xref: /freebsd/contrib/unbound/sldns/wire2str.c (revision e17f5b1d)
1 /*
2  * wire2str.c
3  *
4  * conversion routines from the wire format
5  * to the presentation format (strings)
6  *
7  * (c) NLnet Labs, 2004-2006
8  *
9  * See the file LICENSE for the license
10  */
11 /**
12  * \file
13  *
14  * Contains functions to translate the wireformat to text
15  * representation, as well as functions to print them.
16  */
17 #include "config.h"
18 #include "sldns/wire2str.h"
19 #include "sldns/str2wire.h"
20 #include "sldns/rrdef.h"
21 #include "sldns/pkthdr.h"
22 #include "sldns/parseutil.h"
23 #include "sldns/sbuffer.h"
24 #include "sldns/keyraw.h"
25 #include "util/data/dname.h"
26 #ifdef HAVE_TIME_H
27 #include <time.h>
28 #endif
29 #include <sys/time.h>
30 #include <stdarg.h>
31 #include <ctype.h>
32 #ifdef HAVE_NETDB_H
33 #include <netdb.h>
34 #endif
35 
36 /* lookup tables for standard DNS stuff  */
37 /* Taken from RFC 2535, section 7.  */
38 static sldns_lookup_table sldns_algorithms_data[] = {
39 	{ LDNS_RSAMD5, "RSAMD5" },
40 	{ LDNS_DH, "DH" },
41 	{ LDNS_DSA, "DSA" },
42 	{ LDNS_ECC, "ECC" },
43 	{ LDNS_RSASHA1, "RSASHA1" },
44 	{ LDNS_DSA_NSEC3, "DSA-NSEC3-SHA1" },
45 	{ LDNS_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
46 	{ LDNS_RSASHA256, "RSASHA256"},
47 	{ LDNS_RSASHA512, "RSASHA512"},
48 	{ LDNS_ECC_GOST, "ECC-GOST"},
49 	{ LDNS_ECDSAP256SHA256, "ECDSAP256SHA256"},
50 	{ LDNS_ECDSAP384SHA384, "ECDSAP384SHA384"},
51 	{ LDNS_ED25519, "ED25519"},
52 	{ LDNS_ED448, "ED448"},
53 	{ LDNS_INDIRECT, "INDIRECT" },
54 	{ LDNS_PRIVATEDNS, "PRIVATEDNS" },
55 	{ LDNS_PRIVATEOID, "PRIVATEOID" },
56 	{ 0, NULL }
57 };
58 sldns_lookup_table* sldns_algorithms = sldns_algorithms_data;
59 
60 /* hash algorithms in DS record */
61 static sldns_lookup_table sldns_hashes_data[] = {
62 	{ LDNS_SHA1, "SHA1" },
63 	{ LDNS_SHA256, "SHA256" },
64 	{ LDNS_HASH_GOST, "HASH-GOST" },
65 	{ LDNS_SHA384, "SHA384" },
66 	{ 0, NULL }
67 };
68 sldns_lookup_table* sldns_hashes = sldns_hashes_data;
69 
70 /* Taken from RFC 4398  */
71 static sldns_lookup_table sldns_cert_algorithms_data[] = {
72 	{ LDNS_CERT_PKIX, "PKIX" },
73 	{ LDNS_CERT_SPKI, "SPKI" },
74 	{ LDNS_CERT_PGP, "PGP" },
75 	{ LDNS_CERT_IPKIX, "IPKIX" },
76 	{ LDNS_CERT_ISPKI, "ISPKI" },
77 	{ LDNS_CERT_IPGP, "IPGP" },
78 	{ LDNS_CERT_ACPKIX, "ACPKIX" },
79 	{ LDNS_CERT_IACPKIX, "IACPKIX" },
80 	{ LDNS_CERT_URI, "URI" },
81 	{ LDNS_CERT_OID, "OID" },
82 	{ 0, NULL }
83 };
84 sldns_lookup_table* sldns_cert_algorithms = sldns_cert_algorithms_data;
85 
86 /* if these are used elsewhere */
87 static sldns_lookup_table sldns_rcodes_data[] = {
88 	{ LDNS_RCODE_NOERROR, "NOERROR" },
89 	{ LDNS_RCODE_FORMERR, "FORMERR" },
90 	{ LDNS_RCODE_SERVFAIL, "SERVFAIL" },
91 	{ LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
92 	{ LDNS_RCODE_NOTIMPL, "NOTIMPL" },
93 	{ LDNS_RCODE_REFUSED, "REFUSED" },
94 	{ LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
95 	{ LDNS_RCODE_YXRRSET, "YXRRSET" },
96 	{ LDNS_RCODE_NXRRSET, "NXRRSET" },
97 	{ LDNS_RCODE_NOTAUTH, "NOTAUTH" },
98 	{ LDNS_RCODE_NOTZONE, "NOTZONE" },
99 	{ 0, NULL }
100 };
101 sldns_lookup_table* sldns_rcodes = sldns_rcodes_data;
102 
103 static sldns_lookup_table sldns_opcodes_data[] = {
104 	{ LDNS_PACKET_QUERY, "QUERY" },
105 	{ LDNS_PACKET_IQUERY, "IQUERY" },
106 	{ LDNS_PACKET_STATUS, "STATUS" },
107 	{ LDNS_PACKET_NOTIFY, "NOTIFY" },
108 	{ LDNS_PACKET_UPDATE, "UPDATE" },
109 	{ 0, NULL }
110 };
111 sldns_lookup_table* sldns_opcodes = sldns_opcodes_data;
112 
113 static sldns_lookup_table sldns_wireparse_errors_data[] = {
114 	{ LDNS_WIREPARSE_ERR_OK, "no parse error" },
115 	{ LDNS_WIREPARSE_ERR_GENERAL, "parse error" },
116 	{ LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, "Domainname length overflow" },
117 	{ LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, "Domainname length underflow (zero length)" },
118 	{ LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, "buffer too small" },
119 	{ LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, "Label length overflow" },
120 	{ LDNS_WIREPARSE_ERR_EMPTY_LABEL, "Empty label" },
121 	{ LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, "Syntax error, bad escape sequence" },
122 	{ LDNS_WIREPARSE_ERR_SYNTAX, "Syntax error, could not parse the RR" },
123 	{ LDNS_WIREPARSE_ERR_SYNTAX_TTL, "Syntax error, could not parse the RR's TTL" },
124 	{ LDNS_WIREPARSE_ERR_SYNTAX_TYPE, "Syntax error, could not parse the RR's type" },
125 	{ LDNS_WIREPARSE_ERR_SYNTAX_CLASS, "Syntax error, could not parse the RR's class" },
126 	{ LDNS_WIREPARSE_ERR_SYNTAX_RDATA, "Syntax error, could not parse the RR's rdata" },
127 	{ LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE, "Syntax error, value expected" },
128 	{ LDNS_WIREPARSE_ERR_INVALID_STR, "Conversion error, string expected" },
129 	{ LDNS_WIREPARSE_ERR_SYNTAX_B64, "Conversion error, b64 encoding expected" },
130 	{ LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT, "Conversion error, b32 ext encoding expected" },
131 	{ LDNS_WIREPARSE_ERR_SYNTAX_HEX, "Conversion error, hex encoding expected" },
132 	{ LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM, "Bad algorithm type for CERT record" },
133 	{ LDNS_WIREPARSE_ERR_SYNTAX_TIME, "Conversion error, time encoding expected" },
134 	{ LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, "Conversion error, time period encoding expected" },
135 	{ LDNS_WIREPARSE_ERR_SYNTAX_ILNP64, "Conversion error, 4 colon separated hex numbers expected" },
136 	{ LDNS_WIREPARSE_ERR_SYNTAX_EUI48,
137 		"Conversion error, 6 two character hex numbers "
138 		"separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx" },
139 	{ LDNS_WIREPARSE_ERR_SYNTAX_EUI64,
140 		"Conversion error, 8 two character hex numbers "
141 		"separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx-xx-xx" },
142 	{ LDNS_WIREPARSE_ERR_SYNTAX_TAG,
143 		"Conversion error, a non-zero sequence of US-ASCII letters "
144 		"and numbers in lower case expected" },
145 	{ LDNS_WIREPARSE_ERR_NOT_IMPL, "not implemented" },
146 	{ LDNS_WIREPARSE_ERR_SYNTAX_INT, "Conversion error, integer expected" },
147 	{ LDNS_WIREPARSE_ERR_SYNTAX_IP4, "Conversion error, ip4 addr expected" },
148 	{ LDNS_WIREPARSE_ERR_SYNTAX_IP6, "Conversion error, ip6 addr expected" },
149 	{ LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW, "Syntax error, integer overflow" },
150 	{ LDNS_WIREPARSE_ERR_INCLUDE, "$INCLUDE directive was seen in the zone" },
151 	{ LDNS_WIREPARSE_ERR_PARENTHESIS, "Parse error, parenthesis mismatch" },
152 	{ 0, NULL }
153 };
154 sldns_lookup_table* sldns_wireparse_errors = sldns_wireparse_errors_data;
155 
156 static sldns_lookup_table sldns_edns_flags_data[] = {
157 	{ 3600, "do"},
158 	{ 0, NULL}
159 };
160 sldns_lookup_table* sldns_edns_flags = sldns_edns_flags_data;
161 
162 static sldns_lookup_table sldns_edns_options_data[] = {
163 	{ 1, "LLQ" },
164 	{ 2, "UL" },
165 	{ 3, "NSID" },
166 	/* 4 draft-cheshire-edns0-owner-option */
167 	{ 5, "DAU" },
168 	{ 6, "DHU" },
169 	{ 7, "N3U" },
170 	{ 8, "edns-client-subnet" },
171 	{ 11, "edns-tcp-keepalive"},
172 	{ 12, "Padding" },
173 	{ 0, NULL}
174 };
175 sldns_lookup_table* sldns_edns_options = sldns_edns_options_data;
176 
177 static sldns_lookup_table sldns_tsig_errors_data[] = {
178 	{ LDNS_TSIG_ERROR_NOERROR, "NOERROR" },
179 	{ LDNS_RCODE_FORMERR, "FORMERR" },
180 	{ LDNS_RCODE_SERVFAIL, "SERVFAIL" },
181 	{ LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
182 	{ LDNS_RCODE_NOTIMPL, "NOTIMPL" },
183 	{ LDNS_RCODE_REFUSED, "REFUSED" },
184 	{ LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
185 	{ LDNS_RCODE_YXRRSET, "YXRRSET" },
186 	{ LDNS_RCODE_NXRRSET, "NXRRSET" },
187 	{ LDNS_RCODE_NOTAUTH, "NOTAUTH" },
188 	{ LDNS_RCODE_NOTZONE, "NOTZONE" },
189 	{ LDNS_TSIG_ERROR_BADSIG, "BADSIG" },
190 	{ LDNS_TSIG_ERROR_BADKEY, "BADKEY" },
191 	{ LDNS_TSIG_ERROR_BADTIME, "BADTIME" },
192 	{ LDNS_TSIG_ERROR_BADMODE, "BADMODE" },
193 	{ LDNS_TSIG_ERROR_BADNAME, "BADNAME" },
194 	{ LDNS_TSIG_ERROR_BADALG, "BADALG" },
195 	{ 0, NULL }
196 };
197 sldns_lookup_table* sldns_tsig_errors = sldns_tsig_errors_data;
198 
199 char* sldns_wire2str_pkt(uint8_t* data, size_t len)
200 {
201 	size_t slen = (size_t)sldns_wire2str_pkt_buf(data, len, NULL, 0);
202 	char* result = (char*)malloc(slen+1);
203 	if(!result) return NULL;
204 	sldns_wire2str_pkt_buf(data, len, result, slen+1);
205 	return result;
206 }
207 
208 char* sldns_wire2str_rr(uint8_t* rr, size_t len)
209 {
