Coverage Report

Created: 2025-07-12 06:29

/src/unbound/sldns/wire2str.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * wire2str.c
3
 *
4
 * conversion routines from the wire format
5
 * to the presentation format (strings)
6
 *
7
 * (c) NLnet Labs, 2004-2006
8
 *
9
 * See the file LICENSE for the license
10
 */
11
/**
12
 * \file
13
 *
14
 * Contains functions to translate the wireformat to text
15
 * representation, as well as functions to print them.
16
 */
17
#include "config.h"
18
#include "sldns/wire2str.h"
19
#include "sldns/str2wire.h"
20
#include "sldns/rrdef.h"
21
#include "sldns/pkthdr.h"
22
#include "sldns/parseutil.h"
23
#include "sldns/sbuffer.h"
24
#include "sldns/keyraw.h"
25
#include "util/data/dname.h"
26
#ifdef HAVE_TIME_H
27
#include <time.h>
28
#endif
29
#include <sys/time.h>
30
#include <stdarg.h>
31
#include <ctype.h>
32
#ifdef HAVE_NETDB_H
33
#include <netdb.h>
34
#endif
35
36
/* lookup tables for standard DNS stuff  */
37
/* Taken from RFC 2535, section 7.  */
38
static sldns_lookup_table sldns_algorithms_data[] = {
39
  { LDNS_RSAMD5, "RSAMD5" },
40
  { LDNS_DH, "DH" },
41
  { LDNS_DSA, "DSA" },
42
  { LDNS_ECC, "ECC" },
43
  { LDNS_RSASHA1, "RSASHA1" },
44
  { LDNS_DSA_NSEC3, "DSA-NSEC3-SHA1" },
45
  { LDNS_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
46
  { LDNS_RSASHA256, "RSASHA256"},
47
  { LDNS_RSASHA512, "RSASHA512"},
48
  { LDNS_ECC_GOST, "ECC-GOST"},
49
  { LDNS_ECDSAP256SHA256, "ECDSAP256SHA256"},
50
  { LDNS_ECDSAP384SHA384, "ECDSAP384SHA384"},
51
  { LDNS_ED25519, "ED25519"},
52
  { LDNS_ED448, "ED448"},
53
  { LDNS_INDIRECT, "INDIRECT" },
54
  { LDNS_PRIVATEDNS, "PRIVATEDNS" },
55
  { LDNS_PRIVATEOID, "PRIVATEOID" },
56
  { 0, NULL }
57
};
58
sldns_lookup_table* sldns_algorithms = sldns_algorithms_data;
59
60
/* hash algorithms in DS record */
61
static sldns_lookup_table sldns_hashes_data[] = {
62
  { LDNS_SHA1, "SHA1" },
63
  { LDNS_SHA256, "SHA256" },
64
  { LDNS_HASH_GOST, "HASH-GOST" },
65
  { LDNS_SHA384, "SHA384" },
66
  { 0, NULL }
67
};
68
sldns_lookup_table* sldns_hashes = sldns_hashes_data;
69
70
/* Taken from RFC 4398  */
71
static sldns_lookup_table sldns_cert_algorithms_data[] = {
72
  { LDNS_CERT_PKIX, "PKIX" },
73
  { LDNS_CERT_SPKI, "SPKI" },
74
  { LDNS_CERT_PGP, "PGP" },
75
  { LDNS_CERT_IPKIX, "IPKIX" },
76
  { LDNS_CERT_ISPKI, "ISPKI" },
77
  { LDNS_CERT_IPGP, "IPGP" },
78
  { LDNS_CERT_ACPKIX, "ACPKIX" },
79
  { LDNS_CERT_IACPKIX, "IACPKIX" },
80
  { LDNS_CERT_URI, "URI" },
81
  { LDNS_CERT_OID, "OID" },
82
  { 0, NULL }
83
};
84
sldns_lookup_table* sldns_cert_algorithms = sldns_cert_algorithms_data;
85
86
/* if these are used elsewhere */
87
static sldns_lookup_table sldns_rcodes_data[] = {
88
  { LDNS_RCODE_NOERROR, "NOERROR" },
89
  { LDNS_RCODE_FORMERR, "FORMERR" },
90
  { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
91
  { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
92
  { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
93
  { LDNS_RCODE_REFUSED, "REFUSED" },
94
  { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
95
  { LDNS_RCODE_YXRRSET, "YXRRSET" },
96
  { LDNS_RCODE_NXRRSET, "NXRRSET" },
97
  { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
98
  { LDNS_RCODE_NOTZONE, "NOTZONE" },
99
  { 0, NULL }
100
};
101
sldns_lookup_table* sldns_rcodes = sldns_rcodes_data;
102
103
static sldns_lookup_table sldns_opcodes_data[] = {
104
  { LDNS_PACKET_QUERY, "QUERY" },
105
  { LDNS_PACKET_IQUERY, "IQUERY" },
106
  { LDNS_PACKET_STATUS, "STATUS" },
107
  { LDNS_PACKET_NOTIFY, "NOTIFY" },
108
  { LDNS_PACKET_UPDATE, "UPDATE" },
109
  { 0, NULL }
110
};
111
sldns_lookup_table* sldns_opcodes = sldns_opcodes_data;
112
113
static sldns_lookup_table sldns_wireparse_errors_data[] = {
114
  { LDNS_WIREPARSE_ERR_OK, "no parse error" },
115
  { LDNS_WIREPARSE_ERR_GENERAL, "parse error" },
116
  { LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, "Domainname length overflow" },
117
  { LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, "Domainname length underflow (zero length)" },
118
  { LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, "buffer too small" },
119
  { LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, "Label length overflow" },
120
  { LDNS_WIREPARSE_ERR_EMPTY_LABEL, "Empty label" },
121
  { LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, "Syntax error, bad escape sequence" },
122
  { LDNS_WIREPARSE_ERR_SYNTAX, "Syntax error, could not parse the RR" },
123
  { LDNS_WIREPARSE_ERR_SYNTAX_TTL, "Syntax error, could not parse the RR's TTL" },
124
  { LDNS_WIREPARSE_ERR_SYNTAX_TYPE, "Syntax error, could not parse the RR's type" },
125
  { LDNS_WIREPARSE_ERR_SYNTAX_CLASS, "Syntax error, could not parse the RR's class" },
126
  { LDNS_WIREPARSE_ERR_SYNTAX_RDATA, "Syntax error, could not parse the RR's rdata" },
127
  { LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE, "Syntax error, value expected" },
128
  { LDNS_WIREPARSE_ERR_INVALID_STR, "Conversion error, string expected" },
129
  { LDNS_WIREPARSE_ERR_SYNTAX_B64, "Conversion error, b64 encoding expected" },
130
  { LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT, "Conversion error, b32 ext encoding expected" },
131
  { LDNS_WIREPARSE_ERR_SYNTAX_HEX, "Conversion error, hex encoding expected" },
132
  { LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM, "Bad algorithm type for CERT record" },
133
  { LDNS_WIREPARSE_ERR_SYNTAX_TIME, "Conversion error, time encoding expected" },
134
  { LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, "Conversion error, time period encoding expected" },
135
  { LDNS_WIREPARSE_ERR_SYNTAX_ILNP64, "Conversion error, 4 colon separated hex numbers expected" },
136
  { LDNS_WIREPARSE_ERR_SYNTAX_EUI48,
137
    "Conversion error, 6 two character hex numbers "
138
    "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx" },
139
  { LDNS_WIREPARSE_ERR_SYNTAX_EUI64,
140
    "Conversion error, 8 two character hex numbers "
141
    "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx-xx-xx" },
142
  { LDNS_WIREPARSE_ERR_SYNTAX_TAG,
143
    "Conversion error, a non-zero sequence of US-ASCII letters "
144
    "and numbers in lower case expected" },
145
  { LDNS_WIREPARSE_ERR_NOT_IMPL, "not implemented" },
146
  { LDNS_WIREPARSE_ERR_SYNTAX_INT, "Conversion error, integer expected" },
147
  { LDNS_WIREPARSE_ERR_SYNTAX_IP4, "Conversion error, ip4 addr expected" },
148
  { LDNS_WIREPARSE_ERR_SYNTAX_IP6, "Conversion error, ip6 addr expected" },
149
  { LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW, "Syntax error, integer overflow" },
150
  { LDNS_WIREPARSE_ERR_INCLUDE, "$INCLUDE directive was seen in the zone" },
151
  { LDNS_WIREPARSE_ERR_PARENTHESIS, "Parse error, parenthesis mismatch" },
152
  { LDNS_WIREPARSE_ERR_SVCB_UNKNOWN_KEY, "Unknown SvcParamKey"},
153
  { LDNS_WIREPARSE_ERR_SVCB_MISSING_PARAM, "SvcParam is missing a SvcParamValue"},
154
  { LDNS_WIREPARSE_ERR_SVCB_DUPLICATE_KEYS, "Duplicate SVCB key found"},
155
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_TOO_MANY_KEYS, "Too many keys in mandatory" },
156
  { LDNS_WIREPARSE_ERR_SVCB_TOO_MANY_PARAMS,
157
    "Too many SvcParams. Unbound only allows 63 entries" },
158
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_MISSING_PARAM,
159
    "Mandatory SvcParamKey is missing"},
160
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_DUPLICATE_KEY,
161
    "Keys in SvcParam mandatory MUST be unique" },
162
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_IN_MANDATORY,
163
    "mandatory MUST not be included as mandatory parameter" },
164
  { LDNS_WIREPARSE_ERR_SVCB_PORT_VALUE_SYNTAX,
165
    "Could not parse port SvcParamValue" },
166
  { LDNS_WIREPARSE_ERR_SVCB_IPV4_TOO_MANY_ADDRESSES,
167
    "Too many IPv4 addresses in ipv4hint" },
168
  { LDNS_WIREPARSE_ERR_SVCB_IPV6_TOO_MANY_ADDRESSES,
169
    "Too many IPv6 addresses in ipv6hint" },
170
  { LDNS_WIREPARSE_ERR_SVCB_ALPN_KEY_TOO_LARGE,
171
    "Alpn strings need to be smaller than 255 chars"},
172
  { LDNS_WIREPARSE_ERR_SVCB_NO_DEFAULT_ALPN_VALUE,
173
    "No-default-alpn should not have a value" },
174
  { LDNS_WIREPARSE_ERR_SVCPARAM_BROKEN_RDATA,
175
    "General SVCParam error" },
176
  { 0, NULL }
177
};
178
sldns_lookup_table* sldns_wireparse_errors = sldns_wireparse_errors_data;
179
180
static sldns_lookup_table sldns_edns_flags_data[] = {
181
  { 3600, "do"},
