf **rd, const char *str)
473 {
474 	const char *my_str = str;
475 
476 	char *my_ip_str;
477 	size_t ip_str_len;
478 
479 	uint16_t family;
480 	bool negation;
481 	uint8_t afdlength = 0;
482 	uint8_t *afdpart;
483 	uint8_t prefix;
484 
485 	uint8_t *data;
486 
487 	size_t i = 0;
488 
489 	/* [!]afi:address/prefix */
490 	if (strlen(my_str) < 2
491 			|| strchr(my_str, ':') == NULL
492 			|| strchr(my_str, '/') == NULL
493 			|| strchr(my_str, ':') > strchr(my_str, '/')) {
494 		return LDNS_STATUS_INVALID_STR;
495 	}
496 
497 	if (my_str[0] == '!') {
498 		negation = true;
499 		my_str += 1;
500 	} else {
501 		negation = false;
502 	}
503 
504 	family = (uint16_t) atoi(my_str);
505 
506 	my_str = strchr(my_str, ':') + 1;
507 
508 	/* need ip addr and only ip addr for inet_pton */
509 	ip_str_len = (size_t) (strchr(my_str, '/') - my_str);
510 	my_ip_str = LDNS_XMALLOC(char, ip_str_len + 1);
511         if(!my_ip_str) return LDNS_STATUS_MEM_ERR;
512 	strncpy(my_ip_str, my_str, ip_str_len + 1);
513 	my_ip_str[ip_str_len] = '\0';
514 
515 	if (family == 1) {
516 		/* ipv4 */
517 		afdpart = LDNS_XMALLOC(uint8_t, 4);
518                 if(!afdpart) {
519                         LDNS_FREE(my_ip_str);
520                         return LDNS_STATUS_MEM_ERR;
521                 }
522 		if (inet_pton(AF_INET, my_ip_str, afdpart) == 0) {
523                         LDNS_FREE(my_ip_str);
524                         LDNS_FREE(afdpart);
525 			return LDNS_STATUS_INVALID_STR;
526 		}
527 		for (i = 0; i < 4; i++) {
528 			if (afdpart[i] != 0) {
529 				afdlength = i + 1;
530 			}
531 		}
532 	} else if (family == 2) {
533 		/* ipv6 */
534 		afdpart = LDNS_XMALLOC(uint8_t, 16);
535                 if(!afdpart) {
536                         LDNS_FREE(my_ip_str);
537                         return LDNS_STATUS_MEM_ERR;
538                 }
539 		if (inet_pton(AF_INET6, my_ip_str, afdpart) == 0) {
540                         LDNS_FREE(my_ip_str);
541                         LDNS_FREE(afdpart);
542 			return LDNS_STATUS_INVALID_STR;
543 		}
544 		for (i = 0; i < 16; i++) {
545 			if (afdpart[i] != 0) {
546 				afdlength = i + 1;
547 			}
548 		}
549 	} else {
550 		/* unknown family */
551 		LDNS_FREE(my_ip_str);
552 		return LDNS_STATUS_INVALID_STR;
553 	}
554 
555 	my_str = strchr(my_str, '/') + 1;
556 	prefix = (uint8_t) atoi(my_str);
557 
558 	data = LDNS_XMALLOC(uint8_t, 4 + afdlength);
559         if(!data) {
560 		LDNS_FREE(afdpart);
561 		LDNS_FREE(my_ip_str);
562 		return LDNS_STATUS_INVALID_STR;
563         }
564 	ldns_write_uint16(data, family);
565 	data[2] = prefix;
566 	data[3] = afdlength;
567 	if (negation) {
568 		/* set bit 1 of byte 3 */
569 		data[3] = data[3] | 0x80;
570 	}
571 
572 	memcpy(data + 4, afdpart, afdlength);
573 
574 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_APL, afdlength + 4, data);
575 	LDNS_FREE(afdpart);
576 	LDNS_FREE(data);
577 	LDNS_FREE(my_ip_str);
578 
579 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
580 }
581 
582 ldns_status
583 ldns_str2rdf_b64(ldns_rdf **rd, const char *str)
584 {
585 	uint8_t *buffer;
586 	int16_t i;
587 
588 	if ((*str == '-' || *str == '0') && str[1] == '\0') {
589 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_B64, 0, NULL);
590 		return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
591 	}
592 
593 	buffer = LDNS_XMALLOC(uint8_t, ldns_b64_ntop_calculate_size(strlen(str)));
594         if(!buffer) {
595                 return LDNS_STATUS_MEM_ERR;
596         }
597 
598 	i = (uint16_t)ldns_b64_pton((const char*)str, buffer,
599 						   ldns_b64_ntop_calculate_size(strlen(str)));
600 	if (-1 == i) {
601 		LDNS_FREE(buffer);
602 		return LDNS_STATUS_INVALID_B64;
603 	} else {
604 		*rd = ldns_rdf_new_frm_data(
605 			LDNS_RDF_TYPE_B64, (uint16_t) i, buffer);
606 	}
607 	LDNS_FREE(buffer);
608 
609 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
610 }
611 
612 ldns_status
613 ldns_str2rdf_b32_ext(ldns_rdf **rd, const char *str)
614 {
615 	uint8_t *buffer;
616 	int i;
617 	/* first byte contains length of actual b32 data */
618 	size_t slen = strlen(str);
619 	size_t len = ldns_b32_pton_calculate_size(slen);
620 	if (len > 255) {
621 		return LDNS_STATUS_INVALID_B32_EXT;
622 	}
623 	buffer = LDNS_XMALLOC(uint8_t, len + 1);
624         if(!buffer) {
625                 return LDNS_STATUS_MEM_ERR;
626         }
627 	buffer[0] = len;
628 
629 	i = ldns_b32_pton_extended_hex((const char*)str, slen, buffer + 1,
630 							 ldns_b32_ntop_calculate_size(slen));
631 	if (i < 0) {
632                 LDNS_FREE(buffer);
633 		return LDNS_STATUS_INVALID_B32_EXT;
634 	} else {
635 		*rd = ldns_rdf_new_frm_data(
636 			LDNS_RDF_TYPE_B32_EXT, (uint16_t) i + 1, buffer);
637 	}
638 	LDNS_FREE(buffer);
639 
640 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
641 }
642 
643 ldns_status
644 ldns_str2rdf_hex(ldns_rdf **rd, const char *str)