210 	size_t slen = (size_t)sldns_wire2str_rr_buf(rr, len, NULL, 0);
211 	char* result = (char*)malloc(slen+1);
212 	if(!result) return NULL;
213 	sldns_wire2str_rr_buf(rr, len, result, slen+1);
214 	return result;
215 }
216 
217 char* sldns_wire2str_type(uint16_t rrtype)
218 {
219 	char buf[16];
220 	sldns_wire2str_type_buf(rrtype, buf, sizeof(buf));
221 	return strdup(buf);
222 }
223 
224 char* sldns_wire2str_class(uint16_t rrclass)
225 {
226 	char buf[16];
227 	sldns_wire2str_class_buf(rrclass, buf, sizeof(buf));
228 	return strdup(buf);
229 }
230 
231 char* sldns_wire2str_dname(uint8_t* dname, size_t dname_len)
232 {
233 	size_t slen=(size_t)sldns_wire2str_dname_buf(dname, dname_len, NULL, 0);
234 	char* result = (char*)malloc(slen+1);
235 	if(!result) return NULL;
236 	sldns_wire2str_dname_buf(dname, dname_len, result, slen+1);
237 	return result;
238 }
239 
240 char* sldns_wire2str_rcode(int rcode)
241 {
242 	char buf[16];
243 	sldns_wire2str_rcode_buf(rcode, buf, sizeof(buf));
244 	return strdup(buf);
245 }
246 
247 int sldns_wire2str_pkt_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
248 {
249 	/* use arguments as temporary variables */
250 	return sldns_wire2str_pkt_scan(&d, &dlen, &s, &slen);
251 }
252 
253 int sldns_wire2str_rr_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
254 {
255 	/* use arguments as temporary variables */
256 	return sldns_wire2str_rr_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
257 }
258 
259 int sldns_wire2str_rrquestion_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
260 {
261 	/* use arguments as temporary variables */
262 	return sldns_wire2str_rrquestion_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
263 }
264 
265 int sldns_wire2str_rdata_buf(uint8_t* rdata, size_t rdata_len, char* str,
266 	size_t str_len, uint16_t rrtype)
267 {
268 	/* use arguments as temporary variables */
269 	return sldns_wire2str_rdata_scan(&rdata, &rdata_len, &str, &str_len,
270 		rrtype, NULL, 0, NULL);
271 }
272 
273 int sldns_wire2str_rr_unknown_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
274 {
275 	/* use arguments as temporary variables */
276 	return sldns_wire2str_rr_unknown_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
277 }
278 
279 int sldns_wire2str_rr_comment_buf(uint8_t* rr, size_t rrlen, size_t dname_len,
280 	char* s, size_t slen)
281 {
282 	uint16_t rrtype = sldns_wirerr_get_type(rr, rrlen, dname_len);
283 	return sldns_wire2str_rr_comment_print(&s, &slen, rr, rrlen, dname_len,
284 		rrtype);
285 }
286 
287 int sldns_wire2str_type_buf(uint16_t rrtype, char* s, size_t slen)
288 {
289 	/* use arguments as temporary variables */
290 	return sldns_wire2str_type_print(&s, &slen, rrtype);
291 }
292 
293 int sldns_wire2str_class_buf(uint16_t rrclass, char* s, size_t slen)
294 {
295 	/* use arguments as temporary variables */
296 	return sldns_wire2str_class_print(&s, &slen, rrclass);
297 }
298 
299 int sldns_wire2str_rcode_buf(int rcode, char* s, size_t slen)
300 {
301 	/* use arguments as temporary variables */
302 	return sldns_wire2str_rcode_print(&s, &slen, rcode);
303 }
304 
305 int sldns_wire2str_opcode_buf(int opcode, char* s, size_t slen)
306 {
307 	/* use arguments as temporary variables */
308 	return sldns_wire2str_opcode_print(&s, &slen, opcode);
309 }
310 
311 int sldns_wire2str_dname_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
312 {
313 	/* use arguments as temporary variables */
314 	return sldns_wire2str_dname_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
315 }
316 
317 int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args)
318 {
319 	int w = vsnprintf(*str, *slen, format, args);
320 	if(w < 0) {
321 		/* error in printout */
322 		return 0;
323 	} else if((size_t)w >= *slen) {
324 		*str = NULL; /* we do not want str to point outside of buffer*/
325 		*slen = 0;
326 	} else {
327 		*str += w;
328 		*slen -= w;
329 	}
330 	return w;
331 }
332 
333 int sldns_str_print(char** str, size_t* slen, const char* format, ...)
334 {
335 	int w;
336 	va_list args;
337 	va_start(args, format);
338 	w = sldns_str_vprint(str, slen, format, args);
339 	va_end(args);
340 	return w;
341 }
342 
343 /** print hex format into text buffer for specified length */
344 static int print_hex_buf(char** s, size_t* slen, uint8_t* buf, size_t len)
345 {
346 	const char* hex = "0123456789ABCDEF";
347 	size_t i;
348 	for(i=0; i<len; i++) {
349 		(void)sldns_str_print(s, slen, "%c%c", hex[(buf[i]&0xf0)>>4],
350 			hex[buf[i]&0x0f]);
351 	}
352 	return (int)len*2;
353 }
354 
355 /** print remainder of buffer in hex format with prefixed text */
356 static int print_remainder_hex(const char* pref, uint8_t** d, size_t* dlen,
357 	char** s, size_t* slen)
358 {
359 	int w = 0;
360 	w += sldns_str_print(s, slen, "%s", pref);
361 	w += print_hex_buf(s, slen, *d, *dlen);
362 	*d += *dlen;
363 	*dlen = 0;
364 	return w;
365 }
366 
367 int sldns_wire2str_pkt_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
368 {
369 	int w = 0, comprloop = 0;
370 	unsigned qdcount, ancount, nscount, arcount, i;
371 	uint8_t* pkt = *d;
372 	size_t pktlen = *dlen;
373 	if(*dlen >= LDNS_HEADER_SIZE) {
374 		qdcount = (unsigned)LDNS_QDCOUNT(*d);
375 		ancount = (unsigned)LDNS_ANCOUNT(*d);
376 		nscount = (unsigned)LDNS_NSCOUNT(*d);
377 		arcount = (unsigned)LDNS_ARCOUNT(*d);
378 	} else {
379 		qdcount = ancount = nscount = arcount = 0;
380 	}
381 	w += sldns_wire2str_header_scan(d, dlen, s, slen);
382 	w += sldns_str_print(s, slen, "\n");
383 	w += sldns_str_print(s, slen, ";; QUESTION SECTION:\n");
384 	for(i=0; i<qdcount; i++) {
385 		w += sldns_wire2str_rrquestion_scan(d, dlen, s, slen,
386 			pkt, pktlen, &comprloop);
387 		if(!*dlen) break;
388 	}
389 	w += sldns_str_print(s, slen, "\n");
390 	w += sldns_str_print(s, slen, ";; ANSWER SECTION:\n");
391 	for(i=0; i<ancount; i++) {
392 		w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
393 		if(!*dlen) break;
394 	}
395 	w += sldns_str_print(s, slen, "\n");
396 	w += sldns_str_print(s, slen, ";; AUTHORITY SECTION:\n");
397 	for(i=0; i<nscount; i++) {
398 		w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
399 		if(!*dlen) break;
400 	}
401 	w += sldns_str_print(s, slen, "\n");
402 	w += sldns_str_print(s, slen, ";; ADDITIONAL SECTION:\n");
403 	for(i=0; i<arcount; i++) {
404 		w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
405 		if(!*dlen) break;
406 	}
407 	/* other fields: WHEN(time), SERVER(IP) not available here. */
408 	w += sldns_str_print(s, slen, ";; MSG SIZE  rcvd: %d\n", (int)pktlen);
409 	if(*dlen > 0) {
410 		w += print_remainder_hex(";; trailing garbage 0x",
411 			d, dlen, s, slen);
412 		w += sldns_str_print(s, slen, "\n");
413 	}
414 	return w;
415 }
416 
417 /** scan type, class and ttl and printout, for rr */
418 static int sldns_rr_tcttl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
419 {
420 	int w = 0;
421 	uint16_t t, c;
422 	uint32_t ttl;
423 	if(*dl < 8) {
424 		if(*dl < 4)
425 			return w + print_remainder_hex("; Error malformed 0x",
426 				d, dl, s, sl);
427 		/* these print values or 0x.. if none left */
428 		t = sldns_read_uint16(*d);
429 		c = sldns_read_uint16((*d)+2);
430 		(*d)+=4;
431 		(*dl)-=4;
432 		w += sldns_wire2str_class_print(s, sl, c);
433 		w += sldns_str_print(s, sl, "\t");
434 		w += sldns_wire2str_type_print(s, sl, t);
435 		if(*dl == 0)
436 			return w + sldns_str_print(s, sl, "; Error no ttl");
437 		return w + print_remainder_hex(
438 			"; Error malformed ttl 0x", d, dl, s, sl);
439 	}
440 	t = sldns_read_uint16(*d);
441 	c = sldns_read_uint16((*d)+2);
442 	ttl = sldns_read_uint32((*d)+4);
443 	(*d)+=8;
444 	(*dl)-=8;
445 	w += sldns_str_print(s, sl, "%lu\t", (unsigned long)ttl);
446 	w += sldns_wire2str_class_print(s, sl, c);
447 	w += sldns_str_print(s, sl, "\t");
448 	w += sldns_wire2str_type_print(s, sl, t);
449 	return w;
450 }
451 
452 int sldns_wire2str_rr_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
453 	uint8_t* pkt, size_t pktlen, int* comprloop)
454 {
455 	int w = 0;
456 	uint8_t* rr = *d;
457 	size_t rrlen = *dlen, dname_off, rdlen, ordlen;
458 	uint16_t rrtype = 0;
459 
460 	if(*dlen >= 3 && (*d)[0]==0 &&
461 		sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
462 		/* perform EDNS OPT processing */
463 		return sldns_wire2str_edns_scan(d, dlen, s, slen, pkt, pktlen);
464 	}
465 
466 	/* try to scan the rdata with pretty-printing, but if that fails, then
467 	 * scan the rdata as an unknown RR type */
468 	w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
469 	w += sldns_str_print(s, slen, "\t");