182
  { 0, NULL}
183
};
184
sldns_lookup_table* sldns_edns_flags = sldns_edns_flags_data;
185
186
static sldns_lookup_table sldns_edns_options_data[] = {
187
  { 1, "LLQ" },
188
  { 2, "UL" },
189
  { 3, "NSID" },
190
  /* 4 draft-cheshire-edns0-owner-option */
191
  { 5, "DAU" },
192
  { 6, "DHU" },
193
  { 7, "N3U" },
194
  { 8, "edns-client-subnet" },
195
  { 10, "COOKIE" },
196
  { 11, "edns-tcp-keepalive"},
197
  { 12, "Padding" },
198
  { 15, "EDE"},
199
  { 0, NULL}
200
};
201
sldns_lookup_table* sldns_edns_options = sldns_edns_options_data;
202
203
/* From RFC8914 5.2 Table 3, the "Extended DNS Error Codes" registry. */
204
static sldns_lookup_table sldns_edns_ede_codes_data[] = {
205
  { LDNS_EDE_NONE, "None" },
206
  { LDNS_EDE_OTHER, "Other Error" },
207
  { LDNS_EDE_UNSUPPORTED_DNSKEY_ALG, "Unsupported DNSKEY Algorithm" },
208
  { LDNS_EDE_UNSUPPORTED_DS_DIGEST, "Unsupported DS Digest Type" },
209
  { LDNS_EDE_STALE_ANSWER, "Stale Answer" },
210
  { LDNS_EDE_FORGED_ANSWER, "Forged Answer" },
211
  { LDNS_EDE_DNSSEC_INDETERMINATE, "DNSSEC Indeterminate" },
212
  { LDNS_EDE_DNSSEC_BOGUS, "DNSSEC Bogus" },
213
  { LDNS_EDE_SIGNATURE_EXPIRED, "Signature Expired" },
214
  { LDNS_EDE_SIGNATURE_NOT_YET_VALID, "Signature Not Yet Valid" },
215
  { LDNS_EDE_DNSKEY_MISSING, "DNSKEY Missing" },
216
  { LDNS_EDE_RRSIGS_MISSING, "RRSIGs Missing" },
217
  { LDNS_EDE_NO_ZONE_KEY_BIT_SET, "No Zone Key Bit Set" },
218
  { LDNS_EDE_NSEC_MISSING, "NSEC Missing" },
219
  { LDNS_EDE_CACHED_ERROR, "Cached Error" },
220
  { LDNS_EDE_NOT_READY, "Not Ready" },
221
  { LDNS_EDE_BLOCKED, "Blocked" },
222
  { LDNS_EDE_CENSORED, "Censored" },
223
  { LDNS_EDE_FILTERED, "Filtered" },
224
  { LDNS_EDE_PROHIBITED, "Prohibited" },
225
  { LDNS_EDE_STALE_NXDOMAIN_ANSWER, "Stale NXDOMAIN Answer" },
226
  { LDNS_EDE_NOT_AUTHORITATIVE, "Not Authoritative" },
227
  { LDNS_EDE_NOT_SUPPORTED, "Not Supported" },
228
  { LDNS_EDE_NO_REACHABLE_AUTHORITY, "No Reachable Authority" },
229
  { LDNS_EDE_NETWORK_ERROR, "Network Error" },
230
  { LDNS_EDE_INVALID_DATA, "Invalid Data" },
231
  { LDNS_EDE_SIGNATURE_EXPIRED_BEFORE_VALID, "Signature Expired Before Valid" },
232
  { LDNS_EDE_TOO_EARLY, "Non-Replayable Transactions Received in 0-RTT Data" },
233
  { LDNS_EDE_UNSUPPORTED_NSEC3_ITERATIONS, "Unsupported NSEC3 Iterations Value" },
234
  { LDNS_EDE_BADPROXYPOLICY, "Unable to Conform to Policy" },
235
  { LDNS_EDE_SYNTHESIZED, "Synthesized Answer" },
236
  { 0, NULL}
237
};
238
sldns_lookup_table* sldns_edns_ede_codes = sldns_edns_ede_codes_data;
239
240
static sldns_lookup_table sldns_tsig_errors_data[] = {
241
  { LDNS_TSIG_ERROR_NOERROR, "NOERROR" },
242
  { LDNS_RCODE_FORMERR, "FORMERR" },
243
  { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
244
  { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
245
  { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
246
  { LDNS_RCODE_REFUSED, "REFUSED" },
247
  { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
248
  { LDNS_RCODE_YXRRSET, "YXRRSET" },
249
  { LDNS_RCODE_NXRRSET, "NXRRSET" },
250
  { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
251
  { LDNS_RCODE_NOTZONE, "NOTZONE" },
252
  { LDNS_TSIG_ERROR_BADSIG, "BADSIG" },
253
  { LDNS_TSIG_ERROR_BADKEY, "BADKEY" },
254
  { LDNS_TSIG_ERROR_BADTIME, "BADTIME" },
255
  { LDNS_TSIG_ERROR_BADMODE, "BADMODE" },
256
  { LDNS_TSIG_ERROR_BADNAME, "BADNAME" },
257
  { LDNS_TSIG_ERROR_BADALG, "BADALG" },
258
  { 0, NULL }
259
};
260
sldns_lookup_table* sldns_tsig_errors = sldns_tsig_errors_data;
261
262
/* draft-ietf-dnsop-svcb-https-06: 6. Initial SvcParamKeys */
263
const char *svcparamkey_strs[] = {
264
  "mandatory", "alpn", "no-default-alpn", "port",
265
  "ipv4hint", "ech", "ipv6hint", "dohpath"
266
};
267
268
char* sldns_wire2str_pkt(uint8_t* data, size_t len)
269
0
{
270
0
  size_t slen = (size_t)sldns_wire2str_pkt_buf(data, len, NULL, 0);
271
0
  char* result = (char*)malloc(slen+1);
272
0
  if(!result) return NULL;
273
0
  sldns_wire2str_pkt_buf(data, len, result, slen+1);
274
0
  return result;
275
0
}
276
277
char* sldns_wire2str_rr(uint8_t* rr, size_t len)
278
0
{
279
0
  size_t slen = (size_t)sldns_wire2str_rr_buf(rr, len, NULL, 0);
280
0
  char* result = (char*)malloc(slen+1);
281
0
  if(!result) return NULL;
282
0
  sldns_wire2str_rr_buf(rr, len, result, slen+1);
283
0
  return result;
284
0
}
285
286
char* sldns_wire2str_type(uint16_t rrtype)
287
0
{
288
0
  char buf[16];
289
0
  sldns_wire2str_type_buf(rrtype, buf, sizeof(buf));
290
0
  return strdup(buf);
291
0
}
292
293
char* sldns_wire2str_class(uint16_t rrclass)
294
0
{
295
0
  char buf[16];
296
0
  sldns_wire2str_class_buf(rrclass, buf, sizeof(buf));
297
0
  return strdup(buf);
298
0
}
299
300
char* sldns_wire2str_dname(uint8_t* dname, size_t dname_len)
301
0
{
302
0
  size_t slen=(size_t)sldns_wire2str_dname_buf(dname, dname_len, NULL, 0);
303
0
  char* result = (char*)malloc(slen+1);
304
0
  if(!result) return NULL;
305
0
  sldns_wire2str_dname_buf(dname, dname_len, result, slen+1);
306
0
  return result;
307
0
}
308
309
char* sldns_wire2str_rcode(int rcode)
310
0
{
311
0
  char buf[16];
312
0
  sldns_wire2str_rcode_buf(rcode, buf, sizeof(buf));
313
0
  return strdup(buf);
314
0
}
315
316
int sldns_wire2str_pkt_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
317
0
{
318
  /* use arguments as temporary variables */
319
0
  return sldns_wire2str_pkt_scan(&d, &dlen, &s, &slen);
320
0
}
321
322
int sldns_wire2str_rr_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
323
0
{
324
  /* use arguments as temporary variables */
325
0
  return sldns_wire2str_rr_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
326
0
}
327
328
int sldns_wire2str_rrquestion_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
329
0
{
330
  /* use arguments as temporary variables */
331
0
  return sldns_wire2str_rrquestion_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
332
0
}
333
334
int sldns_wire2str_rdata_buf(uint8_t* rdata, size_t rdata_len, char* str,
335
  size_t str_len, uint16_t rrtype)
336
0
{
337
  /* use arguments as temporary variables */
338
0
  return sldns_wire2str_rdata_scan(&rdata, &rdata_len, &str, &str_len,
339
0
    rrtype, NULL, 0, NULL);
340
0
}
341
342
int sldns_wire2str_rr_unknown_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
343
0
{
344
  /* use arguments as temporary variables */
345
0
  return sldns_wire2str_rr_unknown_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
346
0
}
347
348
int sldns_wire2str_rr_comment_buf(uint8_t* rr, size_t rrlen, size_t dname_len,
349
  char* s, size_t slen)
350
0
{
351
0
  uint16_t rrtype = sldns_wirerr_get_type(rr, rrlen, dname_len);
352
0
  return sldns_wire2str_rr_comment_print(&s, &slen, rr, rrlen, dname_len,
353
0
    rrtype);
354
0
}
355
356
int sldns_wire2str_type_buf(uint16_t rrtype, char* s, size_t slen)
357
0
{
358
  /* use arguments as temporary variables */
359
0
  return sldns_wire2str_type_print(&s, &slen, rrtype);
360
0
}
361
362
int sldns_wire2str_class_buf(uint16_t rrclass, char* s, size_t slen)
363
0
{
364
  /* use arguments as temporary variables */
365
0
  return sldns_wire2str_class_print(&s, &slen, rrclass);
366
0
}
367
368
int sldns_wire2str_rcode_buf(int rcode, char* s, size_t slen)
369
0
{
370
  /* use arguments as temporary variables */
371
0
  return sldns_wire2str_rcode_print(&s, &slen, rcode);
372
0
}
373
374
int sldns_wire2str_opcode_buf(int opcode, char* s, size_t slen)
375
0
{
376
  /* use arguments as temporary variables */
377
0
  return sldns_wire2str_opcode_print(&s, &slen, opcode);
378
0
}
379
380
int sldns_wire2str_dname_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
381
0
{
382
  /* use arguments as temporary variables */
383
0
  return sldns_wire2str_dname_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
384
0
}
385
386
int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args)
387
1.19G
{
388
1.19G
  int w = vsnprintf(*str, *slen, format, args);
389
1.19G
  if(w < 0) {
390
    /* error in printout */
391
0
    return 0;
392
1.19G
  } else if((size_t)w >= *slen) {
393
1.19G
    *str = NULL; /* we do not want str to point outside of buffer*/
394
1.19G
    *slen = 0;
395
1.19G
  } else {
396
1.42M
    *str += w;
397
1.42M
    *slen -= w;
398
1.42M
  }
399
1.19G
  return w;
400
1.19G
}
401
402
int sldns_str_print(char** str, size_t* slen, const char* format, ...)