645 {
646 	uint8_t *t, *t_orig;
647 	int i;
648 	size_t len;
649 
650 	len = strlen(str);
651 
652 	if (len > LDNS_MAX_RDFLEN * 2) {
653 		return LDNS_STATUS_LABEL_OVERFLOW;
654 	} else {
655 		t = LDNS_XMALLOC(uint8_t, (len / 2) + 1);
656                 if(!t) {
657                         return LDNS_STATUS_MEM_ERR;
658                 }
659 		t_orig = t;
660 		/* Now process octet by octet... */
661 		while (*str) {
662 			*t = 0;
663 			if (isspace((int) *str)) {
664 				str++;
665 			} else {
666 				for (i = 16; i >= 1; i -= 15) {
667 					while (*str && isspace((int) *str)) { str++; }
668 					if (*str) {
669 						if (isxdigit((int) *str)) {
670 							*t += ldns_hexdigit_to_int(*str) * i;
671 						} else {
672                                                         LDNS_FREE(t_orig);
673 							return LDNS_STATUS_ERR;
674 						}
675 						++str;
676 					}
677 				}
678 				++t;
679 			}
680 		}
681 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_HEX,
682 		                            (size_t) (t - t_orig),
683 		                            t_orig);
684 		LDNS_FREE(t_orig);
685 	}
686 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
687 }
688 
689 ldns_status
690 ldns_str2rdf_nsec(ldns_rdf **rd, const char *str)
691 {
692 	const char *delimiters = "\n\t ";
693 	char *token = LDNS_XMALLOC(char, LDNS_MAX_RDFLEN);
694 	ldns_buffer *str_buf;
695 	ssize_t c;
696 	uint16_t cur_type;
697 	size_t type_count = 0;
698 	ldns_rr_type type_list[65536];
699 	if(!token) return LDNS_STATUS_MEM_ERR;
700 	if(rd == NULL) {
701 		LDNS_FREE(token);
702 		return LDNS_STATUS_NULL;
703 	}
704 
705 	str_buf = LDNS_MALLOC(ldns_buffer);
706 	if(!str_buf) {
707 		LDNS_FREE(token);
708 		return LDNS_STATUS_MEM_ERR;
709 	}
710 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
711 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
712 		LDNS_FREE(str_buf);
713 		LDNS_FREE(token);
714 		return LDNS_STATUS_MEM_ERR;
715 	}
716 
717 	while ((c = ldns_bget_token(str_buf, token, delimiters, LDNS_MAX_RDFLEN)) != -1 && c != 0) {
718                 if(type_count >= sizeof(type_list)) {
719 		        LDNS_FREE(str_buf);
720 		        LDNS_FREE(token);
721                         return LDNS_STATUS_ERR;
722                 }
723 		cur_type = ldns_get_rr_type_by_name(token);
724 		type_list[type_count] = cur_type;
725 		type_count++;
726 	}
727 
728 	*rd = ldns_dnssec_create_nsec_bitmap(type_list,
729 	                                     type_count,
730 	                                     LDNS_RR_TYPE_NSEC);
731 
732 	LDNS_FREE(token);
733 	ldns_buffer_free(str_buf);
734 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
735 }
736 
737 ldns_status
738 ldns_str2rdf_type(ldns_rdf **rd, const char *str)
739 {
740 	uint16_t type;
741 	type = htons(ldns_get_rr_type_by_name(str));
742 	/* ldns_rr_type is a 16 bit value */
743 	*rd = ldns_rdf_new_frm_data(
744 		LDNS_RDF_TYPE_TYPE, sizeof(uint16_t), &type);
745 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
746 }
747 
748 ldns_status
749 ldns_str2rdf_class(ldns_rdf **rd, const char *str)
750 {
751 	uint16_t klass;
752 	klass = htons(ldns_get_rr_class_by_name(str));
753 	/* class is 16 bit */
754 	*rd = ldns_rdf_new_frm_data(
755 		LDNS_RDF_TYPE_CLASS, sizeof(uint16_t), &klass);
756 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
757 }
758 
759 /* An certificate alg field can either be specified as a 8 bits number
760  * or by its symbolic name. Handle both
761  */
762 ldns_status
763 ldns_str2rdf_cert_alg(ldns_rdf **rd, const char *str)
764 {
765 	ldns_lookup_table *lt;
766 	ldns_status st;
767 	uint8_t idd[2];
768 	lt = ldns_lookup_by_name(ldns_cert_algorithms, str);
769 	st = LDNS_STATUS_OK;
770 
771 	if (lt) {
772 		ldns_write_uint16(idd, (uint16_t) lt->id);
773 		*rd = ldns_rdf_new_frm_data(
774 			LDNS_RDF_TYPE_INT16, sizeof(uint16_t), idd);
775 		if (!*rd) {
776 			st = LDNS_STATUS_ERR;
777 		}
778 	} else {
779 		/* try as-is (a number) */
780 		st = ldns_str2rdf_int16(rd, str);
781 		if (st == LDNS_STATUS_OK &&
782 		    ldns_rdf2native_int16(*rd) == 0) {
783 			st = LDNS_STATUS_CERT_BAD_ALGORITHM;
784 		}
785 	}
786 
787 	return st;
788 }
789 
790 static ldns_lookup_table ldns_tlsa_certificate_usages[] = {
791 	{ LDNS_TLSA_USAGE_PKIX_TA		, "PKIX-TA"  },
792 	{ LDNS_TLSA_USAGE_PKIX_EE		, "PKIX-EE"  },
793 	{ LDNS_TLSA_USAGE_DANE_TA		, "DANE-TA"  },
794 	{ LDNS_TLSA_USAGE_DANE_EE		, "DANE-EE"  },
795 	{ LDNS_TLSA_USAGE_PRIVCERT		, "PrivCert" },
796         { 0, NULL }
797 };
798 
799 static ldns_lookup_table ldns_tlsa_selectors[] = {
800 	{ LDNS_TLSA_SELECTOR_CERT		, "Cert" },
801 	{ LDNS_TLSA_SELECTOR_SPKI		, "SPKI" },
802 	{ LDNS_TLSA_SELECTOR_PRIVSEL		, "PrivSel" },
803         { 0, NULL }
804 };
805 
806 static ldns_lookup_table ldns_tlsa_matching_types[] = {
807 	{ LDNS_TLSA_MATCHING_TYPE_FULL		, "Full"      },
808 	{ LDNS_TLSA_MATCHING_TYPE_SHA2_256	, "SHA2-256"  },