470 	dname_off = rrlen-(*dlen);
471 	if(*dlen == 4) {
472 		/* like a question-RR */
473 		uint16_t t = sldns_read_uint16(*d);
474 		uint16_t c = sldns_read_uint16((*d)+2);
475 		(*d)+=4;
476 		(*dlen)-=4;
477 		w += sldns_wire2str_class_print(s, slen, c);
478 		w += sldns_str_print(s, slen, "\t");
479 		w += sldns_wire2str_type_print(s, slen, t);
480 		w += sldns_str_print(s, slen, " ; Error no ttl,rdata\n");
481 		return w;
482 	}
483 	if(*dlen < 8) {
484 		if(*dlen == 0)
485 			return w + sldns_str_print(s, slen, ";Error missing RR\n");
486 		w += print_remainder_hex(";Error partial RR 0x", d, dlen, s, slen);
487 		return w + sldns_str_print(s, slen, "\n");
488 	}
489 	rrtype = sldns_read_uint16(*d);
490 	w += sldns_rr_tcttl_scan(d, dlen, s, slen);
491 	w += sldns_str_print(s, slen, "\t");
492 
493 	/* rdata */
494 	if(*dlen < 2) {
495 		if(*dlen == 0)
496 			return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
497 		w += print_remainder_hex(";Error missing rdatalen 0x",
498 			d, dlen, s, slen);
499 		return w + sldns_str_print(s, slen, "\n");
500 	}
501 	rdlen = sldns_read_uint16(*d);
502 	ordlen = rdlen;
503 	(*d)+=2;
504 	(*dlen)-=2;
505 	if(*dlen < rdlen) {
506 		w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
507 		if(*dlen == 0)
508 			return w + sldns_str_print(s, slen, ";Error missing rdata\n");
509 		w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
510 		return w + sldns_str_print(s, slen, "\n");
511 	}
512 	w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen,
513 		comprloop);
514 	(*dlen) -= (ordlen-rdlen);
515 
516 	/* default comment */
517 	w += sldns_wire2str_rr_comment_print(s, slen, rr, rrlen, dname_off,
518 		rrtype);
519 	w += sldns_str_print(s, slen, "\n");
520 	return w;
521 }
522 
523 int sldns_wire2str_rrquestion_scan(uint8_t** d, size_t* dlen, char** s,
524 	size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
525 {
526 	int w = 0;
527 	uint16_t t, c;
528 	w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
529 	w += sldns_str_print(s, slen, "\t");
530 	if(*dlen < 4) {
531 		if(*dlen == 0)
532 			return w + sldns_str_print(s, slen, "Error malformed\n");
533 		w += print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
534 		return w + sldns_str_print(s, slen, "\n");
535 	}
536 	t = sldns_read_uint16(*d);
537 	c = sldns_read_uint16((*d)+2);
538 	(*d)+=4;
539 	(*dlen)-=4;
540 	w += sldns_wire2str_class_print(s, slen, c);
541 	w += sldns_str_print(s, slen, "\t");
542 	w += sldns_wire2str_type_print(s, slen, t);
543 	w += sldns_str_print(s, slen, "\n");
544 	return w;
545 }
546 
547 int sldns_wire2str_rr_unknown_scan(uint8_t** d, size_t* dlen, char** s,
548 	size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
549 {
550 	size_t rdlen, ordlen;
551 	int w = 0;
552 	w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
553 	w += sldns_str_print(s, slen, "\t");
554 	w += sldns_rr_tcttl_scan(d, dlen, s, slen);
555 	w += sldns_str_print(s, slen, "\t");
556 	if(*dlen < 2) {
557 		if(*dlen == 0)
558 			return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
559 		w += print_remainder_hex(";Error missing rdatalen 0x",
560 			d, dlen, s, slen);
561 		return w + sldns_str_print(s, slen, "\n");
562 	}
563 	rdlen = sldns_read_uint16(*d);
564 	ordlen = rdlen;
565 	(*d) += 2;
566 	(*dlen) -= 2;
567 	if(*dlen < rdlen) {
568 		w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
569 		if(*dlen == 0)
570 			return w + sldns_str_print(s, slen, ";Error missing rdata\n");
571 		w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
572 		return w + sldns_str_print(s, slen, "\n");
573 	}
574 	w += sldns_wire2str_rdata_unknown_scan(d, &rdlen, s, slen);
575 	(*dlen) -= (ordlen-rdlen);
576 	w += sldns_str_print(s, slen, "\n");
577 	return w;
578 }
579 
580 /** print rr comment for type DNSKEY */
581 static int rr_comment_dnskey(char** s, size_t* slen, uint8_t* rr,
582 	size_t rrlen, size_t dname_off)
583 {
584 	size_t rdlen;
585 	uint8_t* rdata;
586 	int flags, w = 0;
587 	if(rrlen < dname_off + 10) return 0;
588 	rdlen = sldns_read_uint16(rr+dname_off+8);
589 	if(rrlen < dname_off + 10 + rdlen) return 0;
590 	if(rdlen < 2) return 0;
591 	rdata = rr + dname_off + 10;
592 	flags = (int)sldns_read_uint16(rdata);
593 	w += sldns_str_print(s, slen, " ;{");
594 
595 	/* id */
596 	w += sldns_str_print(s, slen, "id = %u",
597 		sldns_calc_keytag_raw(rdata, rdlen));
598 
599 	/* flags */
600 	if((flags&LDNS_KEY_ZONE_KEY)) {
601 		if((flags&LDNS_KEY_SEP_KEY))
602 			w += sldns_str_print(s, slen, " (ksk)");
603 		else 	w += sldns_str_print(s, slen, " (zsk)");
604 	}
605 
606 	/* keysize */
607 	if(rdlen > 4) {
608 		w += sldns_str_print(s, slen, ", ");
609 		w += sldns_str_print(s, slen, "size = %db",
610 			(int)sldns_rr_dnskey_key_size_raw(
611 			(unsigned char*)rdata+4, rdlen-4, (int)(rdata[3])));
612 	}
613 
614 	w += sldns_str_print(s, slen, "}");
615 	return w;
616 }
617 
618 /** print rr comment for type RRSIG */
619 static int rr_comment_rrsig(char** s, size_t* slen, uint8_t* rr,
620 	size_t rrlen, size_t dname_off)
621 {
622 	size_t rdlen;
623 	uint8_t* rdata;
624 	if(rrlen < dname_off + 10) return 0;
625 	rdlen = sldns_read_uint16(rr+dname_off+8);
626 	if(rrlen < dname_off + 10 + rdlen) return 0;
627 	rdata = rr + dname_off + 10;
628 	if(rdlen < 18) return 0;
629 	return sldns_str_print(s, slen, " ;{id = %d}",
630 		(int)sldns_read_uint16(rdata+16));
631 }
632 
633 /** print rr comment for type NSEC3 */
634 static int rr_comment_nsec3(char** s, size_t* slen, uint8_t* rr,
635 	size_t rrlen, size_t dname_off)
636 {
637 	size_t rdlen;
638 	uint8_t* rdata;
639 	int w = 0;
640 	if(rrlen < dname_off + 10) return 0;
641 	rdlen = sldns_read_uint16(rr+dname_off+8);
642 	if(rrlen < dname_off + 10 + rdlen) return 0;
643 	rdata = rr + dname_off + 10;
644 	if(rdlen < 2) return 0;
645 	if((rdata[1] & LDNS_NSEC3_VARS_OPTOUT_MASK))
646 		w += sldns_str_print(s, slen, " ;{flags: optout}");
647 	return w;
648 }
649 
650 int sldns_wire2str_rr_comment_print(char** s, size_t* slen, uint8_t* rr,
651 	size_t rrlen, size_t dname_off, uint16_t rrtype)
652 {
653 	if(rrtype == LDNS_RR_TYPE_DNSKEY) {
654 		return rr_comment_dnskey(s, slen, rr, rrlen, dname_off);
655 	} else if(rrtype == LDNS_RR_TYPE_RRSIG) {
656 		return rr_comment_rrsig(s, slen, rr, rrlen, dname_off);
657 	} else if(rrtype == LDNS_RR_TYPE_NSEC3) {
658 		return rr_comment_nsec3(s, slen, rr, rrlen, dname_off);
659 	}
660 	return 0;
661 }
662 
663 int sldns_wire2str_header_scan(uint8_t** d, size_t* dlen, char** s,
664 	size_t* slen)
665 {
666 	int w = 0;
667 	int opcode, rcode;
668 	w += sldns_str_print(s, slen, ";; ->>HEADER<<- ");
669 	if(*dlen == 0)
670 		return w+sldns_str_print(s, slen, "Error empty packet");
671 	if(*dlen < 4)
672 		return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
673 	opcode = (int)LDNS_OPCODE_WIRE(*d);
674 	rcode = (int)LDNS_RCODE_WIRE(*d);
675 	w += sldns_str_print(s, slen, "opcode: ");
676 	w += sldns_wire2str_opcode_print(s, slen, opcode);
677 	w += sldns_str_print(s, slen, ", ");
678 	w += sldns_str_print(s, slen, "rcode: ");
679 	w += sldns_wire2str_rcode_print(s, slen, rcode);
680 	w += sldns_str_print(s, slen, ", ");
681 	w += sldns_str_print(s, slen, "id: %d\n", (int)LDNS_ID_WIRE(*d));
682 	w += sldns_str_print(s, slen, ";; flags:");
683 	if(LDNS_QR_WIRE(*d)) w += sldns_str_print(s, slen, " qr");
684 	if(LDNS_AA_WIRE(*d)) w += sldns_str_print(s, slen, " aa");
685 	if(LDNS_TC_WIRE(*d)) w += sldns_str_print(s, slen, " tc");
686 	if(LDNS_RD_WIRE(*d)) w += sldns_str_print(s, slen, " rd");
687 	if(LDNS_CD_WIRE(*d)) w += sldns_str_print(s, slen, " cd");
688 	if(LDNS_RA_WIRE(*d)) w += sldns_str_print(s, slen, " ra");
689 	if(LDNS_AD_WIRE(*d)) w += sldns_str_print(s, slen, " ad");
690 	if(LDNS_Z_WIRE(*d))  w += sldns_str_print(s, slen, " z");
691 	w += sldns_str_print(s, slen, " ; ");
692 	if(*dlen < LDNS_HEADER_SIZE)
693 		return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
694 	w += sldns_str_print(s, slen, "QUERY: %d, ", (int)LDNS_QDCOUNT(*d));
695 	w += sldns_str_print(s, slen, "ANSWER: %d, ", (int)LDNS_ANCOUNT(*d));
696 	w += sldns_str_print(s, slen, "AUTHORITY: %d, ", (int)LDNS_NSCOUNT(*d));
697 	w += sldns_str_print(s, slen, "ADDITIONAL: %d ", (int)LDNS_ARCOUNT(*d));
698 	*d += LDNS_HEADER_SIZE;
699 	*dlen -= LDNS_HEADER_SIZE;
700 	return w;
701 }
702 
703 int sldns_wire2str_rdata_scan(uint8_t** d, size_t* dlen, char** s,
704 	size_t* slen, uint16_t rrtype, uint8_t* pkt, size_t pktlen,
705 	int* comprloop)
706 {
707 	/* try to prettyprint, but if that fails, use unknown format */