403
1.19G
{
404
1.19G
  int w;
405
1.19G
  va_list args;
406
1.19G
  va_start(args, format);
407
1.19G
  w = sldns_str_vprint(str, slen, format, args);
408
1.19G
  va_end(args);
409
1.19G
  return w;
410
1.19G
}
411
412
/** print hex format into text buffer for specified length */
413
static int print_hex_buf(char** s, size_t* slen, uint8_t* buf, size_t len)
414
129k
{
415
129k
  const char* hex = "0123456789ABCDEF";
416
129k
  size_t i;
417
581M
  for(i=0; i<len; i++) {
418
580M
    (void)sldns_str_print(s, slen, "%c%c", hex[(buf[i]&0xf0)>>4],
419
580M
      hex[buf[i]&0x0f]);
420
580M
  }
421
129k
  return (int)len*2;
422
129k
}
423
424
/** print remainder of buffer in hex format with prefixed text */
425
static int print_remainder_hex(const char* pref, uint8_t** d, size_t* dlen,
426
  char** s, size_t* slen)
427
5.33k
{
428
5.33k
  int w = 0;
429
5.33k
  w += sldns_str_print(s, slen, "%s", pref);
430
5.33k
  w += print_hex_buf(s, slen, *d, *dlen);
431
5.33k
  *d += *dlen;
432
5.33k
  *dlen = 0;
433
5.33k
  return w;
434
5.33k
}
435
436
int sldns_wire2str_pkt_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
437
4.30k
{
438
4.30k
  int w = 0, comprloop = 0;
439
4.30k
  unsigned qdcount, ancount, nscount, arcount, i;
440
4.30k
  uint8_t* pkt = *d;
441
4.30k
  size_t pktlen = *dlen;
442
4.30k
  if(*dlen >= LDNS_HEADER_SIZE) {
443
4.03k
    qdcount = (unsigned)LDNS_QDCOUNT(*d);
444
4.03k
    ancount = (unsigned)LDNS_ANCOUNT(*d);
445
4.03k
    nscount = (unsigned)LDNS_NSCOUNT(*d);
446
4.03k
    arcount = (unsigned)LDNS_ARCOUNT(*d);
447
4.03k
  } else {
448
268
    qdcount = ancount = nscount = arcount = 0;
449
268
  }
450
4.30k
  w += sldns_wire2str_header_scan(d, dlen, s, slen);
451
4.30k
  w += sldns_str_print(s, slen, "\n");
452
4.30k
  w += sldns_str_print(s, slen, ";; QUESTION SECTION:\n");
453
560k
  for(i=0; i<qdcount; i++) {
454
557k
    w += sldns_wire2str_rrquestion_scan(d, dlen, s, slen,
455
557k
      pkt, pktlen, &comprloop);
456
557k
    if(!*dlen) break;
457
557k
  }
458
4.30k
  w += sldns_str_print(s, slen, "\n");
459
4.30k
  w += sldns_str_print(s, slen, ";; ANSWER SECTION:\n");
460
104k
  for(i=0; i<ancount; i++) {
461
103k
    w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
462
103k
    if(!*dlen) break;
463
103k
  }
464
4.30k
  w += sldns_str_print(s, slen, "\n");
465
4.30k
  w += sldns_str_print(s, slen, ";; AUTHORITY SECTION:\n");
466
125k
  for(i=0; i<nscount; i++) {
467
124k
    w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
468
124k
    if(!*dlen) break;
469
124k
  }
470
4.30k
  w += sldns_str_print(s, slen, "\n");
471
4.30k
  w += sldns_str_print(s, slen, ";; ADDITIONAL SECTION:\n");
472
179k
  for(i=0; i<arcount; i++) {
473
178k
    w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
474
178k
    if(!*dlen) break;
475
178k
  }
476
  /* other fields: WHEN(time), SERVER(IP) not available here. */
477
4.30k
  w += sldns_str_print(s, slen, ";; MSG SIZE  rcvd: %d\n", (int)pktlen);
478
4.30k
  if(*dlen > 0) {
479
62
    w += print_remainder_hex(";; trailing garbage 0x",
480
62
      d, dlen, s, slen);
481
62
    w += sldns_str_print(s, slen, "\n");
482
62
  }
483
4.30k
  return w;
484
4.30k
}
485
486
/** scan type, class and ttl and printout, for rr */
487
static int sldns_rr_tcttl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
488
396k
{
489
396k
  int w = 0;
490
396k
  uint16_t t, c;
491
396k
  uint32_t ttl;
492
396k
  if(*dl < 8) {
493
0
    if(*dl < 4)
494
0
      return w + print_remainder_hex("; Error malformed 0x",
495
0
        d, dl, s, sl);
496
    /* these print values or 0x.. if none left */
497
0
    t = sldns_read_uint16(*d);
498
0
    c = sldns_read_uint16((*d)+2);
499
0
    (*d)+=4;
500
0
    (*dl)-=4;
501
0
    w += sldns_wire2str_class_print(s, sl, c);
502
0
    w += sldns_str_print(s, sl, "\t");
503
0
    w += sldns_wire2str_type_print(s, sl, t);
504
0
    if(*dl == 0)
505
0
      return w + sldns_str_print(s, sl, "; Error no ttl");
506
0
    return w + print_remainder_hex(
507
0
      "; Error malformed ttl 0x", d, dl, s, sl);
508
0
  }
509
396k
  t = sldns_read_uint16(*d);
510
396k
  c = sldns_read_uint16((*d)+2);
511
396k
  ttl = sldns_read_uint32((*d)+4);
512
396k
  (*d)+=8;
513
396k
  (*dl)-=8;
514
396k
  w += sldns_str_print(s, sl, "%lu\t", (unsigned long)ttl);
515
396k
  w += sldns_wire2str_class_print(s, sl, c);
516
396k
  w += sldns_str_print(s, sl, "\t");
517
396k
  w += sldns_wire2str_type_print(s, sl, t);
518
396k
  return w;
519
396k
}
520
521
int sldns_wire2str_rr_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
522
  uint8_t* pkt, size_t pktlen, int* comprloop)
523
405k
{
524
405k
  int w = 0;
525
405k
  uint8_t* rr = *d;
526
405k
  size_t rrlen = *dlen, dname_off, rdlen, ordlen;
527
405k
  uint16_t rrtype = 0;
528
529
405k
  if(*dlen >= 3 && (*d)[0]==0 &&
530
405k
    sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
531
    /* perform EDNS OPT processing */
532
3.14k
    return sldns_wire2str_edns_scan(d, dlen, s, slen, pkt, pktlen);
533
3.14k
  }
534
535
  /* try to scan the rdata with pretty-printing, but if that fails, then
536
   * scan the rdata as an unknown RR type */
537
402k
  w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
538
402k
  w += sldns_str_print(s, slen, "\t");
539
402k
  dname_off = rrlen-(*dlen);
540
402k
  if(*dlen == 4) {
541
    /* like a question-RR */
542
21
    uint16_t t = sldns_read_uint16(*d);
543
21
    uint16_t c = sldns_read_uint16((*d)+2);
544
21
    (*d)+=4;
545
21
    (*dlen)-=4;
546
21
    w += sldns_wire2str_class_print(s, slen, c);
547
21
    w += sldns_str_print(s, slen, "\t");
548
21
    w += sldns_wire2str_type_print(s, slen, t);
549
21
    w += sldns_str_print(s, slen, " ; Error no ttl,rdata\n");
550
21
    return w;
551
21
  }
552
402k
  if(*dlen < 8) {
553
6.30k
    if(*dlen == 0)
554
6.11k
      return w + sldns_str_print(s, slen, ";Error missing RR\n");
555
189
    w += print_remainder_hex(";Error partial RR 0x", d, dlen, s, slen);
556
189
    return w + sldns_str_print(s, slen, "\n");
557
6.30k
  }
558
396k
  rrtype = sldns_read_uint16(*d);
559
396k
  w += sldns_rr_tcttl_scan(d, dlen, s, slen);
560
396k
  w += sldns_str_print(s, slen, "\t");
561
562
  /* rdata */
563
396k
  if(*dlen < 2) {
564
44
    if(*dlen == 0)
565
29
      return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
566
15
    w += print_remainder_hex(";Error missing rdatalen 0x",
567
15
      d, dlen, s, slen);
568
15
    return w + sldns_str_print(s, slen, "\n");
569
44
  }
570
396k
  rdlen = sldns_read_uint16(*d);
571
396k
  ordlen = rdlen;
572
396k
  (*d)+=2;
573
396k
  (*dlen)-=2;
574
396k
  if(*dlen < rdlen) {
575
564
    w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
576
564
    if(*dlen == 0)
577
21
      return w + sldns_str_print(s, slen, ";Error missing rdata\n");
578
543
    w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
579
543
    return w + sldns_str_print(s, slen, "\n");
580
564
  }
581
395k
  w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen,
582
395k
    comprloop);
583
395k
  (*dlen) -= (ordlen-rdlen);
584
585
  /* default comment */
586
395k
  w += sldns_wire2str_rr_comment_print(s, slen, rr, rrlen, dname_off,
587
395k
    rrtype);
588
395k
  w += sldns_str_print(s, slen, "\n");
589
395k
  return w;
590
396k
}
591
592
int sldns_wire2str_rrquestion_scan(uint8_t** d, size_t* dlen, char** s,
593
  size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
594
557k
{
595
557k
  int w = 0;
596
557k
  uint16_t t, c;
597
557k
  w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
598
557k
  w += sldns_str_print(s, slen, "\t");
599
557k
  if(*dlen < 4) {
600
448
    if(*dlen == 0)
601
312
      return w + sldns_str_print(s, slen, "Error malformed\n");
602
136
    w += print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
603
136
    return w + sldns_str_print(s, slen, "\n");
604
448
  }
605
556k
  t = sldns_read_uint16(*d);
606
556k
  c = sldns_read_uint16((*d)+2);
607
556k
  (*d)+=4;
608
556k
  (*dlen)-=4;
609
556k
  w += sldns_wire2str_class_print(s, slen, c);
610
556k
  w += sldns_str_print(s, slen, "\t");
611
556k
  w += sldns_wire2str_type_print(s, slen, t);
612
556k
  w += sldns_str_print(s, slen, "\n");
613
556k
  return w;
614
557k
}
615
616
int sldns_wire2str_rr_unknown_scan(uint8_t** d, size_t* dlen, char** s,