809 	{ LDNS_TLSA_MATCHING_TYPE_SHA2_512	, "SHA2-512"  },
810 	{ LDNS_TLSA_MATCHING_TYPE_PRIVMATCH	, "PrivMatch" },
811         { 0, NULL }
812 };
813 
814 static ldns_status
815 ldns_str2rdf_mnemonic4int8(ldns_lookup_table *lt,
816 		ldns_rdf **rd, const char *str)
817 {
818 	if ((lt = ldns_lookup_by_name(lt, str))) {
819 		/* it was given as a integer */
820 		*rd = ldns_native2rdf_int8(LDNS_RDF_TYPE_INT8, (uint8_t) lt->id);
821 		if (!*rd)
822 			return LDNS_STATUS_ERR;
823 		else
824 			return LDNS_STATUS_OK;
825 	}
826 	return ldns_str2rdf_int8(rd, str);
827 }
828 
829 /* An alg field can either be specified as a 8 bits number
830  * or by its symbolic name. Handle both
831  */
832 ldns_status
833 ldns_str2rdf_alg(ldns_rdf **rd, const char *str)
834 {
835 	return ldns_str2rdf_mnemonic4int8(ldns_algorithms, rd, str);
836 }
837 
838 ldns_status
839 ldns_str2rdf_certificate_usage(ldns_rdf **rd, const char *str)
840 {
841 	return ldns_str2rdf_mnemonic4int8(
842 			ldns_tlsa_certificate_usages, rd, str);
843 }
844 
845 ldns_status
846 ldns_str2rdf_selector(ldns_rdf **rd, const char *str)
847 {
848 	return ldns_str2rdf_mnemonic4int8(ldns_tlsa_selectors, rd, str);
849 }
850 
851 ldns_status
852 ldns_str2rdf_matching_type(ldns_rdf **rd, const char *str)
853 {
854 	return ldns_str2rdf_mnemonic4int8(ldns_tlsa_matching_types, rd, str);
855 }
856 
857 ldns_status
858 ldns_str2rdf_unknown( ATTR_UNUSED(ldns_rdf **rd)
859 		    , ATTR_UNUSED(const char *str)
860 		    )
861 {
862 	/* this should be caught in an earlier time (general str2host for
863 	   rr's */
864 	return LDNS_STATUS_NOT_IMPL;
865 }
866 
867 ldns_status
868 ldns_str2rdf_service( ATTR_UNUSED(ldns_rdf **rd)
869 		    , ATTR_UNUSED(const char *str)
870 		    )
871 {
872 	/* is this used? is this actually WKS? or SRV? */
873 	return LDNS_STATUS_NOT_IMPL;
874 }
875 
876 static int
877 loc_parse_cm(char* my_str, char** endstr, uint8_t* m, uint8_t* e)
878 {
879 	/* read <digits>[.<digits>][mM] */
880 	/* into mantissa exponent format for LOC type */
881 	uint32_t meters = 0, cm = 0, val;
882 	while (isblank((unsigned char)*my_str)) {
883 		my_str++;
884 	}
885 	meters = (uint32_t)strtol(my_str, &my_str, 10);
886 	if (*my_str == '.') {
887 		my_str++;
888 		cm = (uint32_t)strtol(my_str, &my_str, 10);
889 	}
890 	if (meters >= 1) {
891 		*e = 2;
892 		val = meters;
893 	} else	{
894 		*e = 0;
895 		val = cm;
896 	}
897 	while(val >= 10) {
898 		(*e)++;
899 		val /= 10;
900 	}
901 	*m = (uint8_t)val;
902 
903 	if (*e > 9)
904 		return 0;
905 	if (*my_str == 'm' || *my_str == 'M') {
906 		my_str++;
907 	}
908 	*endstr = my_str;
909 	return 1;
910 }
911 
912 ldns_status
913 ldns_str2rdf_loc(ldns_rdf **rd, const char *str)
914 {
915 	uint32_t latitude = 0;
916 	uint32_t longitude = 0;
917 	uint32_t altitude = 0;
918 
919 	uint8_t *data;
920 	uint32_t equator = (uint32_t) ldns_power(2, 31);
921 
922 	uint32_t h = 0;
923 	uint32_t m = 0;
924 	uint8_t size_b = 1, size_e = 2;
925 	uint8_t horiz_pre_b = 1, horiz_pre_e = 6;
926 	uint8_t vert_pre_b = 1, vert_pre_e = 3;
927 
928 	double s = 0.0;
929 	bool northerness;
930 	bool easterness;
931 
932 	char *my_str = (char *) str;
933 
934 	/* only support version 0 */
935 	if (isdigit((int) *my_str)) {
936 		h = (uint32_t) strtol(my_str, &my_str, 10);
937 	} else {
938 		return LDNS_STATUS_INVALID_STR;
939 	}
940 
941 	while (isblank((int) *my_str)) {
942 		my_str++;
943 	}
944 
945 	if (isdigit((int) *my_str)) {
946 		m = (uint32_t) strtol(my_str, &my_str, 10);
947 	} else if (*my_str == 'N' || *my_str == 'S') {
948 		goto north;
949 	} else {
950 		return LDNS_STATUS_INVALID_STR;
951 	}
952 
953 	while (isblank((int) *my_str)) {
954 		my_str++;
955 	}
956 
957 	if (isdigit((int) *my_str)) {
958 		s = strtod(my_str, &my_str);
959 	}
960 north:
961 	while (isblank((int) *my_str)) {
962 		my_str++;
963 	}
964 
965 	if (*my_str == 'N') {
966 		northerness = true;
967 	} else if (*my_str == 'S') {
968 		northerness = false;
969 	} else {
970 		return LDNS_STATUS_INVALID_STR;
971 	}
972 
973 	my_str++;
974 
975 	/* store number */
976 	s = 1000.0 * s;
977 	/* add a little to make floor in conversion a round */
978 	s += 0.0005;
979 	latitude = (uint32_t) s;
980 	latitude += 1000 * 60 * m;
981 	latitude += 1000 * 60 * 60 * h;
982 	if (northerness) {
983 		latitude = equator + latitude;
984 	} else {
985 		latitude = equator - latitude;
986 	}
987 	while (isblank((unsigned char)*my_str)) {
988 		my_str++;
989 	}
990 
991 	if (isdigit((int) *my_str)) {
992 		h = (uint32_t) strtol(my_str, &my_str, 10);
993 	} else {
994 		return LDNS_STATUS_INVALID_STR;
995 	}
996 
997 	while (isblank((int) *my_str)) {
998 		my_str++;
999 	}
1000 
1001 	if (isdigit((int) *my_str)) {
1002 		m = (uint32_t) strtol(my_str, &my_str, 10);
1003 	} else if (*my_str == 'E' || *my_str == 'W') {
1004 		goto east;
1005 	} else {