708 	uint8_t* origd = *d;
709 	char* origs = *s;
710 	size_t origdlen = *dlen, origslen = *slen;
711 	size_t r_cnt, r_max;
712 	sldns_rdf_type rdftype;
713 	int w = 0, n;
714 
715 	const sldns_rr_descriptor *desc = sldns_rr_descript(rrtype);
716 	if(!desc) /* unknown format */
717 		return sldns_wire2str_rdata_unknown_scan(d, dlen, s, slen);
718 	/* dlen equals the rdatalen for the rdata */
719 
720 	r_max = sldns_rr_descriptor_maximum(desc);
721 	for(r_cnt=0; r_cnt < r_max; r_cnt++) {
722 		if(*dlen == 0) {
723 			if(r_cnt < sldns_rr_descriptor_minimum(desc))
724 				goto failed;
725 			break; /* nothing more to print */
726 		}
727 		rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
728 		if(r_cnt != 0)
729 			w += sldns_str_print(s, slen, " ");
730 		n = sldns_wire2str_rdf_scan(d, dlen, s, slen, rdftype,
731 			pkt, pktlen, comprloop);
732 		if(n == -1) {
733 		failed:
734 			/* failed, use unknown format */
735 			*d = origd; *s = origs;
736 			*dlen = origdlen; *slen = origslen;
737 			return sldns_wire2str_rdata_unknown_scan(d, dlen,
738 				s, slen);
739 		}
740 		w += n;
741 	}
742 	if(*dlen != 0) {
743 		goto failed;
744 	}
745 	return w;
746 }
747 
748 int sldns_wire2str_rdata_unknown_scan(uint8_t** d, size_t* dlen, char** s,
749 	size_t* slen)
750 {
751 	int w = 0;
752 
753 	/* print length */
754 	w += sldns_str_print(s, slen, "\\# %u", (unsigned)*dlen);
755 
756 	/* print rdlen in hex */
757 	if(*dlen != 0)
758 		w += sldns_str_print(s, slen, " ");
759 	w += print_hex_buf(s, slen, *d, *dlen);
760 	(*d) += *dlen;
761 	(*dlen) = 0;
762 	return w;
763 }
764 
765 /** print and escape one character for a domain dname */
766 static int dname_char_print(char** s, size_t* slen, uint8_t c)
767 {
768 	if(c == '.' || c == ';' || c == '(' || c == ')' || c == '\\')
769 		return sldns_str_print(s, slen, "\\%c", c);
770 	else if(!(isascii((unsigned char)c) && isgraph((unsigned char)c)))
771 		return sldns_str_print(s, slen, "\\%03u", (unsigned)c);
772 	/* plain printout */
773 	if(*slen) {
774 		**s = (char)c;
775 		(*s)++;
776 		(*slen)--;
777 	}
778 	return 1;
779 }
780 
781 int sldns_wire2str_dname_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
782 	uint8_t* pkt, size_t pktlen, int* comprloop)
783 {
784 	int w = 0;
785 	/* spool labels onto the string, use compression if its there */
786 	uint8_t* pos = *d;
787 	unsigned i, counter=0;
788 	unsigned maxcompr = MAX_COMPRESS_PTRS; /* loop detection, max compr ptrs */
789 	int in_buf = 1;
790 	if(comprloop) {
791 		if(*comprloop != 0)
792 			maxcompr = 30; /* for like ipv6 reverse name, per label */
793 		if(*comprloop > 4)
794 			maxcompr = 4; /* just don't want to spend time, any more */
795 	}
796 	if(*dlen == 0) return sldns_str_print(s, slen, "ErrorMissingDname");
797 	if(*pos == 0) {
798 		(*d)++;
799 		(*dlen)--;
800 		return sldns_str_print(s, slen, ".");
801 	}
802 	while((!pkt || pos < pkt+pktlen) && *pos) {
803 		/* read label length */
804 		uint8_t labellen = *pos++;
805 		if(in_buf) { (*d)++; (*dlen)--; }
806 
807 		/* find out what sort of label we have */
808 		if((labellen&0xc0) == 0xc0) {
809 			/* compressed */
810 			uint16_t target = 0;
811 			if(in_buf && *dlen == 0)
812 				return w + sldns_str_print(s, slen,
813 					"ErrorPartialDname");
814 			else if(!in_buf && pos+1 > pkt+pktlen)
815 				return w + sldns_str_print(s, slen,
816 					"ErrorPartialDname");
817 			target = ((labellen&0x3f)<<8) | *pos;
818 			if(in_buf) { (*d)++; (*dlen)--; }
819 			/* move to target, if possible */
820 			if(!pkt || target >= pktlen)
821 				return w + sldns_str_print(s, slen,
822 					"ErrorComprPtrOutOfBounds");
823 			if(counter++ > maxcompr) {
824 				if(comprloop && *comprloop < 10)
825 					(*comprloop)++;
826 				return w + sldns_str_print(s, slen,
827 					"ErrorComprPtrLooped");
828 			}
829 			in_buf = 0;
830 			pos = pkt+target;
831 			continue;
832 		} else if((labellen&0xc0)) {
833 			/* notimpl label type */
834 			w += sldns_str_print(s, slen,
835 				"ErrorLABELTYPE%xIsUnknown",
836 				(int)(labellen&0xc0));
837 			return w;
838 		}
839 
840 		/* spool label characters, end with '.' */
841 		if(in_buf && *dlen < (size_t)labellen)
842 			labellen = (uint8_t)*dlen;
843 		else if(!in_buf && pos+(size_t)labellen > pkt+pktlen)
844 			labellen = (uint8_t)(pkt + pktlen - pos);
845 		for(i=0; i<(unsigned)labellen; i++) {
846 			w += dname_char_print(s, slen, *pos++);
847 		}
848 		if(in_buf) {
849 			(*d) += labellen;
850 			(*dlen) -= labellen;
851 			if(*dlen == 0) break;
852 		}
853 		w += sldns_str_print(s, slen, ".");
854 	}
855 	/* skip over final root label */
856 	if(in_buf && *dlen > 0) { (*d)++; (*dlen)--; }
857 	/* in case we printed no labels, terminate dname */
858 	if(w == 0) w += sldns_str_print(s, slen, ".");
859 	return w;
860 }
861 
862 int sldns_wire2str_opcode_print(char** s, size_t* slen, int opcode)
863 {
864 	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_opcodes, opcode);
865 	if (lt && lt->name) {
866 		return sldns_str_print(s, slen, "%s", lt->name);
867 	}
868 	return sldns_str_print(s, slen, "OPCODE%u", (unsigned)opcode);
869 }
870 
871 int sldns_wire2str_rcode_print(char** s, size_t* slen, int rcode)
872 {
873 	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rcodes, rcode);
874 	if (lt && lt->name) {
875 		return sldns_str_print(s, slen, "%s", lt->name);
876 	}
877 	return sldns_str_print(s, slen, "RCODE%u", (unsigned)rcode);
878 }
879 
880 int sldns_wire2str_class_print(char** s, size_t* slen, uint16_t rrclass)
881 {
882 	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rr_classes,
883 		(int)rrclass);
884 	if (lt && lt->name) {
885 		return sldns_str_print(s, slen, "%s", lt->name);
886 	}
887 	return sldns_str_print(s, slen, "CLASS%u", (unsigned)rrclass);
888 }
889 
890 int sldns_wire2str_type_print(char** s, size_t* slen, uint16_t rrtype)
891 {
892 	const sldns_rr_descriptor *descriptor = sldns_rr_descript(rrtype);
893 	if (descriptor && descriptor->_name) {
894 		return sldns_str_print(s, slen, "%s", descriptor->_name);
895 	}
896 	return sldns_str_print(s, slen, "TYPE%u", (unsigned)rrtype);
897 }
898 
899 int sldns_wire2str_edns_option_code_print(char** s, size_t* slen,
900 	uint16_t opcode)
901 {
902 	sldns_lookup_table *lt = sldns_lookup_by_id(sldns_edns_options,
903 		(int)opcode);
904 	if (lt && lt->name) {
905 		return sldns_str_print(s, slen, "%s", lt->name);
906 	}
907 	return sldns_str_print(s, slen, "OPT%u", (unsigned)opcode);
908 }
909 
910 int sldns_wire2str_class_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
911 {
912 	uint16_t c;
913 	if(*dlen == 0) return 0;
914 	if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
915 	c = sldns_read_uint16(*d);
916 	(*d)+=2;
917 	(*dlen)-=2;
918 	return sldns_wire2str_class_print(s, slen, c);
919 }
920 
921 int sldns_wire2str_type_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
922 {
923 	uint16_t t;
924 	if(*dlen == 0) return 0;
925 	if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
926 	t = sldns_read_uint16(*d);
927 	(*d)+=2;
928 	(*dlen)-=2;
929 	return sldns_wire2str_type_print(s, slen, t);
930 }
931 
932 int sldns_wire2str_ttl_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
933 {
934 	uint32_t ttl;
935 	if(*dlen == 0) return 0;
936 	if(*dlen < 4) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
937 	ttl = sldns_read_uint32(*d);
938 	(*d)+=4;
939 	(*dlen)-=4;
940 	return sldns_str_print(s, slen, "%u", (unsigned)ttl);
941 }
942 
943 int sldns_wire2str_rdf_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
944 	int rdftype, uint8_t* pkt, size_t pktlen, int* comprloop)
945 {
946 	if(*dlen == 0) return 0;
947 	switch(rdftype) {
948 	case LDNS_RDF_TYPE_NONE:
949 		return 0;
950 	case LDNS_RDF_TYPE_DNAME:
951 		return sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
952 	case LDNS_RDF_TYPE_INT8:
953 		return sldns_wire2str_int8_scan(d, dlen, s, slen);
954 	case LDNS_RDF_TYPE_INT16:
955 		return sldns_wire2str_int16_scan(d, dlen, s, slen);
956 	case LDNS_RDF_TYPE_INT32:
957 		return sldns_wire2str_int32_scan(d, dlen, s, slen);
958 	case LDNS_RDF_TYPE_PERIOD:
959 		return sldns_wire2str_period_scan(d, dlen, s, slen);
960 	case LDNS_RDF_TYPE_TSIGTIME:
961 		return sldns_wire2str_tsigtime_scan(d, dlen, s, slen);
962 	case LDNS_RDF_TYPE_A:
963 		return sldns_wire2str_a_scan(d, dlen, s, slen);
964 	case LDNS_RDF_TYPE_AAAA:
965 		return sldns_wire2str_aaaa_scan(d, dlen, s, slen);
966 	case LDNS_RDF_TYPE_STR:
967 		return sldns_wire2str_str_scan(d, dlen, s, slen);
968 	case LDNS_RDF_TYPE_APL:
969 		return sldns_wire2str_apl_scan(d, dlen, s, slen);
970 	case LDNS_RDF_TYPE_B32_EXT:
971 		return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
972 	case LDNS_RDF_TYPE_B64:
973 		return sldns_wire2str_b64_scan(d, dlen, s, slen);
974 	case LDNS_RDF_TYPE_HEX:
975 		return sldns_wire2str_hex_scan(d, dlen, s, slen);
976 	case LDNS_RDF_TYPE_NSEC:
977 		return sldns_wire2str_nsec_scan(d, dlen, s, slen);
978 	case LDNS_RDF_TYPE_NSEC3_SALT:
979 		return sldns_wire2str_nsec3_salt_scan(d, dlen, s, slen);
980 	case LDNS_RDF_TYPE_TYPE:
981 		return sldns_wire2str_type_scan(d, dlen, s, slen);
982 	case LDNS_RDF_TYPE_CLASS:
983 		return sldns_wire2str_class_scan(d, dlen, s, slen);
984 	case LDNS_RDF_TYPE_CERT_ALG:
985 		return sldns_wire2str_cert_alg_scan(d, dlen, s, slen);
986 	case LDNS_RDF_TYPE_ALG:
987 		return sldns_wire2str_alg_scan(d, dlen, s, slen);
988 	case LDNS_RDF_TYPE_UNKNOWN:
989 		return sldns_wire2str_unknown_scan(d, dlen, s, slen);
990 	case LDNS_RDF_TYPE_TIME:
991 		return sldns_wire2str_time_scan(d, dlen, s, slen);
992 	case LDNS_RDF_TYPE_LOC:
993 		return sldns_wire2str_loc_scan(d, dlen, s, slen);
994 	case LDNS_RDF_TYPE_WKS:
995 	case LDNS_RDF_TYPE_SERVICE:
996 		return sldns_wire2str_wks_scan(d, dlen, s, slen);
997 	case LDNS_RDF_TYPE_NSAP:
998 		return sldns_wire2str_nsap_scan(d, dlen, s, slen);
999 	case LDNS_RDF_TYPE_ATMA:
1000 		return sldns_wire2str_atma_scan(d, dlen, s, slen);
1001 	case LDNS_RDF_TYPE_IPSECKEY:
1002 		return sldns_wire2str_ipseckey_scan(d, dlen, s, slen, pkt,
1003 			pktlen, comprloop);
1004 	case LDNS_RDF_TYPE_HIP:
1005 		return sldns_wire2str_hip_scan(d, dlen, s, slen);
1006 	case LDNS_RDF_TYPE_INT16_DATA:
1007 		return sldns_wire2str_int16_data_scan(d, dlen, s, slen);
1008 	case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
1009 		return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
1010 	case LDNS_RDF_TYPE_ILNP64:
1011 		return sldns_wire2str_ilnp64_scan(d, dlen, s, slen);
1012 	case LDNS_RDF_TYPE_EUI48:
1013 		return sldns_wire2str_eui48_scan(d, dlen, s, slen);
1014 	case LDNS_RDF_TYPE_EUI64:
1015 		return sldns_wire2str_eui64_scan(d, dlen, s, slen);
1016 	case LDNS_RDF_TYPE_TAG:
1017 		return sldns_wire2str_tag_scan(d, dlen, s, slen);
1018 	case LDNS_RDF_TYPE_LONG_STR:
1019 		return sldns_wire2str_long_str_scan(d, dlen, s, slen);
1020 	case LDNS_RDF_TYPE_TSIGERROR:
1021 		return sldns_wire2str_tsigerror_scan(d, dlen, s, slen);
1022 	}
1023 	/* unknown rdf type */
1024 	return -1;
1025 }
1026 
1027 int sldns_wire2str_int8_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1028 {
1029 	int w;
1030 	if(*dl < 1) return -1;
1031 	w = sldns_str_print(s, sl, "%u", (unsigned)**d);
1032 	(*d)++;
1033 	(*dl)--;
1034 	return w;
1035 }
1036 
1037 int sldns_wire2str_int16_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1038 {
1039 	int w;
1040 	if(*dl < 2) return -1;
1041 	w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint16(*d));
1042 	(*d)+=2;
1043 	(*dl)-=2;
1044 	return w;
1045 }
1046 
1047 int sldns_wire2str_int32_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1048 {
1049 	int w;
1050 	if(*dl < 4) return -1;
1051 	w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint32(*d));
1052 	(*d)+=4;
1053 	(*dl)-=4;
1054 	return w;
1055 }
1056 
1057 int sldns_wire2str_period_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1058 {
1059 	int w;
1060 	if(*dl < 4) return -1;
1061 	w = sldns_str_print(s, sl, "%u", (unsigned)sldns_read_uint32(*d));
1062 	(*d)+=4;
1063 	(*dl)-=4;
1064 	return w;
1065 }
1066 
1067 int sldns_wire2str_tsigtime_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1068 {
1069 	/* tsigtime is 48 bits network order unsigned integer */
1070 	int w;
1071 	uint64_t tsigtime = 0;
1072 	uint64_t d0, d1, d2, d3, d4, d5;
1073 	if(*dl < 6) return -1;
1074 	d0 = (*d)[0]; /* cast to uint64 for shift operations */
1075 	d1 = (*d)[1];
1076 	d2 = (*d)[2];
1077 	d3 = (*d)[3];
1078 	d4 = (*d)[4];
1079 	d5 = (*d)[5];
1080 	tsigtime = (d0<<40) | (d1<<32) | (d2<<24) | (d3<<16) | (d4<<8) | d5;
1081 #ifndef USE_WINSOCK
1082 	w = sldns_str_print(s, sl, "%llu", (long long)tsigtime);
1083 #else
1084 	w = sldns_str_print(s, sl, "%I64u", (long long)tsigtime);
1085 #endif
1086 	(*d)+=6;
1087 	(*dl)-=6;
1088 	return w;
1089 }
1090 
1091 int sldns_wire2str_a_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1092 {
1093 	char buf[32];
1094 	int w;
1095 	if(*dl < 4) return -1;
1096 	if(!inet_ntop(AF_INET, *d, buf, (socklen_t)sizeof(buf)))
1097 		return -1;
1098 	w = sldns_str_print(s, sl, "%s", buf);
1099 	(*d)+=4;
1100 	(*dl)-=4;
1101 	return w;
1102 }
1103 
1104 int sldns_wire2str_aaaa_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1105 {
1106 #ifdef AF_INET6
1107 	char buf[64];
1108 	int w;
1109 	if(*dl < 16) return -1;
1110 	if(!inet_ntop(AF_INET6, *d, buf, (socklen_t)sizeof(buf)))
1111 		return -1;
1112 	w = sldns_str_print(s, sl, "%s", buf);
1113 	(*d)+=16;
1114 	(*dl)-=16;
1115 	return w;
1116 #else
1117 	return -1;
1118 #endif
1119 }
1120 
1121 /** printout escaped TYPE_STR character */
1122 static int str_char_print(char** s, size_t* sl, uint8_t c)
1123 {
1124 	if(isprint((unsigned char)c) || c == '\t') {
1125 		if(c == '\"' || c == '\\')
1126 			return sldns_str_print(s, sl, "\\%c", c);
1127 		if(*sl) {
1128 			**s = (char)c;
1129 			(*s)++;
1130 			(*sl)--;
1131 		}
1132 		return 1;
1133 	}
1134 	return sldns_str_print(s, sl, "\\%03u", (unsigned)c);
1135 }
1136 
1137 int sldns_wire2str_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1138 {
1139 	int w = 0;
1140 	size_t i, len;
1141 	if(*dl < 1) return -1;
1142 	len = **d;
1143 	if(*dl < 1+len) return -1;
1144 	(*d)++;
1145 	(*dl)--;
1146 	w += sldns_str_print(s, sl, "\"");
1147 	for(i=0; i<len; i++)
1148 		w += str_char_print(s, sl, (*d)[i]);
1149 	w += sldns_str_print(s, sl, "\"");
1150 	(*d)+=len;
1151 	(*dl)-=len;
1152 	return w;
1153 }
1154 
1155 int sldns_wire2str_apl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1156 {
1157 	int i, w = 0;
1158 	uint16_t family;
1159 	uint8_t negation, prefix, adflength;
1160 	if(*dl < 4) return -1;
1161 	family = sldns_read_uint16(*d);
1162 	prefix = (*d)[2];
1163 	negation = ((*d)[3] & LDNS_APL_NEGATION);
1164 	adflength = ((*d)[3] & LDNS_APL_MASK);
1165 	if(*dl < 4+(size_t)adflength) return -1;
1166 	if(family != LDNS_APL_IP4 && family != LDNS_APL_IP6)
1167 		return -1; /* unknown address family */
1168 	if(negation)
1169 		w += sldns_str_print(s, sl, "!");
1170 	w += sldns_str_print(s, sl, "%u:", (unsigned)family);
1171 	if(family == LDNS_APL_IP4) {
1172 		/* check if prefix <32 ? */
1173 		/* address is variable length 0 - 4 */
1174 		for(i=0; i<4; i++) {
1175 			if(i > 0)
1176 				w += sldns_str_print(s, sl, ".");
1177 			if(i < (int)adflength)
1178 				w += sldns_str_print(s, sl, "%d", (*d)[4+i]);
1179 			else	w += sldns_str_print(s, sl, "0");
1180 		}
1181 	} else if(family == LDNS_APL_IP6) {
1182 		/* check if prefix <128 ? */
1183 		/* address is variable length 0 - 16 */
1184 		for(i=0; i<16; i++) {
1185 			if(i%2 == 0 && i>0)
1186 				w += sldns_str_print(s, sl, ":");
1187 			if(i < (int)adflength)
1188 				w += sldns_str_print(s, sl, "%02x", (*d)[4+i]);
1189 			else	w += sldns_str_print(s, sl, "00");
1190 		}
1191 	}
1192 	w += sldns_str_print(s, sl, "/%u", (unsigned)prefix);
1193 	(*d) += 4+adflength;
1194 	(*dl) -= 4+adflength;
1195 	return w;
1196 }
1197 
1198 int sldns_wire2str_b32_ext_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1199 {
1200 	size_t datalen;
1201 	size_t sz;
1202 	if(*dl < 1) return -1;
1203 	datalen = (*d)[0];
1204 	if(*dl < 1+datalen) return -1;
1205 	sz = sldns_b32_ntop_calculate_size(datalen);
1206 	if(*sl < sz+1) {
1207 		(*d) += datalen+1;
1208 		(*dl) -= (datalen+1);
1209 		return (int)sz; /* out of space really, but would need buffer
1210 			in order to truncate the output */
1211 	}
1212 	sldns_b32_ntop_extended_hex((*d)+1, datalen, *s, *sl);
1213 	(*d) += datalen+1;
1214 	(*dl) -= (datalen+1);
1215 	(*s) += sz;
1216 	(*sl) -= sz;
1217 	return (int)sz;
1218 }
1219 
1220 /** scan number of bytes from wire into b64 presentation format */
1221 static int sldns_wire2str_b64_scan_num(uint8_t** d, size_t* dl, char** s,
1222 	size_t* sl, size_t num)
1223 {
1224 	/* b64_ntop_calculate size includes null at the end */
1225 	size_t sz = sldns_b64_ntop_calculate_size(num)-1;
1226 	if(*sl < sz+1) {
1227 		(*d) += num;
1228 		(*dl) -= num;
1229 		return (int)sz; /* out of space really, but would need buffer
1230 			in order to truncate the output */
1231 	}