617
  size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
618
0
{
619
0
  size_t rdlen, ordlen;
620
0
  int w = 0;
621
0
  w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
622
0
  w += sldns_str_print(s, slen, "\t");
623
0
  w += sldns_rr_tcttl_scan(d, dlen, s, slen);
624
0
  w += sldns_str_print(s, slen, "\t");
625
0
  if(*dlen < 2) {
626
0
    if(*dlen == 0)
627
0
      return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
628
0
    w += print_remainder_hex(";Error missing rdatalen 0x",
629
0
      d, dlen, s, slen);
630
0
    return w + sldns_str_print(s, slen, "\n");
631
0
  }
632
0
  rdlen = sldns_read_uint16(*d);
633
0
  ordlen = rdlen;
634
0
  (*d) += 2;
635
0
  (*dlen) -= 2;
636
0
  if(*dlen < rdlen) {
637
0
    w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
638
0
    if(*dlen == 0)
639
0
      return w + sldns_str_print(s, slen, ";Error missing rdata\n");
640
0
    w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
641
0
    return w + sldns_str_print(s, slen, "\n");
642
0
  }
643
0
  w += sldns_wire2str_rdata_unknown_scan(d, &rdlen, s, slen);
644
0
  (*dlen) -= (ordlen-rdlen);
645
0
  w += sldns_str_print(s, slen, "\n");
646
0
  return w;
647
0
}
648
649
/** print rr comment for type DNSKEY */
650
static int rr_comment_dnskey(char** s, size_t* slen, uint8_t* rr,
651
  size_t rrlen, size_t dname_off)
652
7.26k
{
653
7.26k
  size_t rdlen;
654
7.26k
  uint8_t* rdata;
655
7.26k
  int flags, w = 0;
656
7.26k
  if(rrlen < dname_off + 10) return 0;
657
7.26k
  rdlen = sldns_read_uint16(rr+dname_off+8);
658
7.26k
  if(rrlen < dname_off + 10 + rdlen) return 0;
659
7.26k
  if(rdlen < 2) return 0;
660
6.69k
  rdata = rr + dname_off + 10;
661
6.69k
  flags = (int)sldns_read_uint16(rdata);
662
6.69k
  w += sldns_str_print(s, slen, " ;{");
663
664
  /* id */
665
6.69k
  w += sldns_str_print(s, slen, "id = %u",
666
6.69k
    sldns_calc_keytag_raw(rdata, rdlen));
667
668
  /* flags */
669
6.69k
  if((flags&LDNS_KEY_ZONE_KEY)) {
670
3.43k
    if((flags&LDNS_KEY_SEP_KEY))
671
2.36k
      w += sldns_str_print(s, slen, " (ksk)");
672
1.07k
    else  w += sldns_str_print(s, slen, " (zsk)");
673
3.43k
  }
674
675
  /* keysize */
676
6.69k
  if(rdlen > 4) {
677
5.57k
    w += sldns_str_print(s, slen, ", ");
678
5.57k
    w += sldns_str_print(s, slen, "size = %db",
679
5.57k
      (int)sldns_rr_dnskey_key_size_raw(
680
5.57k
      (unsigned char*)rdata+4, rdlen-4, (int)(rdata[3])));
681
5.57k
  }
682
683
6.69k
  w += sldns_str_print(s, slen, "}");
684
6.69k
  return w;
685
7.26k
}
686
687
/** print rr comment for type RRSIG */
688
static int rr_comment_rrsig(char** s, size_t* slen, uint8_t* rr,
689
  size_t rrlen, size_t dname_off)
690
1.90k
{
691
1.90k
  size_t rdlen;
692
1.90k
  uint8_t* rdata;
693
1.90k
  if(rrlen < dname_off + 10) return 0;
694
1.90k
  rdlen = sldns_read_uint16(rr+dname_off+8);
695
1.90k
  if(rrlen < dname_off + 10 + rdlen) return 0;
696
1.90k
  rdata = rr + dname_off + 10;
697
1.90k
  if(rdlen < 18) return 0;
698
844
  return sldns_str_print(s, slen, " ;{id = %d}",
699
844
    (int)sldns_read_uint16(rdata+16));
700
1.90k
}
701
702
/** print rr comment for type NSEC3 */
703
static int rr_comment_nsec3(char** s, size_t* slen, uint8_t* rr,
704
  size_t rrlen, size_t dname_off)
705
3.98k
{
706
3.98k
  size_t rdlen;
707
3.98k
  uint8_t* rdata;
708
3.98k
  int w = 0;
709
3.98k
  if(rrlen < dname_off + 10) return 0;
710
3.98k
  rdlen = sldns_read_uint16(rr+dname_off+8);
711
3.98k
  if(rrlen < dname_off + 10 + rdlen) return 0;
712
3.98k
  rdata = rr + dname_off + 10;
713
3.98k
  if(rdlen < 2) return 0;
714
3.25k
  if((rdata[1] & LDNS_NSEC3_VARS_OPTOUT_MASK))
715
1.30k
    w += sldns_str_print(s, slen, " ;{flags: optout}");
716
3.25k
  return w;
717
3.98k
}
718
719
int sldns_wire2str_rr_comment_print(char** s, size_t* slen, uint8_t* rr,
720
  size_t rrlen, size_t dname_off, uint16_t rrtype)
721
395k
{
722
395k
  if(rrtype == LDNS_RR_TYPE_DNSKEY) {
723
7.26k
    return rr_comment_dnskey(s, slen, rr, rrlen, dname_off);
724
388k
  } else if(rrtype == LDNS_RR_TYPE_RRSIG) {
725
1.90k
    return rr_comment_rrsig(s, slen, rr, rrlen, dname_off);
726
386k
  } else if(rrtype == LDNS_RR_TYPE_NSEC3) {
727
3.98k
    return rr_comment_nsec3(s, slen, rr, rrlen, dname_off);
728
3.98k
  }
729
382k
  return 0;
730
395k
}
731
732
int sldns_wire2str_header_scan(uint8_t** d, size_t* dlen, char** s,
733
  size_t* slen)
734
8.60k
{
735
8.60k
  int w = 0;
736
8.60k
  int opcode, rcode;
737
8.60k
  w += sldns_str_print(s, slen, ";; ->>HEADER<<- ");
738
8.60k
  if(*dlen == 0)
739
0
    return w+sldns_str_print(s, slen, "Error empty packet");
740
8.60k
  if(*dlen < 4)
741
198
    return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
742
8.40k
  opcode = (int)LDNS_OPCODE_WIRE(*d);
743
8.40k
  rcode = (int)LDNS_RCODE_WIRE(*d);
744
8.40k
  w += sldns_str_print(s, slen, "opcode: ");
745
8.40k
  w += sldns_wire2str_opcode_print(s, slen, opcode);
746
8.40k
  w += sldns_str_print(s, slen, ", ");
747
8.40k
  w += sldns_str_print(s, slen, "rcode: ");
748
8.40k
  w += sldns_wire2str_rcode_print(s, slen, rcode);
749
8.40k
  w += sldns_str_print(s, slen, ", ");
750
8.40k
  w += sldns_str_print(s, slen, "id: %d\n", (int)LDNS_ID_WIRE(*d));
751
8.40k
  w += sldns_str_print(s, slen, ";; flags:");
752
8.40k
  if(LDNS_QR_WIRE(*d)) w += sldns_str_print(s, slen, " qr");
753
8.40k
  if(LDNS_AA_WIRE(*d)) w += sldns_str_print(s, slen, " aa");
754
8.40k
  if(LDNS_TC_WIRE(*d)) w += sldns_str_print(s, slen, " tc");
755
8.40k
  if(LDNS_RD_WIRE(*d)) w += sldns_str_print(s, slen, " rd");
756
8.40k
  if(LDNS_CD_WIRE(*d)) w += sldns_str_print(s, slen, " cd");
757
8.40k
  if(LDNS_RA_WIRE(*d)) w += sldns_str_print(s, slen, " ra");
758
8.40k
  if(LDNS_AD_WIRE(*d)) w += sldns_str_print(s, slen, " ad");
759
8.40k
  if(LDNS_Z_WIRE(*d))  w += sldns_str_print(s, slen, " z");
760
8.40k
  w += sldns_str_print(s, slen, " ; ");
761
8.40k
  if(*dlen < LDNS_HEADER_SIZE)
762
338
    return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
763
8.06k
  w += sldns_str_print(s, slen, "QUERY: %d, ", (int)LDNS_QDCOUNT(*d));
764
8.06k
  w += sldns_str_print(s, slen, "ANSWER: %d, ", (int)LDNS_ANCOUNT(*d));
765
8.06k
  w += sldns_str_print(s, slen, "AUTHORITY: %d, ", (int)LDNS_NSCOUNT(*d));
766
8.06k
  w += sldns_str_print(s, slen, "ADDITIONAL: %d ", (int)LDNS_ARCOUNT(*d));
767
8.06k
  *d += LDNS_HEADER_SIZE;
768
8.06k
  *dlen -= LDNS_HEADER_SIZE;
769
8.06k
  return w;
770
8.40k
}
771
772
int sldns_wire2str_rdata_scan(uint8_t** d, size_t* dlen, char** s,
773
  size_t* slen, uint16_t rrtype, uint8_t* pkt, size_t pktlen,
774
  int* comprloop)
775
395k
{
776
  /* try to prettyprint, but if that fails, use unknown format */
777
395k
  uint8_t* origd = *d;
778
395k
  char* origs = *s;
779
395k
  size_t origdlen = *dlen, origslen = *slen;
780
395k
  size_t r_cnt, r_max;
781
395k
  sldns_rdf_type rdftype;
782
395k
  int w = 0, n;
783
784
395k
  const sldns_rr_descriptor *desc = sldns_rr_descript(rrtype);
785
395k
  if(!desc) /* unknown format */
786
0
    return sldns_wire2str_rdata_unknown_scan(d, dlen, s, slen);
787
  /* dlen equals the rdatalen for the rdata */
788
789
395k
  r_max = sldns_rr_descriptor_maximum(desc);
790
714k
  for(r_cnt=0; r_cnt < r_max; r_cnt++) {
791
685k
    if(*dlen == 0) {
792
340k
      if(r_cnt < sldns_rr_descriptor_minimum(desc))
793
9.91k
        goto failed;
794
330k
      break; /* nothing more to print */
795
340k
    }
796
345k
    rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
797
345k
    if(r_cnt != 0)
798
282k
      w += sldns_str_print(s, slen, " ");
799
345k
    n = sldns_wire2str_rdf_scan(d, dlen, s, slen, rdftype,
800
345k
      pkt, pktlen, comprloop);
801
345k
    if(n == -1) {
802
40.6k
    failed:
803
      /* failed, use unknown format */
804
40.6k
      *d = origd; *s = origs;
805
40.6k
      *dlen = origdlen; *slen = origslen;
806
40.6k
      return sldns_wire2str_rdata_unknown_scan(d, dlen,
807
40.6k
        s, slen);
808
26.5k
    }
809
318k
    w += n;
810
318k
  }
811
359k
  if(*dlen != 0) {
812
4.19k
    goto failed;
813
4.19k
  }
814
355k
  return w;
815
359k
}
816
817
int sldns_wire2str_rdata_unknown_scan(uint8_t** d, size_t* dlen, char** s,
818
  size_t* slen)
819
54.2k
{
820
54.2k
  int w = 0;