1006 		return LDNS_STATUS_INVALID_STR;
1007 	}
1008 
1009 	while (isblank((unsigned char)*my_str)) {
1010 		my_str++;
1011 	}
1012 
1013 	if (isdigit((int) *my_str)) {
1014 		s = strtod(my_str, &my_str);
1015 	}
1016 
1017 east:
1018 	while (isblank((unsigned char)*my_str)) {
1019 		my_str++;
1020 	}
1021 
1022 	if (*my_str == 'E') {
1023 		easterness = true;
1024 	} else if (*my_str == 'W') {
1025 		easterness = false;
1026 	} else {
1027 		return LDNS_STATUS_INVALID_STR;
1028 	}
1029 
1030 	my_str++;
1031 
1032 	/* store number */
1033 	s *= 1000.0;
1034 	/* add a little to make floor in conversion a round */
1035 	s += 0.0005;
1036 	longitude = (uint32_t) s;
1037 	longitude += 1000 * 60 * m;
1038 	longitude += 1000 * 60 * 60 * h;
1039 
1040 	if (easterness) {
1041 		longitude += equator;
1042 	} else {
1043 		longitude = equator - longitude;
1044 	}
1045 
1046 	altitude = (uint32_t)(strtod(my_str, &my_str)*100.0 +
1047 		10000000.0 + 0.5);
1048 	if (*my_str == 'm' || *my_str == 'M') {
1049 		my_str++;
1050 	}
1051 
1052 	if (strlen(my_str) > 0) {
1053 		if(!loc_parse_cm(my_str, &my_str, &size_b, &size_e))
1054 			return LDNS_STATUS_INVALID_STR;
1055 	}
1056 
1057 	if (strlen(my_str) > 0) {
1058 		if(!loc_parse_cm(my_str, &my_str, &horiz_pre_b, &horiz_pre_e))
1059 			return LDNS_STATUS_INVALID_STR;
1060 	}
1061 
1062 	if (strlen(my_str) > 0) {
1063 		if(!loc_parse_cm(my_str, &my_str, &vert_pre_b, &vert_pre_e))
1064 			return LDNS_STATUS_INVALID_STR;
1065 	}
1066 
1067 	data = LDNS_XMALLOC(uint8_t, 16);
1068         if(!data) {
1069                 return LDNS_STATUS_MEM_ERR;
1070         }
1071 	data[0] = 0;
1072 	data[1] = 0;
1073 	data[1] = ((size_b << 4) & 0xf0) | (size_e & 0x0f);
1074 	data[2] = ((horiz_pre_b << 4) & 0xf0) | (horiz_pre_e & 0x0f);
1075 	data[3] = ((vert_pre_b << 4) & 0xf0) | (vert_pre_e & 0x0f);
1076 	ldns_write_uint32(data + 4, latitude);
1077 	ldns_write_uint32(data + 8, longitude);
1078 	ldns_write_uint32(data + 12, altitude);
1079 
1080 	*rd = ldns_rdf_new_frm_data(
1081 		LDNS_RDF_TYPE_LOC, 16, data);
1082 
1083 	LDNS_FREE(data);
1084 	return *rd?LDNS_STATUS_OK:LDNS_STATUS_MEM_ERR;
1085 }
1086 
1087 ldns_status
1088 ldns_str2rdf_wks(ldns_rdf **rd, const char *str)
1089 {
1090 	uint8_t *bitmap = NULL;
1091 	uint8_t *data;
1092 	int bm_len = 0;
1093 
1094 	struct protoent *proto = NULL;
1095 	struct servent *serv = NULL;
1096 	int serv_port;
1097 
1098 	ldns_buffer *str_buf;
1099 
1100 	char *proto_str = NULL;
1101 	char *lc_proto_str = NULL;
1102 	char *token;
1103 	char *lc_token;
1104 	char *c;
1105 	if(strlen(str) == 0)
1106 		token = LDNS_XMALLOC(char, 50);
1107 	else 	token = LDNS_XMALLOC(char, strlen(str)+2);
1108 	if(!token) return LDNS_STATUS_MEM_ERR;
1109 
1110 	str_buf = LDNS_MALLOC(ldns_buffer);
1111 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1112 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1113 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1114 		LDNS_FREE(str_buf);
1115 		LDNS_FREE(token);
1116 		return LDNS_STATUS_MEM_ERR;
1117 	}
1118 
1119 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1120 		if (!proto_str) {
1121 			proto_str = strdup(token);
1122 			lc_proto_str = strdup(token);
1123 			for (c = lc_proto_str; *c; c++) {
1124 				*c = tolower((unsigned char)*c);
1125 			}
1126 			if (!proto_str || !lc_proto_str) {
1127 				free(proto_str);
1128 				free(lc_proto_str);
1129 				LDNS_FREE(bitmap);
1130 				LDNS_FREE(token);
1131 	                        ldns_buffer_free(str_buf);
1132 				return LDNS_STATUS_INVALID_STR;
1133 			}
1134 		} else {
1135 			serv = getservbyname(token, proto_str);
1136 			if (!serv) {
1137 				serv = getservbyname(token, lc_proto_str);
1138 			}
1139 			if (!serv && (lc_token = strdup(token))) {
1140 				for (c = lc_token; *c; c++) {
1141 					*c = tolower((unsigned char)*c);
1142 				}
1143 				serv = getservbyname(lc_token, proto_str);
1144 				if (!serv) {
1145 					serv = getservbyname(lc_token, lc_proto_str);
1146 				}
1147 				free(lc_token);
1148 			}
1149 			if (serv) {
1150 				serv_port = (int) ntohs((uint16_t) serv->s_port);
1151 			} else {
1152 				serv_port = atoi(token);
1153 			}
1154 			if (serv_port < 0 || serv_port > 65535) {
1155 				LDNS_FREE(bitmap);
1156 			        LDNS_FREE(token);
1157                                 ldns_buffer_free(str_buf);
1158 			        free(proto_str);
1159 			        free(lc_proto_str);
1160 			        return LDNS_STATUS_INVALID_STR;
1161 			}
1162 			if (serv_port / 8 >= bm_len) {
1163 				uint8_t *b2 = LDNS_XREALLOC(bitmap, uint8_t, (serv_port / 8) + 1);
1164                                 if(!b2) {
1165 					LDNS_FREE(bitmap);
1166 				        LDNS_FREE(token);
1167 	                                ldns_buffer_free(str_buf);
1168 				        free(proto_str);
1169 				        free(lc_proto_str);
1170 				        return LDNS_STATUS_INVALID_STR;
1171                                 }