1232 	sldns_b64_ntop(*d, num, *s, *sl);
1233 	(*d) += num;
1234 	(*dl) -= num;
1235 	(*s) += sz;
1236 	(*sl) -= sz;
1237 	return (int)sz;
1238 }
1239 
1240 int sldns_wire2str_b64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1241 {
1242 	if(*dl == 0) {
1243 		return sldns_str_print(s, sl, "0");
1244 	}
1245 	return sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1246 }
1247 
1248 int sldns_wire2str_hex_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1249 {
1250 	if(*dl == 0) {
1251 		return sldns_str_print(s, sl, "0");
1252 	}
1253 	return print_remainder_hex("", d, dl, s, sl);
1254 }
1255 
1256 int sldns_wire2str_nsec_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1257 {
1258 	uint8_t* p = *d;
1259 	size_t pl = *dl;
1260 	unsigned i, bit, window, block_len;
1261 	uint16_t t;
1262 	int w = 0;
1263 
1264 	/* check for errors */
1265 	while(pl) {
1266 		if(pl < 2) return -1;
1267 		block_len = (unsigned)p[1];
1268 		if(pl < 2+block_len) return -1;
1269 		p += block_len+2;
1270 		pl -= block_len+2;
1271 	}
1272 
1273 	/* do it */
1274 	p = *d;
1275 	pl = *dl;
1276 	while(pl) {
1277 		if(pl < 2) return -1; /* cannot happen */
1278 		window = (unsigned)p[0];
1279 		block_len = (unsigned)p[1];
1280 		if(pl < 2+block_len) return -1; /* cannot happen */
1281 		p += 2;
1282 		for(i=0; i<block_len; i++) {
1283 			if(p[i] == 0) continue;
1284 			/* base type number for this octet */
1285 			t = ((window)<<8) | (i << 3);
1286 			for(bit=0; bit<8; bit++) {
1287 				if((p[i]&(0x80>>bit))) {
1288 					if(w) w += sldns_str_print(s, sl, " ");
1289 					w += sldns_wire2str_type_print(s, sl,
1290 						t+bit);
1291 				}
1292 			}
1293 		}
1294 		p += block_len;
1295 		pl -= block_len+2;
1296 	}
1297 	(*d) += *dl;
1298 	(*dl) = 0;
1299 	return w;
1300 }
1301 
1302 int sldns_wire2str_nsec3_salt_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1303 {
1304 	size_t salt_len;
1305 	int w;
1306 	if(*dl < 1) return -1;
1307 	salt_len = (size_t)(*d)[0];
1308 	if(*dl < 1+salt_len) return -1;
1309 	(*d)++;
1310 	(*dl)--;
1311 	if(salt_len == 0) {
1312 		return sldns_str_print(s, sl, "-");
1313 	}
1314 	w = print_hex_buf(s, sl, *d, salt_len);
1315 	(*dl)-=salt_len;
1316 	(*d)+=salt_len;
1317 	return w;
1318 }
1319 
1320 int sldns_wire2str_cert_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1321 {
1322 	sldns_lookup_table *lt;
1323 	int data, w;
1324 	if(*dl < 2) return -1;
1325 	data = (int)sldns_read_uint16(*d);
1326 	lt = sldns_lookup_by_id(sldns_cert_algorithms, data);
1327 	if(lt && lt->name)
1328 		w = sldns_str_print(s, sl, "%s", lt->name);
1329 	else 	w = sldns_str_print(s, sl, "%d", data);
1330 	(*dl)-=2;
1331 	(*d)+=2;
1332 	return w;
1333 }
1334 
1335 int sldns_wire2str_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1336 {
1337 	/* don't use algorithm mnemonics in the presentation format
1338 	 * this kind of got sneaked into the rfc's */
1339 	return sldns_wire2str_int8_scan(d, dl, s, sl);
1340 }
1341 
1342 int sldns_wire2str_unknown_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1343 {
1344 	return sldns_wire2str_rdata_unknown_scan(d, dl, s, sl);
1345 }
1346 
1347 int sldns_wire2str_time_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1348 {
1349 	/* create a YYYYMMDDHHMMSS string if possible */
1350 	struct tm tm;
1351 	char date_buf[16];
1352 	uint32_t t;
1353 	memset(&tm, 0, sizeof(tm));
1354 	if(*dl < 4) return -1;
1355 	t = sldns_read_uint32(*d);
1356 	date_buf[15]=0;
1357 	if(sldns_serial_arithmetics_gmtime_r(t, time(NULL), &tm) &&
1358 		strftime(date_buf, 15, "%Y%m%d%H%M%S", &tm)) {
1359 		(*d) += 4;
1360 		(*dl) -= 4;
1361 		return sldns_str_print(s, sl, "%s", date_buf);
1362 	}
1363 	return -1;
1364 }
1365 
1366 static int
1367 loc_cm_print(char** str, size_t* sl, uint8_t mantissa, uint8_t exponent)
1368 {
1369 	int w = 0;
1370 	uint8_t i;
1371 	/* is it 0.<two digits> ? */
1372 	if(exponent < 2) {
1373 		if(exponent == 1)
1374 			mantissa *= 10;
1375 		return sldns_str_print(str, sl, "0.%02ld", (long)mantissa);
1376 	}
1377 	/* always <digit><string of zeros> */
1378 	w += sldns_str_print(str, sl, "%d", (int)mantissa);
1379 	for(i=0; i<exponent-2; i++)
1380 		w += sldns_str_print(str, sl, "0");
1381 	return w;
1382 }
1383 
1384 int sldns_wire2str_loc_scan(uint8_t** d, size_t* dl, char** str, size_t* sl)
1385 {
1386 	/* we could do checking (ie degrees < 90 etc)? */
1387 	uint8_t version;
1388 	uint8_t size;
1389 	uint8_t horizontal_precision;
1390 	uint8_t vertical_precision;
1391 	uint32_t longitude;
1392 	uint32_t latitude;
1393 	uint32_t altitude;
1394 	char northerness;
1395 	char easterness;
1396 	uint32_t h;
1397 	uint32_t m;
1398 	double s;
1399 	uint32_t equator = (uint32_t)1 << 31; /* 2**31 */
1400 	int w = 0;
1401 
1402 	if(*dl < 16) return -1;
1403 	version = (*d)[0];
1404 	if(version != 0)
1405 		return sldns_wire2str_hex_scan(d, dl, str, sl);
1406 	size = (*d)[1];
1407 	horizontal_precision = (*d)[2];
1408 	vertical_precision = (*d)[3];
1409 
1410 	latitude = sldns_read_uint32((*d)+4);
1411 	longitude = sldns_read_uint32((*d)+8);
1412 	altitude = sldns_read_uint32((*d)+12);
1413 
1414 	if (latitude > equator) {
1415 		northerness = 'N';
1416 		latitude = latitude - equator;
1417 	} else {
1418 		northerness = 'S';
1419 		latitude = equator - latitude;
1420 	}
1421 	h = latitude / (1000 * 60 * 60);
1422 	latitude = latitude % (1000 * 60 * 60);
1423 	m = latitude / (1000 * 60);
1424 	latitude = latitude % (1000 * 60);
1425 	s = (double) latitude / 1000.0;
1426 	w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1427 		h, m, s, northerness);
1428 
1429 	if (longitude > equator) {
1430 		easterness = 'E';
1431 		longitude = longitude - equator;
1432 	} else {
1433 		easterness = 'W';
1434 		longitude = equator - longitude;
1435 	}
1436 	h = longitude / (1000 * 60 * 60);
1437 	longitude = longitude % (1000 * 60 * 60);
1438 	m = longitude / (1000 * 60);
1439 	longitude = longitude % (1000 * 60);
1440 	s = (double) longitude / (1000.0);
1441 	w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1442 		h, m, s, easterness);
1443 
1444 	s = ((double) altitude) / 100;
1445 	s -= 100000;
1446 
1447 	if(altitude%100 != 0)
1448 		w += sldns_str_print(str, sl, "%.2f", s);
1449 	else
1450 		w += sldns_str_print(str, sl, "%.0f", s);
1451 
1452 	w += sldns_str_print(str, sl, "m ");
1453 
1454 	w += loc_cm_print(str, sl, (size & 0xf0) >> 4, size & 0x0f);
1455 	w += sldns_str_print(str, sl, "m ");
1456 
1457 	w += loc_cm_print(str, sl, (horizontal_precision & 0xf0) >> 4,
1458 		horizontal_precision & 0x0f);
1459 	w += sldns_str_print(str, sl, "m ");
1460 
1461 	w += loc_cm_print(str, sl, (vertical_precision & 0xf0) >> 4,
1462 		vertical_precision & 0x0f);
1463 	w += sldns_str_print(str, sl, "m");
1464 
1465 	(*d)+=16;
1466 	(*dl)-=16;
1467 	return w;
1468 }
1469 
1470 int sldns_wire2str_wks_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1471 {
1472 	/* protocol, followed by bitmap of services */
1473 	const char* proto_name = NULL;
1474 	struct protoent *protocol;
1475 	struct servent *service;
1476 	uint8_t protocol_nr;
1477 	int bit, port, w = 0;
1478 	size_t i;
1479 	/* we cannot print with strings because they
1480 	 * are not portable, the presentation format may
1481 	 * not be able to be read in on another computer.  */
1482 	int print_symbols = 0;
1483 
1484 	/* protocol */
1485 	if(*dl < 1) return -1;
1486 	protocol_nr = (*d)[0];
1487 	(*d)++;
1488 	(*dl)--;
1489 	protocol = getprotobynumber((int)protocol_nr);
1490 	if(protocol && (protocol->p_name != NULL)) {
1491 		w += sldns_str_print(s, sl, "%s", protocol->p_name);
1492 		proto_name = protocol->p_name;
1493 	} else if(protocol_nr == 6) {
1494 		w += sldns_str_print(s, sl, "tcp");
1495 	} else if(protocol_nr == 17) {
1496 		w += sldns_str_print(s, sl, "udp");
1497 	} else	{
1498 		w += sldns_str_print(s, sl, "%u", (unsigned)protocol_nr);
1499 	}
1500 
1501 	for(i=0; i<*dl; i++) {
1502 		if((*d)[i] == 0)
1503 			continue;
1504 		for(bit=0; bit<8; bit++) {
1505 			if(!(((*d)[i])&(0x80>>bit)))
1506 				continue;
1507 			port = (int)i*8 + bit;
1508 
1509 			if(!print_symbols)
1510 				service = NULL;
1511 			else
1512 				service = getservbyport(
1513 					(int)htons((uint16_t)port), proto_name);
1514 			if(service && service->s_name)
1515 				w += sldns_str_print(s, sl, " %s",
1516 					service->s_name);
1517 			else 	w += sldns_str_print(s, sl, " %u",
1518 					(unsigned)port);
1519 		}
1520 	}
1521 
1522 #ifdef HAVE_ENDSERVENT
1523 	endservent();
1524 #endif
1525 #ifdef HAVE_ENDPROTOENT