821
822
  /* print length */
823
54.2k
  w += sldns_str_print(s, slen, "\\# %u", (unsigned)*dlen);
824
825
  /* print rdlen in hex */
826
54.2k
  if(*dlen != 0)
827
48.0k
    w += sldns_str_print(s, slen, " ");
828
54.2k
  w += print_hex_buf(s, slen, *d, *dlen);
829
54.2k
  (*d) += *dlen;
830
54.2k
  (*dlen) = 0;
831
54.2k
  return w;
832
54.2k
}
833
834
/** print and escape one character for a domain dname */
835
static int dname_char_print(char** s, size_t* slen, uint8_t c)
836
7.34M
{
837
7.34M
  if(c == '.' || c == ';' || c == '(' || c == ')' || c == '\\')
838
38.8k
    return sldns_str_print(s, slen, "\\%c", c);
839
7.30M
  else if(!(isascii((unsigned char)c) && isgraph((unsigned char)c)))
840
1.77M
    return sldns_str_print(s, slen, "\\%03u", (unsigned)c);
841
  /* plain printout */
842
5.53M
  if(*slen) {
843
334
    **s = (char)c;
844
334
    (*s)++;
845
334
    (*slen)--;
846
334
  }
847
5.53M
  return 1;
848
7.34M
}
849
850
int sldns_wire2str_dname_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
851
  uint8_t* pkt, size_t pktlen, int* comprloop)
852
1.05M
{
853
1.05M
  int w = 0;
854
  /* spool labels onto the string, use compression if its there */
855
1.05M
  uint8_t* pos = *d;
856
1.05M
  unsigned i, counter=0;
857
1.05M
  unsigned maxcompr = MAX_COMPRESS_PTRS; /* loop detection, max compr ptrs */
858
1.05M
  int in_buf = 1;
859
1.05M
  size_t dname_len = 0;
860
1.05M
  if(comprloop) {
861
1.05M
    if(*comprloop != 0)
862
47.4k
      maxcompr = 30; /* for like ipv6 reverse name, per label */
863
1.05M
    if(*comprloop > 4)
864
44.1k
      maxcompr = 4; /* just don't want to spend time, any more */
865
1.05M
  }
866
1.05M
  if(*dlen == 0) return sldns_str_print(s, slen, "ErrorMissingDname");
867
1.04M
  if(*pos == 0) {
868
828k
    (*d)++;
869
828k
    (*dlen)--;
870
828k
    return sldns_str_print(s, slen, ".");
871
828k
  }
872
701k
  while((!pkt || pos < pkt+pktlen) && *pos) {
873
    /* read label length */
874
589k
    uint8_t labellen = *pos++;
875
589k
    if(in_buf) { (*d)++; (*dlen)--; }
876
877
    /* find out what sort of label we have */
878
589k
    if((labellen&0xc0) == 0xc0) {
879
      /* compressed */
880
149k
      uint16_t target = 0;
881
149k
      if(in_buf && *dlen == 0)
882
305
        return w + sldns_str_print(s, slen,
883
305
          "ErrorPartialDname");
884
149k
      else if(!in_buf && pos+1 > pkt+pktlen)
885
216
        return w + sldns_str_print(s, slen,
886
216
          "ErrorPartialDname");
887
149k
      target = ((labellen&0x3f)<<8) | *pos;
888
149k
      if(in_buf) { (*d)++; (*dlen)--; }
889
      /* move to target, if possible */
890
149k
      if(!pkt || target >= pktlen)
891
6.79k
        return w + sldns_str_print(s, slen,
892
6.79k
          "ErrorComprPtrOutOfBounds");
893
142k
      if(counter++ > maxcompr) {
894
11.2k
        if(comprloop && *comprloop < 10)
895
278
          (*comprloop)++;
896
11.2k
        return w + sldns_str_print(s, slen,
897
11.2k
          "ErrorComprPtrLooped");
898
11.2k
      }
899
131k
      in_buf = 0;
900
131k
      pos = pkt+target;
901
131k
      continue;
902
439k
    } else if((labellen&0xc0)) {
903
      /* notimpl label type */
904
65.0k
      w += sldns_str_print(s, slen,
905
65.0k
        "ErrorLABELTYPE%xIsUnknown",
906
65.0k
        (int)(labellen&0xc0));
907
65.0k
      return w;
908
65.0k
    }
909
910
    /* spool label characters, end with '.' */
911
374k
    if(in_buf && *dlen < (size_t)labellen)
912
1.09k
      labellen = (uint8_t)*dlen;
913
373k
    else if(!in_buf && pos+(size_t)labellen > pkt+pktlen)
914
334
      labellen = (uint8_t)(pkt + pktlen - pos);
915
374k
    dname_len += ((size_t)labellen)+1;
916
374k
    if(dname_len > LDNS_MAX_DOMAINLEN) {
917
      /* dname_len counts the uncompressed length we have
918
       * seen so far, and the domain name has become too
919
       * long, prevent the loop from printing overly long
920
       * content. */
921
22.7k
      w += sldns_str_print(s, slen,
922
22.7k
        "ErrorDomainNameTooLong");
923
22.7k
      return w;
924
22.7k
    }
925
7.69M
    for(i=0; i<(unsigned)labellen; i++) {
926
7.34M
      w += dname_char_print(s, slen, *pos++);
927
7.34M
    }
928
351k
    if(in_buf) {
929
238k
      (*d) += labellen;
930
238k
      (*dlen) -= labellen;
931
238k
      if(*dlen == 0) break;
932
238k
    }
933
350k
    w += sldns_str_print(s, slen, ".");
934
350k
  }
935
  /* skip over final root label */
936
113k
  if(in_buf && *dlen > 0) { (*d)++; (*dlen)--; }
937
  /* in case we printed no labels, terminate dname */
938
113k
  if(w == 0) w += sldns_str_print(s, slen, ".");
939
113k
  return w;
940
220k
}
941
942
int sldns_wire2str_opcode_print(char** s, size_t* slen, int opcode)
943
8.40k
{
944
8.40k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_opcodes, opcode);
945
8.40k
  if (lt && lt->name) {
946
5.97k
    return sldns_str_print(s, slen, "%s", lt->name);
947
5.97k
  }
948
2.43k
  return sldns_str_print(s, slen, "OPCODE%u", (unsigned)opcode);
949
8.40k
}
950
951
int sldns_wire2str_rcode_print(char** s, size_t* slen, int rcode)
952
8.40k
{
953
8.40k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rcodes, rcode);
954
8.40k
  if (lt && lt->name) {
955
7.09k
    return sldns_str_print(s, slen, "%s", lt->name);
956
7.09k
  }
957
1.31k
  return sldns_str_print(s, slen, "RCODE%u", (unsigned)rcode);
958
8.40k
}
959
960
int sldns_wire2str_class_print(char** s, size_t* slen, uint16_t rrclass)
961
952k
{
962
952k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rr_classes,
963
952k
    (int)rrclass);
964
952k
  if (lt && lt->name) {
965
34.7k
    return sldns_str_print(s, slen, "%s", lt->name);
966
34.7k
  }
967
918k
  return sldns_str_print(s, slen, "CLASS%u", (unsigned)rrclass);
968
952k
}
969
970
int sldns_wire2str_type_print(char** s, size_t* slen, uint16_t rrtype)
971
50.6M
{
972
50.6M
  const sldns_rr_descriptor *descriptor = sldns_rr_descript(rrtype);
973
50.6M
  if (descriptor && descriptor->_name) {
974
4.60M
    return sldns_str_print(s, slen, "%s", descriptor->_name);
975
4.60M
  }
976
46.0M
  return sldns_str_print(s, slen, "TYPE%u", (unsigned)rrtype);
977
50.6M
}
978
979
int sldns_wire2str_edns_option_code_print(char** s, size_t* slen,
980
  uint16_t opcode)
981
51.0k
{
982
51.0k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_edns_options,
983
51.0k
    (int)opcode);
984
51.0k
  if (lt && lt->name) {
985
13.7k
    return sldns_str_print(s, slen, "%s", lt->name);
986
13.7k
  }
987
37.3k
  return sldns_str_print(s, slen, "OPT%u", (unsigned)opcode);
988
51.0k
}
989
990
int sldns_wire2str_class_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
991
0
{
992
0
  uint16_t c;
993
0
  if(*dlen == 0) return 0;
994
0
  if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
995
0
  c = sldns_read_uint16(*d);
996
0
  (*d)+=2;
997
0
  (*dlen)-=2;
998
0
  return sldns_wire2str_class_print(s, slen, c);
999
0
}
1000
1001
int sldns_wire2str_type_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
1002
1.95k
{
1003
1.95k
  uint16_t t;
1004
1.95k
  if(*dlen == 0) return 0;
1005
1.95k
  if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
1006
1.71k
  t = sldns_read_uint16(*d);
1007
1.71k
  (*d)+=2;
1008
1.71k
  (*dlen)-=2;
1009
1.71k
  return sldns_wire2str_type_print(s, slen, t);
1010
1.95k
}
1011
1012
int sldns_wire2str_ttl_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
1013
0
{
1014
0
  uint32_t ttl;
1015
0
  if(*dlen == 0) return 0;
1016
0
  if(*dlen < 4) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
1017
0
  ttl = sldns_read_uint32(*d);
1018
0
  (*d)+=4;
1019
0
  (*dlen)-=4;
1020
0
  return sldns_str_print(s, slen, "%u", (unsigned)ttl);
1021
0
}
1022
1023
static int
1024
sldns_print_svcparamkey(char** s, size_t* slen, uint16_t svcparamkey)
1025
174k
{
1026
174k
  if (svcparamkey < SVCPARAMKEY_COUNT) {
1027
92.1k
    return sldns_str_print(s, slen, "%s", svcparamkey_strs[svcparamkey]);
1028
92.1k
  }
1029
82.2k
  else {
1030
82.2k
    return sldns_str_print(s, slen, "key%d", (int)svcparamkey);
1031
82.2k
  }
1032
174k
}
1033
1034
static int sldns_wire2str_svcparam_port2str(char** s,
1035
  size_t* slen, uint16_t data_len, uint8_t* data)
1036
1.33k
{
1037
1.33k
  int w = 0;
1038
1039
1.33k
  if (data_len != 2)
1040
75