1172 				bitmap = b2;
1173 				/* set to zero to be sure */
1174 				for (; bm_len <= serv_port / 8; bm_len++) {
1175 					bitmap[bm_len] = 0;
1176 				}
1177 			}
1178 			ldns_set_bit(bitmap + (serv_port / 8), 7 - (serv_port % 8), true);
1179 		}
1180 	}
1181 
1182 	if (!proto_str || !bitmap) {
1183 		LDNS_FREE(bitmap);
1184 		LDNS_FREE(token);
1185 	        ldns_buffer_free(str_buf);
1186 	        free(proto_str);
1187 	        free(lc_proto_str);
1188 		return LDNS_STATUS_INVALID_STR;
1189 	}
1190 
1191 	data = LDNS_XMALLOC(uint8_t, bm_len + 1);
1192         if(!data) {
1193 	        LDNS_FREE(token);
1194 	        ldns_buffer_free(str_buf);
1195 	        LDNS_FREE(bitmap);
1196 	        free(proto_str);
1197 	        free(lc_proto_str);
1198 	        return LDNS_STATUS_INVALID_STR;
1199         }
1200     if (proto_str)
1201 		proto = getprotobyname(proto_str);
1202     	if (!proto) {
1203 		proto = getprotobyname(lc_proto_str);
1204 	}
1205 	if (proto) {
1206 		data[0] = (uint8_t) proto->p_proto;
1207 	} else if (proto_str) {
1208 		data[0] = (uint8_t) atoi(proto_str);
1209 	}
1210 	memcpy(data + 1, bitmap, (size_t) bm_len);
1211 
1212 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_WKS, (uint16_t) (bm_len + 1), data);
1213 
1214 	LDNS_FREE(data);
1215 	LDNS_FREE(token);
1216 	ldns_buffer_free(str_buf);
1217 	LDNS_FREE(bitmap);
1218 	free(proto_str);
1219 	free(lc_proto_str);
1220 #ifdef HAVE_ENDSERVENT
1221 	endservent();
1222 #endif
1223 #ifdef HAVE_ENDPROTOENT
1224 	endprotoent();
1225 #endif
1226 
1227 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1228 
1229 	return LDNS_STATUS_OK;
1230 }
1231 
1232 ldns_status
1233 ldns_str2rdf_nsap(ldns_rdf **rd, const char *str)
1234 {
1235     size_t len, i;
1236     char* nsap_str = (char*) str;
1237 
1238 	/* just a hex string with optional dots? */
1239 	if (str[0] != '0' || str[1] != 'x') {
1240 		return LDNS_STATUS_INVALID_STR;
1241 	} else {
1242 		len = strlen(str);
1243 		for (i=0; i < len; i++) {
1244 			if (nsap_str[i] == '.')
1245 				nsap_str[i] = ' ';
1246         }
1247 		return ldns_str2rdf_hex(rd, str+2);
1248 	}
1249 }
1250 
1251 ldns_status
1252 ldns_str2rdf_atma(ldns_rdf **rd, const char *str)
1253 {
1254     size_t len, i;
1255     char* atma_str = (char*) str;
1256 	ldns_status status;
1257 
1258 	/* just a hex string with optional dots? */
1259 	len = strlen(str);
1260 	for (i=0; i < len; i++) {
1261 		if (atma_str[i] == '.')
1262 			atma_str[i] = ' ';
1263 	}
1264 	status = ldns_str2rdf_hex(rd, str);
1265     if (status != LDNS_STATUS_OK) {
1266 		; /* probably in e.164 format than */
1267 	}
1268 	return status;
1269 }
1270 
1271 ldns_status
1272 ldns_str2rdf_ipseckey(ldns_rdf **rd, const char *str)
1273 {
1274 	uint8_t precedence = 0;
1275 	uint8_t gateway_type = 0;
1276 	uint8_t algorithm = 0;
1277 	char* gateway = NULL;
1278 	char* publickey = NULL;
1279 	uint8_t *data;
1280 	ldns_buffer *str_buf;
1281 	char *token;
1282 	int token_count = 0;
1283 	int ipseckey_len = 0;
1284 	ldns_rdf* gateway_rdf = NULL;
1285 	ldns_rdf* publickey_rdf = NULL;
1286 	ldns_status status = LDNS_STATUS_OK;
1287 
1288 	if(strlen(str) == 0)
1289 		token = LDNS_XMALLOC(char, 256);
1290 	else	token = LDNS_XMALLOC(char, strlen(str)+2);
1291 	if(!token) return LDNS_STATUS_MEM_ERR;
1292 
1293 	str_buf = LDNS_MALLOC(ldns_buffer);
1294 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1295 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1296 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1297 		LDNS_FREE(str_buf);
1298 		LDNS_FREE(token);
1299 		return LDNS_STATUS_MEM_ERR;
1300 	}
1301 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1302 		switch (token_count) {
1303 				case 0:
1304 					precedence = (uint8_t)atoi(token);
1305 					break;
1306 				case 1:
1307 					gateway_type = (uint8_t)atoi(token);
1308 					break;
1309 				case 2:
1310 					algorithm = (uint8_t)atoi(token);
1311 					break;
1312 				case 3:
1313 					gateway = strdup(token);
1314 					if (!gateway || (gateway_type == 0 &&
1315 							(token[0] != '.' || token[1] != '\0'))) {
1316 						LDNS_FREE(gateway);
1317 						LDNS_FREE(token);
1318 						ldns_buffer_free(str_buf);
1319 						return LDNS_STATUS_INVALID_STR;
1320 					}
1321 					break;
1322 				case 4:
1323 					publickey = strdup(token);
1324 					break;
1325 				default:
1326 					LDNS_FREE(token);
1327 					ldns_buffer_free(str_buf);
1328 					return LDNS_STATUS_INVALID_STR;
1329 					break;
1330 		}
1331 		token_count++;
1332 	}
1333 
1334 	if (!gateway || !publickey) {
1335 		if (gateway)
1336 			LDNS_FREE(gateway);
1337 		if (publickey)
1338 			LDNS_FREE(publickey);
1339 		LDNS_FREE(token);
1340 		ldns_buffer_free(str_buf);
1341 		return LDNS_STATUS_INVALID_STR;
1342 	}
1343 
1344 	if (gateway_type == 1) {
1345 		status = ldns_str2rdf_a(&gateway_rdf, gateway);
1346 	} else if (gateway_type == 2) {