1526         endprotoent();
1527 #endif
1528 	(*d) += *dl;
1529 	(*dl) = 0;
1530 	return w;
1531 }
1532 
1533 int sldns_wire2str_nsap_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1534 {
1535 	return print_remainder_hex("0x", d, dl, s, sl);
1536 }
1537 
1538 int sldns_wire2str_atma_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1539 {
1540 	return print_remainder_hex("", d, dl, s, sl);
1541 }
1542 
1543 /* internal scan routine that can modify arguments on failure */
1544 static int sldns_wire2str_ipseckey_scan_internal(uint8_t** d, size_t* dl,
1545 	char** s, size_t* sl, uint8_t* pkt, size_t pktlen, int* comprloop)
1546 {
1547 	/* http://www.ietf.org/internet-drafts/draft-ietf-ipseckey-rr-12.txt*/
1548 	uint8_t precedence, gateway_type, algorithm;
1549 	int w = 0;
1550 
1551 	if(*dl < 3) return -1;
1552 	precedence = (*d)[0];
1553 	gateway_type = (*d)[1];
1554 	algorithm = (*d)[2];
1555 	if(gateway_type > 3)
1556 		return -1; /* unknown */
1557 	(*d)+=3;
1558 	(*dl)-=3;
1559 	w += sldns_str_print(s, sl, "%d %d %d ",
1560 		(int)precedence, (int)gateway_type, (int)algorithm);
1561 
1562 	switch(gateway_type) {
1563 	case 0: /* no gateway */
1564 		w += sldns_str_print(s, sl, ".");
1565 		break;
1566 	case 1: /* ip4 */
1567 		w += sldns_wire2str_a_scan(d, dl, s, sl);
1568 		break;
1569 	case 2: /* ip6 */
1570 		w += sldns_wire2str_aaaa_scan(d, dl, s, sl);
1571 		break;
1572 	case 3: /* dname */
1573 		w += sldns_wire2str_dname_scan(d, dl, s, sl, pkt, pktlen, comprloop);
1574 		break;
1575 	default: /* unknown */
1576 		return -1;
1577 	}
1578 
1579 	if(*dl < 1)
1580 		return -1;
1581 	w += sldns_str_print(s, sl, " ");
1582 	w += sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1583 	return w;
1584 }
1585 
1586 int sldns_wire2str_ipseckey_scan(uint8_t** d, size_t* dl, char** s, size_t* sl,
1587 	uint8_t* pkt, size_t pktlen, int* comprloop)
1588 {
1589 	uint8_t* od = *d;
1590 	char* os = *s;
1591 	size_t odl = *dl, osl = *sl;
1592 	int w=sldns_wire2str_ipseckey_scan_internal(d, dl, s, sl, pkt, pktlen, comprloop);
1593 	if(w == -1) {
1594 		*d = od;
1595 		*s = os;
1596 		*dl = odl;
1597 		*sl = osl;
1598 		return -1;
1599 	}
1600 	return w;
1601 }
1602 
1603 int sldns_wire2str_hip_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1604 {
1605 	int w;
1606 	uint8_t algo, hitlen;
1607 	uint16_t pklen;
1608 
1609 	/* read lengths */
1610 	if(*dl < 4)
1611 		return -1;
1612 	hitlen = (*d)[0];
1613 	algo = (*d)[1];
1614 	pklen = sldns_read_uint16((*d)+2);
1615 	if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen)
1616 		return -1;
1617 
1618 	/* write: algo hit pubkey */
1619 	w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
1620 	w += print_hex_buf(s, sl, (*d)+4, hitlen);
1621 	w += sldns_str_print(s, sl, " ");
1622 	(*d)+=4+hitlen;
1623 	(*dl)-= (4+hitlen);
1624 	w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
1625 	return w;
1626 }
1627 
1628 int sldns_wire2str_int16_data_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1629 {
1630 	int w;
1631 	uint16_t n;
1632 	if(*dl < 2)
1633 		return -1;
1634 	n = sldns_read_uint16(*d);
1635 	if(*dl < 2+(size_t)n)
1636 		return -1;
1637 	(*d)+=2;
1638 	(*dl)-=2;
1639 	if(n == 0) {
1640 		return sldns_str_print(s, sl, "0");
1641 	}
1642 	w = sldns_str_print(s, sl, "%u ", (unsigned)n);
1643 	w += sldns_wire2str_b64_scan_num(d, dl, s, sl, n);
1644 	return w;
1645 }
1646 
1647 int sldns_wire2str_nsec3_next_owner_scan(uint8_t** d, size_t* dl, char** s,
1648 	size_t* sl)
1649 {
1650 	return sldns_wire2str_b32_ext_scan(d, dl, s, sl);
1651 }
1652 
1653 int sldns_wire2str_ilnp64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1654 {
1655 	int w;
1656 	if(*dl < 8)
1657 		return -1;
1658 	w = sldns_str_print(s, sl, "%.4x:%.4x:%.4x:%.4x",
1659 		sldns_read_uint16(*d), sldns_read_uint16((*d)+2),
1660 		sldns_read_uint16((*d)+4), sldns_read_uint16((*d)+6));
1661 	(*d)+=8;
1662 	(*dl)-=8;
1663 	return w;
1664 }
1665 
1666 int sldns_wire2str_eui48_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1667 {
1668 	int w;
1669 	if(*dl < 6)
1670 		return -1;
1671 	w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1672 		(*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5]);
1673 	(*d)+=6;
1674 	(*dl)-=6;
1675 	return w;
1676 }
1677 
1678 int sldns_wire2str_eui64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1679 {
1680 	int w;
1681 	if(*dl < 8)
1682 		return -1;
1683 	w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
1684 		(*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5],
1685 		(*d)[6], (*d)[7]);
1686 	(*d)+=8;
1687 	(*dl)-=8;
1688 	return w;
1689 }
1690 
1691 int sldns_wire2str_tag_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1692 {
1693 	size_t i, n;
1694 	int w = 0;
1695 	if(*dl < 1)
1696 		return -1;
1697 	n = (size_t)((*d)[0]);
1698 	if(*dl < 1+n)
1699 		return -1;
1700 	for(i=0; i<n; i++)
1701 		if(!isalnum((unsigned char)(*d)[i+1]))
1702 			return -1;
1703 	for(i=0; i<n; i++)
1704 		w += sldns_str_print(s, sl, "%c", (char)(*d)[i+1]);
1705 	(*d)+=n+1;
1706 	(*dl)-=(n+1);
1707 	return w;
1708 }
1709 
1710 int sldns_wire2str_long_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1711 {
1712 	size_t i;
1713 	int w = 0;
1714 	w += sldns_str_print(s, sl, "\"");
1715 	for(i=0; i<*dl; i++)
1716 		w += str_char_print(s, sl, (*d)[i]);
1717 	w += sldns_str_print(s, sl, "\"");
1718 	(*d)+=*dl;
1719 	(*dl)=0;
1720 	return w;
1721 }
1722 
1723 int sldns_wire2str_tsigerror_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1724 {
1725 	sldns_lookup_table *lt;
1726 	int data, w;
1727 	if(*dl < 2) return -1;
1728 	data = (int)sldns_read_uint16(*d);
1729 	lt = sldns_lookup_by_id(sldns_tsig_errors, data);
1730 	if(lt && lt->name)
1731 		w = sldns_str_print(s, sl, "%s", lt->name);
1732 	else 	w = sldns_str_print(s, sl, "%d", data);
1733 	(*dl)-=2;
1734 	(*d)+=2;
1735 	return w;
1736 }
1737 
1738 int sldns_wire2str_edns_llq_print(char** s, size_t* sl, uint8_t* data,
1739 	size_t len)
1740 {
1741 	/* LLQ constants */
1742 	const char* llq_errors[] = {"NO-ERROR", "SERV-FULL", "STATIC",
1743 		"FORMAT-ERR", "NO-SUCH-LLQ", "BAD-VERS", "UNKNOWN_ERR"};
1744 	const unsigned int llq_errors_num = 7;
1745 	const char* llq_opcodes[] = {"LLQ-SETUP", "LLQ-REFRESH", "LLQ-EVENT"};
1746 	const unsigned int llq_opcodes_num = 3;
1747 	uint16_t version, llq_opcode, error_code;
1748 	uint64_t llq_id;
1749 	uint32_t lease_life; /* Requested or granted life of LLQ, in seconds */
1750 	int w = 0;
1751 
1752 	/* read the record */
1753 	if(len != 18) {
1754 		w += sldns_str_print(s, sl, "malformed LLQ ");
1755 		w += print_hex_buf(s, sl, data, len);
1756 		return w;
1757 	}
1758 	version = sldns_read_uint16(data);
1759 	llq_opcode = sldns_read_uint16(data+2);
1760 	error_code = sldns_read_uint16(data+4);
1761 	memmove(&llq_id, data+6, sizeof(llq_id));
1762 	lease_life = sldns_read_uint32(data+14);
1763 
1764 	/* print it */
1765 	w += sldns_str_print(s, sl, "v%d ", (int)version);
1766 	if(llq_opcode < llq_opcodes_num)
1767 		w += sldns_str_print(s, sl, "%s", llq_opcodes[llq_opcode]);
1768 	else	w += sldns_str_print(s, sl, "opcode %d", (int)llq_opcode);
1769 	if(error_code < llq_errors_num)
1770 		w += sldns_str_print(s, sl, " %s", llq_errors[error_code]);
1771 	else	w += sldns_str_print(s, sl, " error %d", (int)error_code);
1772 #ifndef USE_WINSOCK
1773 	w += sldns_str_print(s, sl, " id %llx lease-life %lu",
1774 		(unsigned long long)llq_id, (unsigned long)lease_life);
1775 #else
1776 	w += sldns_str_print(s, sl, " id %I64x lease-life %lu",
1777 		(unsigned long long)llq_id, (unsigned long)lease_life);
1778 #endif
1779 	return w;
1780 }
1781 
1782 int sldns_wire2str_edns_ul_print(char** s, size_t* sl, uint8_t* data,
1783 	size_t len)
1784 {
1785 	uint32_t lease;
1786 	int w = 0;
1787 	if(len != 4) {
1788 		w += sldns_str_print(s, sl, "malformed UL ");
1789 		w += print_hex_buf(s, sl, data, len);
1790 		return w;
1791 	}
1792 	lease = sldns_read_uint32(data);
1793 	w += sldns_str_print(s, sl, "lease %lu", (unsigned long)lease);
1794 	return w;
1795 }
1796 
1797 int sldns_wire2str_edns_nsid_print(char** s, size_t* sl, uint8_t* data,
1798 	size_t len)
1799 {
1800 	int w = 0;
1801 	size_t i, printed=0;
1802 	w += print_hex_buf(s, sl, data, len);
1803 	for(i=0; i<len; i++) {
1804 		if(isprint((unsigned char)data[i]) || data[i] == '\t') {
1805 			if(!printed) {
1806 				w += sldns_str_print(s, sl, " (");
1807 				printed = 1;
1808 			}
1809 			w += sldns_str_print(s, sl, "%c", (char)data[i]);
1810 		}
1811 	}
1812 	if(printed)
1813 		w += sldns_str_print(s, sl, ")");