    return -1; /* wireformat error, a short is 2 bytes */
1041
1.25k
  w = sldns_str_print(s, slen, "=%d", (int)sldns_read_uint16(data));
1042
1043
1.25k
  return w;
1044
1.33k
}
1045
1046
static int sldns_wire2str_svcparam_ipv4hint2str(char** s,
1047
  size_t* slen, uint16_t data_len, uint8_t* data)
1048
1.55k
{
1049
1.55k
  char ip_str[INET_ADDRSTRLEN + 1];
1050
1051
1.55k
  int w = 0;
1052
1053
1.55k
  assert(data_len > 0);
1054
1055
1.55k
  if ((data_len % LDNS_IP4ADDRLEN) == 0) {
1056
753
    if (inet_ntop(AF_INET, data, ip_str, sizeof(ip_str)) == NULL)
1057
0
      return -1; /* wireformat error, incorrect size or inet family */
1058
1059
753
    w += sldns_str_print(s, slen, "=%s", ip_str);
1060
753
    data += LDNS_IP4ADDRLEN;
1061
1062
2.14k
    while ((data_len -= LDNS_IP4ADDRLEN) > 0) {
1063
1.39k
      if (inet_ntop(AF_INET, data, ip_str, sizeof(ip_str)) == NULL)
1064
0
        return -1; /* wireformat error, incorrect size or inet family */
1065
1066
1.39k
      w += sldns_str_print(s, slen, ",%s", ip_str);
1067
1.39k
      data += LDNS_IP4ADDRLEN;
1068
1.39k
    }
1069
753
  } else
1070
799
    return -1;
1071
1072
753
  return w;
1073
1.55k
}
1074
1075
static int sldns_wire2str_svcparam_ipv6hint2str(char** s,
1076
  size_t* slen, uint16_t data_len, uint8_t* data)
1077
902
{
1078
902
  char ip_str[INET6_ADDRSTRLEN + 1];
1079
1080
902
  int w = 0;
1081
1082
902
  assert(data_len > 0);
1083
1084
902
  if ((data_len % LDNS_IP6ADDRLEN) == 0) {
1085
475
    if (inet_ntop(AF_INET6, data, ip_str, sizeof(ip_str)) == NULL)
1086
0
      return -1; /* wireformat error, incorrect size or inet family */
1087
1088
475
    w += sldns_str_print(s, slen, "=%s", ip_str);
1089
475
    data += LDNS_IP6ADDRLEN;
1090
1091
16.4k
    while ((data_len -= LDNS_IP6ADDRLEN) > 0) {
1092
15.9k
      if (inet_ntop(AF_INET6, data, ip_str, sizeof(ip_str)) == NULL)
1093
0
        return -1; /* wireformat error, incorrect size or inet family */
1094
1095
15.9k
      w += sldns_str_print(s, slen, ",%s", ip_str);
1096
15.9k
      data += LDNS_IP6ADDRLEN;
1097
15.9k
    }
1098
475
  } else
1099
427
    return -1;
1100
1101
475
  return w;
1102
902
}
1103
1104
static int sldns_wire2str_svcparam_mandatory2str(char** s,
1105
  size_t* slen, uint16_t data_len, uint8_t* data)
1106
1.43k
{
1107
1.43k
  int w = 0;
1108
1109
1.43k
  assert(data_len > 0);
1110
1111
1.43k
  if (data_len % sizeof(uint16_t))
1112
257
    return -1; /* wireformat error, data_len must be multiple of shorts */
1113
1.17k
  w += sldns_str_print(s, slen, "=");
1114
1.17k
  w += sldns_print_svcparamkey(s, slen, sldns_read_uint16(data));
1115
1.17k
  data += 2;
1116
1117
152k
  while ((data_len -= sizeof(uint16_t))) {
1118
151k
    w += sldns_str_print(s, slen, ",");
1119
151k
    w += sldns_print_svcparamkey(s, slen, sldns_read_uint16(data));
1120
151k
    data += 2;
1121
151k
  }
1122
1123
1.17k
  return w;
1124
1.43k
}
1125
1126
static int sldns_wire2str_svcparam_alpn2str(char** s,
1127
  size_t* slen, uint16_t data_len, uint8_t* data)
1128
12.2k
{
1129
12.2k
  uint8_t *dp = (void *)data;
1130
12.2k
  int w = 0;
1131
1132
12.2k
  assert(data_len > 0); /* Guaranteed by sldns_wire2str_svcparam_scan */
1133
1134
12.2k
  w += sldns_str_print(s, slen, "=\"");
1135
50.1k
  while (data_len) {
1136
    /* alpn is list of length byte (str_len) followed by a string of that size */
1137
38.5k
    uint8_t i, str_len = *dp++;
1138
1139
38.5k
    if (str_len > --data_len)
1140
759
      return -1;
1141
1142
95.3k
    for (i = 0; i < str_len; i++) {
1143
57.5k
      if (dp[i] == '"' || dp[i] == '\\')
1144
475
        w += sldns_str_print(s, slen, "\\\\\\%c", dp[i]);
1145
1146
57.0k
      else if (dp[i] == ',')
1147
346
        w += sldns_str_print(s, slen, "\\\\%c", dp[i]);
1148
1149
56.7k
      else if (!isprint(dp[i]))
1150
51.4k
        w += sldns_str_print(s, slen, "\\%03u", (unsigned) dp[i]);
1151
1152
5.25k
      else
1153
5.25k
        w += sldns_str_print(s, slen, "%c", dp[i]);
1154
57.5k
    }
1155
37.8k
    dp += str_len;
1156
37.8k
    if ((data_len -= str_len))
1157
26.2k
      w += sldns_str_print(s, slen, "%s", ",");
1158
37.8k
  }
1159
11.5k
  w += sldns_str_print(s, slen, "\"");
1160
1161
11.5k
  return w;
1162
12.2k
}
1163
1164
static int sldns_wire2str_svcparam_ech2str(char** s,
1165
  size_t* slen, uint16_t data_len, uint8_t* data)
1166
281
{
1167
281
  int size;
1168
281
  int w = 0;
1169
1170
281
  assert(data_len > 0); /* Guaranteed by sldns_wire2str_svcparam_scan */
1171
1172
281
  w += sldns_str_print(s, slen, "=\"");
1173
1174
281
  if ((size = sldns_b64_ntop(data, data_len, *s, *slen)) < 0)
1175
266
    return -1;
1176
1177
15
  (*s) += size;
1178
15
  (*slen) -= size;
1179
1180
15
  w += sldns_str_print(s, slen, "\"");
1181
1182
15
  return w + size;
1183
281
}
1184
1185
int sldns_wire2str_svcparam_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
1186
26.1k
{
1187
26.1k
  uint8_t ch;
1188
26.1k
  uint16_t svcparamkey, data_len;
1189
26.1k
  int written_chars = 0;
1190
26.1k
  int r, i;
1191
1192
  /* verify that we have enough data to read svcparamkey and data_len */
1193
26.1k
  if(*dlen < 4)
1194
1.12k
    return -1;
1195
1196
24.9k
  svcparamkey = sldns_read_uint16(*d);
1197
24.9k
  data_len = sldns_read_uint16(*d+2);
1198
24.9k
  *d    += 4;
1199
24.9k
  *dlen -= 4;
1200
1201
  /* verify that we have data_len data */
1202
24.9k
  if (data_len > *dlen)
1203
2.83k
    return -1;
1204
1205
22.1k
  written_chars += sldns_print_svcparamkey(s, slen, svcparamkey);
1206
22.1k
  if (!data_len) {
1207
1208
    /* Some SvcParams MUST have values */
1209
1.53k
    switch (svcparamkey) {
1210
23
    case SVCB_KEY_ALPN:
1211
24
    case SVCB_KEY_PORT:
1212
30
    case SVCB_KEY_IPV4HINT:
1213
36
    case SVCB_KEY_IPV6HINT:
1214
551
    case SVCB_KEY_MANDATORY:
1215
552
    case SVCB_KEY_DOHPATH:
1216
552
      return -1;
1217
982
    default:
1218
982
      return written_chars;
1219
1.53k
    }
1220
1.53k
  }
1221
1222
20.6k
  switch (svcparamkey) {
1223
1.33k
  case SVCB_KEY_PORT:
1224
1.33k
    r = sldns_wire2str_svcparam_port2str(s, slen, data_len, *d);
1225
1.33k
    break;
1226
1.55k
  case SVCB_KEY_IPV4HINT:
1227
1.55k
    r = sldns_wire2str_svcparam_ipv4hint2str(s, slen, data_len, *d);
1228
1.55k
    break;
1229
902
  case SVCB_KEY_IPV6HINT:
1230
902
    r = sldns_wire2str_svcparam_ipv6hint2str(s, slen, data_len, *d);
1231
902
    break;
1232
1.43k
  case SVCB_KEY_MANDATORY:
1233
1.43k
    r = sldns_wire2str_svcparam_mandatory2str(s, slen, data_len, *d);
1234
1.43k
    break;
1235
662
  case SVCB_KEY_NO_DEFAULT_ALPN:
1236
662
    return -1;  /* wireformat error, should not have a value */
1237
12.2k
  case SVCB_KEY_ALPN:
1238
12.2k
    r = sldns_wire2str_svcparam_alpn2str(s, slen, data_len, *d);
1239
12.2k
    break;
1240
281
  case SVCB_KEY_ECH:
1241
281
    r = sldns_wire2str_svcparam_ech2str(s, slen, data_len, *d);
1242
281
    break;
1243
0
  case SVCB_KEY_DOHPATH:
1244
0
    ATTR_FALLTHROUGH
1245
    /* fallthrough */
1246
2.17k
  default:
1247
2.17k
    r = sldns_str_print(s, slen, "=\"");
1248
1249
271k
    for (i = 0; i < data_len; i++) {
1250
269k
      ch = (*d)[i];
1251
1252
269k
      if (ch == '"' || ch == '\\')
1253
585
        r += sldns_str_print(s, slen, "\\%c", ch);
1254
1255
268k
      else if (!isprint(ch))
1256
257k
        r += sldns_str_print(s, slen, "\\%03u", (unsigned) ch);
1257
1258
11.3k
      else
1259
11.3k
        r += sldns_str_print(s, slen, "%c", ch);
1260
1261
269k
    }
1262
2.17k
    r += sldns_str_print(s, slen, "\"");
1263
2.17k
    break;
1264
20.6k
  }
1265
19.9k
  if (r <= 0)
1266
2.58k
    return -1; /* wireformat error */
1267
1268
17.3k
  written_chars += r;
1269
17.3k
  *d    += data_len;
1270
17.3k
  *dlen -= data_len;
1271
17.3k
  return written_chars;
1272
19.9k
}
1273
1274
int sldns_wire2str_rdf_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
1275
  int rdftype, uint8_t* pkt, size_t pktlen, int* comprloop)
1276
345k
{
1277
345k
  if(*dlen == 0) return 0;
1278
345k
  switch(rdftype) {
1279
0
  case LDNS_RDF_TYPE_NONE:
1280
0
    return 0;
1281
94.9k
  case LDNS_RDF_TYPE_DNAME:
1282
94.9k
    return sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
1283
17.5k
  case LDNS_RDF_TYPE_INT8:
1284
17.5k
    return sldns_wire2str_int8_scan(d, dlen, s, slen);
1285