1347 		status = ldns_str2rdf_aaaa(&gateway_rdf, gateway);
1348 	} else if (gateway_type == 3) {
1349 		status = ldns_str2rdf_dname(&gateway_rdf, gateway);
1350 	} else if (gateway_type > 3) {
1351 		status = LDNS_STATUS_INVALID_STR;
1352 	}
1353 
1354 	if (status != LDNS_STATUS_OK) {
1355 		if (gateway)
1356 			LDNS_FREE(gateway);
1357 		if (publickey)
1358 			LDNS_FREE(publickey);
1359 		LDNS_FREE(token);
1360 		ldns_buffer_free(str_buf);
1361 		return LDNS_STATUS_INVALID_STR;
1362 	}
1363 
1364 	status = ldns_str2rdf_b64(&publickey_rdf, publickey);
1365 
1366 	if (status != LDNS_STATUS_OK) {
1367 		if (gateway)
1368 			LDNS_FREE(gateway);
1369 		if (publickey)
1370 			LDNS_FREE(publickey);
1371 		LDNS_FREE(token);
1372 		ldns_buffer_free(str_buf);
1373 		if (gateway_rdf) ldns_rdf_free(gateway_rdf);
1374 		return LDNS_STATUS_INVALID_STR;
1375 	}
1376 
1377 	/* now copy all into one ipseckey rdf */
1378 	if (gateway_type)
1379 		ipseckey_len = 3 + (int)ldns_rdf_size(gateway_rdf) + (int)ldns_rdf_size(publickey_rdf);
1380 	else
1381 		ipseckey_len = 3 + (int)ldns_rdf_size(publickey_rdf);
1382 
1383 	data = LDNS_XMALLOC(uint8_t, ipseckey_len);
1384 	if(!data) {
1385 		if (gateway)
1386 			LDNS_FREE(gateway);
1387 		if (publickey)
1388 			LDNS_FREE(publickey);
1389 		LDNS_FREE(token);
1390 		ldns_buffer_free(str_buf);
1391 		if (gateway_rdf) ldns_rdf_free(gateway_rdf);
1392 		if (publickey_rdf) ldns_rdf_free(publickey_rdf);
1393 		return LDNS_STATUS_MEM_ERR;
1394 	}
1395 
1396 	data[0] = precedence;
1397 	data[1] = gateway_type;
1398 	data[2] = algorithm;
1399 
1400 	if (gateway_type) {
1401 		memcpy(data + 3,
1402 			ldns_rdf_data(gateway_rdf), ldns_rdf_size(gateway_rdf));
1403 		memcpy(data + 3 + ldns_rdf_size(gateway_rdf),
1404 			ldns_rdf_data(publickey_rdf), ldns_rdf_size(publickey_rdf));
1405 	} else {
1406 		memcpy(data + 3,
1407 			ldns_rdf_data(publickey_rdf), ldns_rdf_size(publickey_rdf));
1408 	}
1409 
1410 	*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_IPSECKEY, (uint16_t) ipseckey_len, data);
1411 
1412 	if (gateway)
1413 		LDNS_FREE(gateway);
1414 	if (publickey)
1415 		LDNS_FREE(publickey);
1416 	LDNS_FREE(token);
1417 	ldns_buffer_free(str_buf);
1418 	ldns_rdf_free(gateway_rdf);
1419 	ldns_rdf_free(publickey_rdf);
1420 	LDNS_FREE(data);
1421 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1422 	return LDNS_STATUS_OK;
1423 }
1424 
1425 ldns_status
1426 ldns_str2rdf_ilnp64(ldns_rdf **rd, const char *str)
1427 {
1428 	unsigned int a, b, c, d;
1429 	uint16_t shorts[4];
1430 	int l;
1431 
1432 	if (sscanf(str, "%4x:%4x:%4x:%4x%n", &a, &b, &c, &d, &l) != 4 ||
1433 			l != (int)strlen(str) || /* more data to read */
1434 			strpbrk(str, "+-")       /* signed hexes */
1435 			) {
1436 		return LDNS_STATUS_INVALID_ILNP64;
1437 	} else {
1438 		shorts[0] = htons(a);
1439 		shorts[1] = htons(b);
1440 		shorts[2] = htons(c);
1441 		shorts[3] = htons(d);
1442 		*rd = ldns_rdf_new_frm_data(
1443 			LDNS_RDF_TYPE_ILNP64, 4 * sizeof(uint16_t), &shorts);
1444 	}
1445 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1446 }
1447 
1448 ldns_status
1449 ldns_str2rdf_eui48(ldns_rdf **rd, const char *str)
1450 {
1451 	unsigned int a, b, c, d, e, f;
1452 	uint8_t bytes[6];
1453 	int l;
1454 
1455 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x%n",
1456 			&a, &b, &c, &d, &e, &f, &l) != 6 ||
1457 			l != (int)strlen(str)) {
1458 		return LDNS_STATUS_INVALID_EUI48;
1459 	} else {
1460 		bytes[0] = a;
1461 		bytes[1] = b;
1462 		bytes[2] = c;
1463 		bytes[3] = d;
1464 		bytes[4] = e;
1465 		bytes[5] = f;
1466 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_EUI48, 6, &bytes);
1467 	}
1468 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1469 }
1470 
1471 ldns_status
1472 ldns_str2rdf_eui64(ldns_rdf **rd, const char *str)
1473 {
1474 	unsigned int a, b, c, d, e, f, g, h;
1475 	uint8_t bytes[8];
1476 	int l;
1477 
1478 	if (sscanf(str, "%2x-%2x-%2x-%2x-%2x-%2x-%2x-%2x%n",
1479 			&a, &b, &c, &d, &e, &f, &g, &h, &l) != 8 ||
1480 			l != (int)strlen(str)) {
1481 		return LDNS_STATUS_INVALID_EUI64;
1482 	} else {
1483 		bytes[0] = a;
1484 		bytes[1] = b;
1485 		bytes[2] = c;
1486 		bytes[3] = d;
1487 		bytes[4] = e;
1488 		bytes[5] = f;
1489 		bytes[6] = g;
1490 		bytes[7] = h;
1491 		*rd = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_EUI64, 8, &bytes);
1492 	}
1493 	return *rd ? LDNS_STATUS_OK : LDNS_STATUS_MEM_ERR;
1494 }
1495 
1496 ldns_status
1497 ldns_str2rdf_tag(ldns_rdf **rd, const char *str)
1498 {
1499 	uint8_t *data;
1500 	const char* ptr;
1501 
1502 	if (strlen(str) > 255) {
1503 		return LDNS_STATUS_INVALID_TAG;
1504 	}
1505 	for (ptr = str; *ptr; ptr++) {
1506 		if (! isalnum((unsigned char)*ptr)) {
1507 			return LDNS_STATUS_INVALID_TAG;
1508 		}
1509 	}
1510 	data = LDNS_XMALLOC(uint8_t, strlen(str) + 1);
1511         if (!data) {
1512 		return LDNS_STATUS_MEM_ERR;