1814 	return w;
1815 }
1816 
1817 int sldns_wire2str_edns_dau_print(char** s, size_t* sl, uint8_t* data,
1818 	size_t len)
1819 {
1820 	sldns_lookup_table *lt;
1821 	size_t i;
1822 	int w = 0;
1823 	for(i=0; i<len; i++) {
1824 		lt = sldns_lookup_by_id(sldns_algorithms, (int)data[i]);
1825 		if(lt && lt->name)
1826 			w += sldns_str_print(s, sl, " %s", lt->name);
1827 		else 	w += sldns_str_print(s, sl, " %d", (int)data[i]);
1828 	}
1829 	return w;
1830 }
1831 
1832 int sldns_wire2str_edns_dhu_print(char** s, size_t* sl, uint8_t* data,
1833 	size_t len)
1834 {
1835 	sldns_lookup_table *lt;
1836 	size_t i;
1837 	int w = 0;
1838 	for(i=0; i<len; i++) {
1839 		lt = sldns_lookup_by_id(sldns_hashes, (int)data[i]);
1840 		if(lt && lt->name)
1841 			w += sldns_str_print(s, sl, " %s", lt->name);
1842 		else 	w += sldns_str_print(s, sl, " %d", (int)data[i]);
1843 	}
1844 	return w;
1845 }
1846 
1847 int sldns_wire2str_edns_n3u_print(char** s, size_t* sl, uint8_t* data,
1848 	size_t len)
1849 {
1850 	size_t i;
1851 	int w = 0;
1852 	for(i=0; i<len; i++) {
1853 		if(data[i] == 1)
1854 			w += sldns_str_print(s, sl, " SHA1");
1855 		else 	w += sldns_str_print(s, sl, " %d", (int)data[i]);
1856 	}
1857 	return w;
1858 }
1859 
1860 int sldns_wire2str_edns_subnet_print(char** s, size_t* sl, uint8_t* data,
1861 	size_t len)
1862 {
1863 	int w = 0;
1864 	uint16_t family;
1865 	uint8_t source, scope;
1866 	if(len < 4) {
1867 		w += sldns_str_print(s, sl, "malformed subnet ");
1868 		w += print_hex_buf(s, sl, data, len);
1869 		return w;
1870 	}
1871 	family = sldns_read_uint16(data);
1872 	source = data[2];
1873 	scope = data[3];
1874 	if(family == 1) {
1875 		/* IP4 */
1876 		char buf[64];
1877 		uint8_t ip4[4];
1878 		memset(ip4, 0, sizeof(ip4));
1879 		if(len-4 > 4) {
1880 			w += sldns_str_print(s, sl, "trailingdata:");
1881 			w += print_hex_buf(s, sl, data+4+4, len-4-4);
1882 			w += sldns_str_print(s, sl, " ");
1883 			len = 4+4;
1884 		}
1885 		memmove(ip4, data+4, len-4);
1886 		if(!inet_ntop(AF_INET, ip4, buf, (socklen_t)sizeof(buf))) {
1887 			w += sldns_str_print(s, sl, "ip4ntoperror ");
1888 			w += print_hex_buf(s, sl, data+4+4, len-4-4);
1889 		} else {
1890 			w += sldns_str_print(s, sl, "%s", buf);
1891 		}
1892 	} else if(family == 2) {
1893 		/* IP6 */
1894 		char buf[64];
1895 		uint8_t ip6[16];
1896 		memset(ip6, 0, sizeof(ip6));
1897 		if(len-4 > 16) {
1898 			w += sldns_str_print(s, sl, "trailingdata:");
1899 			w += print_hex_buf(s, sl, data+4+16, len-4-16);
1900 			w += sldns_str_print(s, sl, " ");
1901 			len = 4+16;
1902 		}
1903 		memmove(ip6, data+4, len-4);
1904 #ifdef AF_INET6
1905 		if(!inet_ntop(AF_INET6, ip6, buf, (socklen_t)sizeof(buf))) {
1906 			w += sldns_str_print(s, sl, "ip6ntoperror ");
1907 			w += print_hex_buf(s, sl, data+4+4, len-4-4);
1908 		} else {
1909 			w += sldns_str_print(s, sl, "%s", buf);
1910 		}
1911 #else
1912 		w += print_hex_buf(s, sl, data+4+4, len-4-4);
1913 #endif
1914 	} else {
1915 		/* unknown */
1916 		w += sldns_str_print(s, sl, "family %d ",
1917 			(int)family);
1918 		w += print_hex_buf(s, sl, data, len);
1919 	}
1920 	w += sldns_str_print(s, sl, "/%d scope /%d", (int)source, (int)scope);
1921 	return w;
1922 }
1923 
1924 static int sldns_wire2str_edns_keepalive_print(char** s, size_t* sl,
1925 	uint8_t* data, size_t len)
1926 {
1927 	int w = 0;
1928 	uint16_t timeout;
1929 	if(!(len == 0 || len == 2)) {
1930 		w += sldns_str_print(s, sl, "malformed keepalive ");
1931 		w += print_hex_buf(s, sl, data, len);
1932 		return w;
1933 	}
1934 	if(len == 0 ) {
1935 		w += sldns_str_print(s, sl, "no timeout value (only valid for client option) ");
1936 	} else {
1937 		timeout = sldns_read_uint16(data);
1938 		w += sldns_str_print(s, sl, "timeout value in units of 100ms %u", (int)timeout);
1939 	}
1940 	return w;
1941 }
1942 
1943 int sldns_wire2str_edns_option_print(char** s, size_t* sl,
1944 	uint16_t option_code, uint8_t* optdata, size_t optlen)
1945 {
1946 	int w = 0;
1947 	w += sldns_wire2str_edns_option_code_print(s, sl, option_code);
1948 	w += sldns_str_print(s, sl, ": ");
1949 	switch(option_code) {
1950 	case LDNS_EDNS_LLQ:
1951 		w += sldns_wire2str_edns_llq_print(s, sl, optdata, optlen);
1952 		break;
1953 	case LDNS_EDNS_UL:
1954 		w += sldns_wire2str_edns_ul_print(s, sl, optdata, optlen);
1955 		break;
1956 	case LDNS_EDNS_NSID:
1957 		w += sldns_wire2str_edns_nsid_print(s, sl, optdata, optlen);
1958 		break;
1959 	case LDNS_EDNS_DAU:
1960 		w += sldns_wire2str_edns_dau_print(s, sl, optdata, optlen);
1961 		break;
1962 	case LDNS_EDNS_DHU:
1963 		w += sldns_wire2str_edns_dhu_print(s, sl, optdata, optlen);
1964 		break;
1965 	case LDNS_EDNS_N3U:
1966 		w += sldns_wire2str_edns_n3u_print(s, sl, optdata, optlen);
1967 		break;
1968 	case LDNS_EDNS_CLIENT_SUBNET:
1969 		w += sldns_wire2str_edns_subnet_print(s, sl, optdata, optlen);
1970 		break;
1971 	 case LDNS_EDNS_KEEPALIVE:
1972 		w += sldns_wire2str_edns_keepalive_print(s, sl, optdata, optlen);
1973 		break;
1974 	case LDNS_EDNS_PADDING:
1975 		w += print_hex_buf(s, sl, optdata, optlen);
1976 		break;
1977 	default:
1978 		/* unknown option code */
1979 		w += print_hex_buf(s, sl, optdata, optlen);
1980 		break;
1981 	}
1982 	return w;
1983 }
1984 
1985 /** print the edns options to string */
1986 static int
1987 print_edns_opts(char** s, size_t* sl, uint8_t* rdata, size_t rdatalen)
1988 {
1989 	uint16_t option_code, option_len;
1990 	int w = 0;
1991 	while(rdatalen > 0) {
1992 		/* option name */
1993 		if(rdatalen < 4) {
1994 			w += sldns_str_print(s, sl, " ; malformed: ");
1995 			w += print_hex_buf(s, sl, rdata, rdatalen);
1996 			return w;
1997 		}
1998 		option_code = sldns_read_uint16(rdata);
1999 		option_len = sldns_read_uint16(rdata+2);
2000 		rdata += 4;
2001 		rdatalen -= 4;
2002 
2003 		/* option value */
2004 		if(rdatalen < (size_t)option_len) {
2005 			w += sldns_str_print(s, sl, " ; malformed ");
2006 			w += sldns_wire2str_edns_option_code_print(s, sl,
2007 				option_code);
2008 			w += sldns_str_print(s, sl, ": ");
2009 			w += print_hex_buf(s, sl, rdata, rdatalen);
2010 			return w;
2011 		}
2012 		w += sldns_str_print(s, sl, " ; ");
2013 		w += sldns_wire2str_edns_option_print(s, sl, option_code,
2014 			rdata, option_len);
2015 		rdata += option_len;
2016 		rdatalen -= option_len;
2017 	}
2018 	return w;
2019 }
2020 
2021 int sldns_wire2str_edns_scan(uint8_t** data, size_t* data_len, char** str,
2022         size_t* str_len, uint8_t* pkt, size_t pktlen)
2023 {
2024 	int w = 0;
2025 	uint8_t ext_rcode, edns_version;
2026 	uint16_t udpsize, edns_bits, rdatalen;
2027 	w += sldns_str_print(str, str_len, "; EDNS:");
2028 
2029 	/* some input checks, domain name */
2030 	if(*data_len < 1+10)
2031 		return w + print_remainder_hex("Error malformed 0x",
2032 			data, data_len, str, str_len);
2033 	if(*data[0] != 0) {
2034 		return w + print_remainder_hex("Error nonrootdname 0x",
2035 			data, data_len, str, str_len);
2036 	}
2037 	(*data)++;
2038 	(*data_len)--;
2039 
2040 	/* check type and read fixed contents */
2041 	if(sldns_read_uint16((*data)) != LDNS_RR_TYPE_OPT) {
2042 		return w + print_remainder_hex("Error nottypeOPT 0x",
2043 			data, data_len, str, str_len);
2044 	}
2045 	udpsize = sldns_read_uint16((*data)+2);
2046 	ext_rcode = (*data)[4];
2047 	edns_version = (*data)[5];
2048 	edns_bits = sldns_read_uint16((*data)+6);
2049 	rdatalen = sldns_read_uint16((*data)+8);
2050 	(*data)+=10;
2051 	(*data_len)-=10;
2052 
2053 	w += sldns_str_print(str, str_len, " version: %u;",
2054 		(unsigned)edns_version);
2055 	w += sldns_str_print(str, str_len, " flags:");
2056 	if((edns_bits & LDNS_EDNS_MASK_DO_BIT))
2057 		w += sldns_str_print(str, str_len, " do");
2058 	/* the extended rcode is the value set, shifted four bits,
2059 	 * and or'd with the original rcode */
2060 	if(ext_rcode) {
2061 		int rc = ((int)ext_rcode)<<4;
2062 		if(pkt && pktlen >= LDNS_HEADER_SIZE)
2063 			rc |= LDNS_RCODE_WIRE(pkt);
2064 		w += sldns_str_print(str, str_len, " ; ext-rcode: %d", rc);
2065 	}
2066 	w += sldns_str_print(str, str_len, " ; udp: %u", (unsigned)udpsize);
2067 
2068 	if(rdatalen) {
2069 		if((size_t)*data_len < rdatalen) {
2070 			w += sldns_str_print(str, str_len,
2071 				" ; Error EDNS rdata too short; ");
2072 			rdatalen = (uint16_t)*data_len;
2073 		}
2074 		w += print_edns_opts(str, str_len, *data, rdatalen);
2075 		(*data) += rdatalen;
2076 		(*data_len) -= rdatalen;
2077 	}
2078 	w += sldns_str_print(str, str_len, "\n");
2079 	return w;
2080 }
2081