31.2k
  case LDNS_RDF_TYPE_INT16:
1286
31.2k
    return sldns_wire2str_int16_scan(d, dlen, s, slen);
1287
2.11k
  case LDNS_RDF_TYPE_INT32:
1288
2.11k
    return sldns_wire2str_int32_scan(d, dlen, s, slen);
1289
664
  case LDNS_RDF_TYPE_PERIOD:
1290
664
    return sldns_wire2str_period_scan(d, dlen, s, slen);
1291
1.87k
  case LDNS_RDF_TYPE_TSIGTIME:
1292
1.87k
    return sldns_wire2str_tsigtime_scan(d, dlen, s, slen);
1293
2.02k
  case LDNS_RDF_TYPE_A:
1294
2.02k
    return sldns_wire2str_a_scan(d, dlen, s, slen);
1295
166
  case LDNS_RDF_TYPE_AAAA:
1296
166
    return sldns_wire2str_aaaa_scan(d, dlen, s, slen);
1297
79.2k
  case LDNS_RDF_TYPE_STR:
1298
79.2k
    return sldns_wire2str_str_scan(d, dlen, s, slen);
1299
4.30k
  case LDNS_RDF_TYPE_APL:
1300
4.30k
    return sldns_wire2str_apl_scan(d, dlen, s, slen);
1301
0
  case LDNS_RDF_TYPE_B32_EXT:
1302
0
    return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
1303
6.45k
  case LDNS_RDF_TYPE_B64:
1304
6.45k
    return sldns_wire2str_b64_scan(d, dlen, s, slen);
1305
396
  case LDNS_RDF_TYPE_HEX:
1306
396
    return sldns_wire2str_hex_scan(d, dlen, s, slen);
1307
1.61k
  case LDNS_RDF_TYPE_NSEC:
1308
1.61k
    return sldns_wire2str_nsec_scan(d, dlen, s, slen);
1309
3.36k
  case LDNS_RDF_TYPE_NSEC3_SALT:
1310
3.36k
    return sldns_wire2str_nsec3_salt_scan(d, dlen, s, slen);
1311
1.95k
  case LDNS_RDF_TYPE_TYPE:
1312
1.95k
    return sldns_wire2str_type_scan(d, dlen, s, slen);
1313
0
  case LDNS_RDF_TYPE_CLASS:
1314
0
    return sldns_wire2str_class_scan(d, dlen, s, slen);
1315
1.04k
  case LDNS_RDF_TYPE_CERT_ALG:
1316
1.04k
    return sldns_wire2str_cert_alg_scan(d, dlen, s, slen);
1317
7.62k
  case LDNS_RDF_TYPE_ALG:
1318
7.62k
    return sldns_wire2str_alg_scan(d, dlen, s, slen);
1319
9.33k
  case LDNS_RDF_TYPE_UNKNOWN:
1320
9.33k
    return sldns_wire2str_unknown_scan(d, dlen, s, slen);
1321
4.19k
  case LDNS_RDF_TYPE_TIME:
1322
4.19k
    return sldns_wire2str_time_scan(d, dlen, s, slen);
1323
3.18k
  case LDNS_RDF_TYPE_LOC:
1324
3.18k
    return sldns_wire2str_loc_scan(d, dlen, s, slen);
1325
685
  case LDNS_RDF_TYPE_WKS:
1326
685
  case LDNS_RDF_TYPE_SERVICE:
1327
685
    return sldns_wire2str_wks_scan(d, dlen, s, slen);
1328
226
  case LDNS_RDF_TYPE_NSAP:
1329
226
    return sldns_wire2str_nsap_scan(d, dlen, s, slen);
1330
1.40k
  case LDNS_RDF_TYPE_ATMA:
1331
1.40k
    return sldns_wire2str_atma_scan(d, dlen, s, slen);
1332
4.14k
  case LDNS_RDF_TYPE_IPSECKEY:
1333
4.14k
    return sldns_wire2str_ipseckey_scan(d, dlen, s, slen, pkt,
1334
4.14k
      pktlen, comprloop);
1335
1.50k
  case LDNS_RDF_TYPE_HIP:
1336
1.50k
    return sldns_wire2str_hip_scan(d, dlen, s, slen);
1337
2.76k
  case LDNS_RDF_TYPE_INT16_DATA:
1338
2.76k
    return sldns_wire2str_int16_data_scan(d, dlen, s, slen);
1339
2.61k
  case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
1340
2.61k
    return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
1341
1.75k
  case LDNS_RDF_TYPE_ILNP64:
1342
1.75k
    return sldns_wire2str_ilnp64_scan(d, dlen, s, slen);
1343
699
  case LDNS_RDF_TYPE_EUI48:
1344
699
    return sldns_wire2str_eui48_scan(d, dlen, s, slen);
1345
806
  case LDNS_RDF_TYPE_EUI64:
1346
806
    return sldns_wire2str_eui64_scan(d, dlen, s, slen);
1347
24.4k
  case LDNS_RDF_TYPE_UNQUOTED:
1348
24.4k
    return sldns_wire2str_unquoted_scan(d, dlen, s, slen);
1349
1.92k
  case LDNS_RDF_TYPE_TAG:
1350
1.92k
    return sldns_wire2str_tag_scan(d, dlen, s, slen);
1351
1.11k
  case LDNS_RDF_TYPE_LONG_STR:
1352
1.11k
    return sldns_wire2str_long_str_scan(d, dlen, s, slen);
1353
26.1k
  case LDNS_RDF_TYPE_SVCPARAM:
1354
26.1k
    return sldns_wire2str_svcparam_scan(d, dlen, s, slen);
1355
1.67k
  case LDNS_RDF_TYPE_TSIGERROR:
1356
1.67k
    return sldns_wire2str_tsigerror_scan(d, dlen, s, slen);
1357
345k
  }
1358
  /* unknown rdf type */
1359
0
  return -1;
1360
345k
}
1361
1362
int sldns_wire2str_int8_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1363
25.1k
{
1364
25.1k
  int w;
1365
25.1k
  if(*dl < 1) return -1;
1366
25.1k
  w = sldns_str_print(s, sl, "%u", (unsigned)**d);
1367
25.1k
  (*d)++;
1368
25.1k
  (*dl)--;
1369
25.1k
  return w;
1370
25.1k
}
1371
1372
int sldns_wire2str_int16_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1373
31.2k
{
1374
31.2k
  int w;
1375
31.2k
  if(*dl < 2) return -1;
1376
28.3k
  w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint16(*d));
1377
28.3k
  (*d)+=2;
1378
28.3k
  (*dl)-=2;
1379
28.3k
  return w;
1380
31.2k
}
1381
1382
int sldns_wire2str_int32_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1383
2.11k
{
1384
2.11k
  int w;
1385
2.11k
  if(*dl < 4) return -1;
1386
1.77k
  w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint32(*d));
1387
1.77k
  (*d)+=4;
1388
1.77k
  (*dl)-=4;
1389
1.77k
  return w;
1390
2.11k
}
1391
1392
int sldns_wire2str_period_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1393
664
{
1394
664
  int w;
1395
664
  if(*dl < 4) return -1;
1396
399
  w = sldns_str_print(s, sl, "%u", (unsigned)sldns_read_uint32(*d));
1397
399
  (*d)+=4;
1398
399
  (*dl)-=4;
1399
399
  return w;
1400
664
}
1401
1402
int sldns_wire2str_tsigtime_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1403
1.87k
{
1404
  /* tsigtime is 48 bits network order unsigned integer */
1405
1.87k
  int w;
1406
1.87k
  uint64_t tsigtime = 0;
1407
1.87k
  uint64_t d0, d1, d2, d3, d4, d5;
1408
1.87k
  if(*dl < 6) return -1;
1409
1.66k
  d0 = (*d)[0]; /* cast to uint64 for shift operations */
1410
1.66k
  d1 = (*d)[1];
1411
1.66k
  d2 = (*d)[2];
1412
1.66k
  d3 = (*d)[3];
1413
1.66k
  d4 = (*d)[4];
1414
1.66k
  d5 = (*d)[5];
1415
1.66k
  tsigtime = (d0<<40) | (d1<<32) | (d2<<24) | (d3<<16) | (d4<<8) | d5;
1416
1.66k
#ifndef USE_WINSOCK
1417
1.66k
  w = sldns_str_print(s, sl, "%llu", (long long)tsigtime);
1418
#else
1419
  w = sldns_str_print(s, sl, "%I64u", (long long)tsigtime);
1420
#endif
1421
1.66k
  (*d)+=6;
1422
1.66k
  (*dl)-=6;
1423
1.66k
  return w;
1424
1.87k
}
1425
1426
int sldns_wire2str_a_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1427
2.61k
{
1428
2.61k
  char buf[32];
1429
2.61k
  int w;
1430
2.61k
  if(*dl < 4) return -1;
1431
1.83k
  if(!inet_ntop(AF_INET, *d, buf, (socklen_t)sizeof(buf)))
1432
0
    return -1;
1433
1.83k
  w = sldns_str_print(s, sl, "%s", buf);
1434
1.83k
  (*d)+=4;
1435
1.83k
  (*dl)-=4;
1436
1.83k
  return w;
1437
1.83k
}
1438
1439
int sldns_wire2str_aaaa_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1440
451
{
1441
451
#ifdef AF_INET6
1442
451
  char buf[64];
1443
451
  int w;
1444
451
  if(*dl < 16) return -1;
1445
151
  if(!inet_ntop(AF_INET6, *d, buf, (socklen_t)sizeof(buf)))
1446
0
    return -1;
1447
151
  w = sldns_str_print(s, sl, "%s", buf);
1448
151
  (*d)+=16;
1449
151
  (*dl)-=16;
1450
151
  return w;
1451
#else
1452
  return -1;
1453
#endif
1454
151
}
1455
1456
/** printout escaped TYPE_STR character */
1457
static int str_char_print(char** s, size_t* sl, uint8_t c)
1458
97.9M
{
1459
97.9M
  if(isprint((unsigned char)c) || c == '\t') {
1460
14.2M
    if(c == '\"' || c == '\\')
1461
131k
      return sldns_str_print(s, sl, "\\%c", c);
1462
14.1M
    if(*sl) {
1463
20.2k
      **s = (char)c;
1464
20.2k
      (*s)++;
1465
20.2k
      (*sl)--;
1466
20.2k
    }
1467
14.1M
    return 1;
1468
14.2M
  }
1469
83.6M
  return sldns_str_print(s, sl, "\\%03u", (unsigned)c);
1470
97.9M
}
1471
1472
int sldns_wire2str_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1473
83.5k
{
1474
83.5k
  int w = 0;
1475
83.5k
  size_t i, len;
1476
83.5k
  if(*dl < 1) return -1;
1477
83.5k
  len = **d;
1478
83.5k
  if(*dl < 1+len) return -1;
1479
82.2k
  (*d)++;
1480
82.2k
  (*dl)--;
1481
82.2k
  w += sldns_str_print(s, sl, "\"");
1482
308k
  for(i=0; i<len; i++)
1483
225k
    w += str_char_print(s, sl, (*d)[i]);
1484
82.2k
  w += sldns_str_print(s, sl, "\"");
1485
82.2k
  (*d)+=len;
1486
82.2k
  (*dl)-=len;
1487
82.2k
  return w;
1488
83.5k
}
1489
1490
int sldns_wire2str_apl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1491
8.60k
{
1492
8.60k
  int i, w = 0;
1493
8.60k
  uint16_t family;
1494
8.60k
  uint8_t negation, prefix, adflength;
1495
8.60k
  if(*dl < 4) return -1;
1496
8.24k
  family = sldns_read_uint16(*d);
1497
8.24k
  prefix = (*d)[2];
1498
8.24k
  negation = ((*d)[3] & LDNS_APL_NEGATION);