1513 	}
1514 	data[0] = strlen(str);
1515 	memcpy(data + 1, str, strlen(str));
1516 
1517 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_TAG, strlen(str) + 1, data);
1518 	if (!*rd) {
1519 		LDNS_FREE(data);
1520 		return LDNS_STATUS_MEM_ERR;
1521 	}
1522 	return LDNS_STATUS_OK;
1523 }
1524 
1525 ldns_status
1526 ldns_str2rdf_long_str(ldns_rdf **rd, const char *str)
1527 {
1528 	uint8_t *data, *dp, ch = 0;
1529 	size_t length;
1530 
1531 	/* Worst case space requirement. We'll realloc to actual size later. */
1532 	dp = data = LDNS_XMALLOC(uint8_t, strlen(str));
1533         if (! data) {
1534 		return LDNS_STATUS_MEM_ERR;
1535 	}
1536 
1537 	/* Fill data with parsed bytes */
1538 	while (parse_char(&ch, &str)) {
1539 		*dp++ = ch;
1540 		if (dp - data > LDNS_MAX_RDFLEN) {
1541 			LDNS_FREE(data);
1542 			return LDNS_STATUS_INVALID_STR;
1543 		}
1544 	}
1545 	if (! str) {
1546 		LDNS_FREE(data);
1547 		return LDNS_STATUS_SYNTAX_BAD_ESCAPE;
1548 	}
1549 	if (!(length = (size_t)(dp - data))) {
1550 		LDNS_FREE(data);
1551 		return LDNS_STATUS_SYNTAX_EMPTY;
1552 	}
1553 	/* Lose the overmeasure */
1554 	data = LDNS_XREALLOC(dp = data, uint8_t, length);
1555 	if (! data) {
1556 		LDNS_FREE(dp);
1557 		return LDNS_STATUS_MEM_ERR;
1558 	}
1559 
1560 	/* Create rdf */
1561 	*rd = ldns_rdf_new(LDNS_RDF_TYPE_LONG_STR, length, data);
1562 	if (! *rd) {
1563 		LDNS_FREE(data);
1564 		return LDNS_STATUS_MEM_ERR;
1565 	}
1566 	return LDNS_STATUS_OK;
1567 }
1568 
1569 ldns_status
1570 ldns_str2rdf_hip(ldns_rdf **rd, const char *str)
1571 {
1572 	const char *hit = str == NULL ? NULL : strchr(str, ' ');
1573 	const char *pk  = hit == NULL ? NULL : strchr(hit + 1, ' ');
1574 	size_t hit_size = hit == NULL ? 0
1575 	                : pk  == NULL ? strlen(hit + 1) : (size_t) (pk - hit) - 1;
1576 	size_t  pk_size = pk  == NULL ? 0 : strlen(pk + 1);
1577 	size_t hit_wire_size = (hit_size + 1) / 2;
1578 	size_t  pk_wire_size = ldns_b64_pton_calculate_size(pk_size);
1579 	size_t rdf_size = 4 + hit_wire_size + pk_wire_size;
1580 
1581 	char *endptr; /* utility var for strtol usage */
1582 	int algorithm = str == NULL ? 0 : strtol(str, &endptr, 10);
1583 
1584 	uint8_t *data, *dp;
1585 	int hi, lo, written;
1586 
1587 	if (hit_size == 0 || pk_size == 0 || (hit_size + 1) / 2 > 255
1588 			|| rdf_size > LDNS_MAX_RDFLEN
1589 			|| algorithm < 0 || algorithm > 255
1590 			|| (errno != 0 && algorithm == 0) /* out of range */
1591 			|| endptr == str                  /* no digits    */) {
1592 
1593 		return LDNS_STATUS_SYNTAX_ERR;
1594 	}
1595 	hit += 1;
1596 	pk  += 1;
1597 	if ((data = LDNS_XMALLOC(uint8_t, rdf_size)) == NULL) {
1598 
1599 		return LDNS_STATUS_MEM_ERR;
1600 	}
1601 	/* From RFC 5205 section 5. HIP RR Storage Format:
1602 	 *************************************************
1603 
1604 	0                   1                   2                   3
1605 	0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1606 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1607 	|  HIT length   | PK algorithm  |          PK length            |
1608 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1609 	|                                                               |
1610 	~                           HIT                                 ~
1611 	|                                                               |
1612 	+                     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1613 	|                     |                                         |
1614 	+-+-+-+-+-+-+-+-+-+-+-+                                         +
1615 	|                           Public Key                          |
1616 	~                                                               ~
1617 	|                                                               |
1618 	+                               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1619 	|                               |                               |
1620 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
1621 	|                                                               |
1622 	~                       Rendezvous Servers                      ~
1623 	|                                                               |
1624 	+             +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1625 	|             |
1626 	+-+-+-+-+-+-+-+                                                    */
1627 
1628 	data[0] = (uint8_t) hit_wire_size;
1629 	data[1] = (uint8_t) algorithm;
1630 
1631 	for (dp = data + 4; *hit && *hit != ' '; dp++) {
1632 
1633 		if ((hi = ldns_hexdigit_to_int(*hit++)) == -1 ||
1634 		    (lo = ldns_hexdigit_to_int(*hit++)) == -1) {
1635 
1636 			LDNS_FREE(data);
1637 			return LDNS_STATUS_INVALID_HEX;
1638 		}
1639 		*dp = (uint8_t) hi << 4 | lo;
1640 	}
1641 	if ((written = ldns_b64_pton(pk, dp, pk_wire_size)) <= 0) {
1642 
1643 		LDNS_FREE(data);
1644 		return LDNS_STATUS_INVALID_B64;
1645 	}
1646 
1647 	/* Because ldns_b64_pton_calculate_size isn't always correct:
1648 	 * (we have to fix it at some point)
1649 	 */
1650 	pk_wire_size = (uint16_t) written;
1651 	ldns_write_uint16(data + 2, pk_wire_size);
1652 	rdf_size = 4 + hit_wire_size + pk_wire_size;
1653 
1654 	/* Create rdf */
1655 	if (! (*rd = ldns_rdf_new(LDNS_RDF_TYPE_HIP, rdf_size, data))) {
1656 
1657 		LDNS_FREE(data);
1658 		return LDNS_STATUS_MEM_ERR;
1659 	}
1660 	return LDNS_STATUS_OK;
1661 }
1662 
1663 
1664 /* Implementation mimics ldns_str2rdf_ipseckey */
1665 ldns_status
1666 ldns_str2rdf_amtrelay(ldns_rdf **rd, const char *str)
1667 {
1668 	/* From draft-ietf-mboned-driad-amt-discovery
1669 	 *      Section 4.2. AMTRELAY RData Format
1670 	 *************************************************
1671 
1672 	 0                   1                   2                   3
1673 	 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1674 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1675 	|   precedence  |D|    type     |                               |
1676 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
1677 	~                            relay                              ~
1678 	+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  */
1679 
1680 	uint8_t precedence = 0;
1681 	uint8_t relay_type = 0;
1682 	uint8_t discovery_optional = 0;
1683 	char* relay = NULL;
1684 	uint8_t *data;
1685 	ldns_buffer *str_buf;
1686 	char *token;
1687 	int token_count = 0;
1688 	int amtrelay_len = 0;
1689 	ldns_rdf* relay_rdf = NULL;
1690 	ldns_status status = LDNS_STATUS_OK;
1691 
1692 	if(strlen(str) == 0)
1693 		token = LDNS_XMALLOC(char, 256);
1694 	else	token = LDNS_XMALLOC(char, strlen(str)+2);
1695 	if(!token) return LDNS_STATUS_MEM_ERR;
1696 
1697 	str_buf = LDNS_MALLOC(ldns_buffer);
1698 	if(!str_buf) {LDNS_FREE(token); return LDNS_STATUS_MEM_ERR;}
1699 	ldns_buffer_new_frm_data(str_buf, (char *)str, strlen(str));
1700 	if(ldns_buffer_status(str_buf) != LDNS_STATUS_OK) {
1701 		LDNS_FREE(str_buf);
1702 		LDNS_FREE(token);
1703 		return LDNS_STATUS_MEM_ERR;
1704 	}
1705 	while(ldns_bget_token(str_buf, token, "\t\n ", strlen(str)) > 0) {
1706 		switch (token_count) {
1707 		case 0:
1708 			precedence = (uint8_t)atoi(token);
1709 			break;
1710 		case 1:
1711 			discovery_optional = (uint8_t)atoi(token);
1712 			if (discovery_optional != 0 &&
1713 			    discovery_optional != 1) {
1714 				LDNS_FREE(relay);
1715 				LDNS_FREE(token);
1716 				ldns_buffer_free(str_buf);
1717 				return LDNS_STATUS_INVALID_STR;
1718 			}
1719 			break;
1720 		case 2:
1721 			relay_type = (uint8_t)atoi(token);
1722 			break;
1723 		case 3:
1724 			relay = strdup(token);
1725 			if (!relay || (relay_type == 0 &&
1726 					(token[0] != '.' || token[1] != '\0'))) {
1727 				LDNS_FREE(relay);
1728 				LDNS_FREE(token);
1729 				ldns_buffer_free(str_buf);
1730 				return LDNS_STATUS_INVALID_STR;
1731 			}
1732 			break;
1733 		default:
1734 			LDNS_FREE(token);
1735 			ldns_buffer_free(str_buf);
1736 			return LDNS_STATUS_INVALID_STR;
1737 			break;
1738 		}
1739 		token_count++;
1740 	}
1741 	if (!relay && relay_type > 0) {
1742 		if (relay)
1743 			LDNS_FREE(relay);
1744 		LDNS_FREE(token);
1745 		ldns_buffer_free(str_buf);
1746 		return LDNS_STATUS_INVALID_STR;
1747 	}
1748 
1749 	if (relay_type == 1) {
1750 		status = ldns_str2rdf_a(&relay_rdf, relay);
1751 	} else if (relay_type == 2) {
1752 		status = ldns_str2rdf_aaaa(&relay_rdf, relay);
1753 	} else if (relay_type == 3) {
1754 		status = ldns_str2rdf_dname(&relay_rdf, relay);
1755 	} else if (relay_type > 3) {
1756 		status = LDNS_STATUS_INVALID_STR;
1757 	}
1758 
1759 	if (status != LDNS_STATUS_OK) {
1760 		if (relay)
1761 			LDNS_FREE(relay);
1762 		LDNS_FREE(token);
1763 		ldns_buffer_free(str_buf);
1764 		return LDNS_STATUS_INVALID_STR;
1765 	}
1766 
1767 	/* now copy all into one amtrelay rdf */
1768 	if (relay_type)
1769 		amtrelay_len = 2 + (int)ldns_rdf_size(relay_rdf);
1770 	else
1771 		amtrelay_len = 2;
1772 
1773 	data = LDNS_XMALLOC(uint8_t, amtrelay_len);
1774 	if(!data) {
1775 		if (relay)
1776 			LDNS_FREE(relay);
1777 		LDNS_FREE(token);
1778 		ldns_buffer_free(str_buf);
1779 		if (relay_rdf) ldns_rdf_free(relay_rdf);
1780 		return LDNS_STATUS_MEM_ERR;
1781 	}
1782 
1783 	data[0] = precedence;
1784 	data[1] = relay_type;
1785 	data[1] |= (discovery_optional << 7);
1786 
1787 	if (relay_type) {
1788 		memcpy(data + 2,
1789 			ldns_rdf_data(relay_rdf), ldns_rdf_size(relay_rdf));
1790 	}
1791 	*rd = ldns_rdf_new_frm_data( LDNS_RDF_TYPE_AMTRELAY
1792 	                           , (uint16_t) amtrelay_len, data);
1793 
1794 	if (relay)
1795 		LDNS_FREE(relay);
1796 	LDNS_FREE(token);
1797 	ldns_buffer_free(str_buf);
1798 	ldns_rdf_free(relay_rdf);
1799 	LDNS_FREE(data);
1800 	if(!*rd) return LDNS_STATUS_MEM_ERR;
1801 	return LDNS_STATUS_OK;
1802 }
1803