1499
8.24k
  adflength = ((*d)[3] & LDNS_APL_MASK);
1500
8.24k
  if(*dl < 4+(size_t)adflength) return -1;
1501
7.26k
  if(family != LDNS_APL_IP4 && family != LDNS_APL_IP6)
1502
3.60k
    return -1; /* unknown address family */
1503
3.65k
  if(negation)
1504
707
    w += sldns_str_print(s, sl, "!");
1505
3.65k
  w += sldns_str_print(s, sl, "%u:", (unsigned)family);
1506
3.65k
  if(family == LDNS_APL_IP4) {
1507
    /* check if prefix <32 ? */
1508
    /* address is variable length 0 - 4 */
1509
6.40k
    for(i=0; i<4; i++) {
1510
5.12k
      if(i > 0)
1511
3.84k
        w += sldns_str_print(s, sl, ".");
1512
5.12k
      if(i < (int)adflength)
1513
2.83k
        w += sldns_str_print(s, sl, "%d", (*d)[4+i]);
1514
2.29k
      else  w += sldns_str_print(s, sl, "0");
1515
5.12k
    }
1516
2.37k
  } else if(family == LDNS_APL_IP6) {
1517
    /* check if prefix <128 ? */
1518
    /* address is variable length 0 - 16 */
1519
40.2k
    for(i=0; i<16; i++) {
1520
37.9k
      if(i%2 == 0 && i>0)
1521
16.5k
        w += sldns_str_print(s, sl, ":");
1522
37.9k
      if(i < (int)adflength)
1523
1.77k
        w += sldns_str_print(s, sl, "%02x", (*d)[4+i]);
1524
36.1k
      else  w += sldns_str_print(s, sl, "00");
1525
37.9k
    }
1526
2.37k
  }
1527
3.65k
  w += sldns_str_print(s, sl, "/%u", (unsigned)prefix);
1528
3.65k
  (*d) += 4+adflength;
1529
3.65k
  (*dl) -= 4+adflength;
1530
3.65k
  return w;
1531
7.26k
}
1532
1533
int sldns_wire2str_b32_ext_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1534
6.91k
{
1535
6.91k
  size_t datalen;
1536
6.91k
  size_t sz;
1537
6.91k
  if(*dl < 1) return -1;
1538
6.91k
  datalen = (*d)[0];
1539
6.91k
  if(*dl < 1+datalen) return -1;
1540
5.17k
  sz = sldns_b32_ntop_calculate_size(datalen);
1541
5.17k
  if(*sl < sz+1) {
1542
2.80k
    (*d) += datalen+1;
1543
2.80k
    (*dl) -= (datalen+1);
1544
2.80k
    return (int)sz; /* out of space really, but would need buffer
1545
      in order to truncate the output */
1546
2.80k
  }
1547
2.36k
  sldns_b32_ntop_extended_hex((*d)+1, datalen, *s, *sl);
1548
2.36k
  (*d) += datalen+1;
1549
2.36k
  (*dl) -= (datalen+1);
1550
2.36k
  (*s) += sz;
1551
2.36k
  (*sl) -= sz;
1552
2.36k
  return (int)sz;
1553
5.17k
}
1554
1555
/** scan number of bytes from wire into b64 presentation format */
1556
static int sldns_wire2str_b64_scan_num(uint8_t** d, size_t* dl, char** s,
1557
  size_t* sl, size_t num)
1558
11.5k
{
1559
  /* b64_ntop_calculate size includes null at the end */
1560
11.5k
  size_t sz = sldns_b64_ntop_calculate_size(num)-1;
1561
11.5k
  if(*sl < sz+1) {
1562
10.1k
    (*d) += num;
1563
10.1k
    (*dl) -= num;
1564
10.1k
    return (int)sz; /* out of space really, but would need buffer
1565
      in order to truncate the output */
1566
10.1k
  }
1567
1.44k
  sldns_b64_ntop(*d, num, *s, *sl);
1568
1.44k
  (*d) += num;
1569
1.44k
  (*dl) -= num;
1570
1.44k
  (*s) += sz;
1571
1.44k
  (*sl) -= sz;
1572
1.44k
  return (int)sz;
1573
11.5k
}
1574
1575
int sldns_wire2str_b64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1576
6.45k
{
1577
6.45k
  if(*dl == 0) {
1578
0
    return sldns_str_print(s, sl, "0");
1579
0
  }
1580
6.45k
  return sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1581
6.45k
}
1582
1583
int sldns_wire2str_hex_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1584
2.89k
{
1585
2.89k
  if(*dl == 0) {
1586
0
    return sldns_str_print(s, sl, "0");
1587
0
  }
1588
2.89k
  return print_remainder_hex("", d, dl, s, sl);
1589
2.89k
}
1590
1591
int sldns_wire2str_nsec_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1592
5.91k
{
1593
5.91k
  uint8_t* p = *d;
1594
5.91k
  size_t pl = *dl;
1595
5.91k
  unsigned i, bit, window, block_len;
1596
5.91k
  uint16_t t;
1597
5.91k
  int w = 0;
1598
1599
  /* check for errors */
1600
12.5M
  while(pl) {
1601
12.5M
    if(pl < 2) return -1;
1602
12.5M
    block_len = (unsigned)p[1];
1603
12.5M
    if(pl < 2+block_len) return -1;
1604
12.5M
    p += block_len+2;
1605
12.5M
    pl -= block_len+2;
1606
12.5M
  }
1607
1608
  /* do it */
1609
1.06k
  p = *d;
1610
1.06k
  pl = *dl;
1611
4.45M
  while(pl) {
1612
4.45M
    if(pl < 2) return -1; /* cannot happen */
1613
4.45M
    window = (unsigned)p[0];
1614
4.45M
    block_len = (unsigned)p[1];
1615
4.45M
    if(pl < 2+block_len) return -1; /* cannot happen */
1616
4.45M
    p += 2;
1617
32.5M
    for(i=0; i<block_len; i++) {
1618
28.0M
      if(p[i] == 0) continue;
1619
      /* base type number for this octet */
1620
15.7M
      t = ((window)<<8) | (i << 3);
1621
141M
      for(bit=0; bit<8; bit++) {
1622
125M
        if((p[i]&(0x80>>bit))) {
1623
49.6M
          if(w) w += sldns_str_print(s, sl, " ");
1624
49.6M
          w += sldns_wire2str_type_print(s, sl,
1625
49.6M
            t+bit);
1626
49.6M
        }
1627
125M
      }
1628
15.7M
    }
1629
4.45M
    p += block_len;
1630
4.45M
    pl -= block_len+2;
1631
4.45M
  }
1632
1.06k
  (*d) += *dl;
1633
1.06k
  (*dl) = 0;
1634
1.06k
  return w;
1635
1.06k
}
1636
1637
int sldns_wire2str_nsec3_salt_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1638
7.66k
{
1639
7.66k
  size_t salt_len;
1640
7.66k
  int w;
1641
7.66k
  if(*dl < 1) return -1;
1642
7.66k
  salt_len = (size_t)(*d)[0];
1643
7.66k
  if(*dl < 1+salt_len) return -1;
1644
6.45k
  (*d)++;
1645
6.45k
  (*dl)--;
1646
6.45k
  if(salt_len == 0) {
1647
3.86k
    return sldns_str_print(s, sl, "-");
1648
3.86k
  }
1649
2.58k
  w = print_hex_buf(s, sl, *d, salt_len);
1650
2.58k
  (*dl)-=salt_len;
1651
2.58k
  (*d)+=salt_len;
1652
2.58k
  return w;
1653
6.45k
}
1654
1655
int sldns_wire2str_cert_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1656
5.34k
{
1657
5.34k
  sldns_lookup_table *lt;
1658
5.34k
  int data, w;
1659
5.34k
  if(*dl < 2) return -1;
1660
5.03k
  data = (int)sldns_read_uint16(*d);
1661
5.03k
  lt = sldns_lookup_by_id(sldns_cert_algorithms, data);
1662
5.03k
  if(lt && lt->name)
1663
1.03k
    w = sldns_str_print(s, sl, "%s", lt->name);
1664
3.99k
  else  w = sldns_str_print(s, sl, "%d", data);
1665
5.03k
  (*dl)-=2;
1666
5.03k
  (*d)+=2;
1667
5.03k
  return w;
1668
5.34k
}
1669
1670
int sldns_wire2str_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1671
7.62k
{
1672
  /* don't use algorithm mnemonics in the presentation format
1673
   * this kind of got sneaked into the rfc's */
1674
7.62k
  return sldns_wire2str_int8_scan(d, dl, s, sl);
1675
7.62k
}
1676
1677
int sldns_wire2str_unknown_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1678
9.33k
{
1679
9.33k
  return sldns_wire2str_rdata_unknown_scan(d, dl, s, sl);
1680
9.33k
}
1681
1682
int sldns_wire2str_time_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1683
4.19k
{
1684
  /* create a YYYYMMDDHHMMSS string if possible */
1685
4.19k
  struct tm tm;
1686
4.19k
  char date_buf[16];
1687
4.19k
  uint32_t t;
1688
4.19k
  memset(&tm, 0, sizeof(tm));
1689
4.19k
  if(*dl < 4) return -1;
1690
3.54k
  t = sldns_read_uint32(*d);
1691
3.54k
  date_buf[15]=0;
1692
3.54k
  if(sldns_serial_arithmetics_gmtime_r(t, time(NULL), &tm) &&
1693
3.54k
    strftime(date_buf, 15, "%Y%m%d%H%M%S", &tm)) {
1694
3.54k
    (*d) += 4;
1695
3.54k
    (*dl) -= 4;
1696
3.54k
    return sldns_str_print(s, sl, "%s", date_buf);
1697
3.54k
  }
1698
0
  return -1;
1699
3.54k
}
1700
1701
static int
1702
loc_cm_print(char** str, size_t* sl, uint8_t mantissa, uint8_t exponent)
1703
13.0k
{
1704
13.0k
  int w = 0;
1705
13.0k
  uint8_t i;
1706
  /* is it 0.<two digits> ? */
1707
13.0k
  if(exponent < 2) {
1708
6.24k
    if(exponent == 1)
1709
1.52k
      mantissa *= 10;
1710
6.24k
    return sldns_str_print(str, sl, "0.%02ld", (long)mantissa);
1711
6.24k
  }
1712
  /* always <digit><string of zeros> */
1713
6.76k
  w += sldns_str_print(str, sl, "%d", (int)mantissa);
1714
50.4k
  for(i=0; i<exponent-2; i++)
1715
43.7k
    w += sldns_str_print(str, sl, "0");
1716
6.76k
  return w;
1717
13.0k
}
1718
1719
int sldns_wire2str_loc_scan(uint8_t** d, size_t* dl, char** str, size_t* sl)
1720
7.48k
{
1721
  /* we could do checking (ie degrees < 90 etc)? */
1722
7.48k
  uint8_t version;
1723
7.48k
  uint8_t size;
1724
7.48k
  uint8_t horizontal_precision;
1725
7.48k
  uint8_t vertical_precision;
1726
7.48k
  uint32_t longitude;
1727
7.48k
  uint32_t latitude;
1728
7.48k
  uint32_t altitude;
1729
7.48k
  char northerness;
1730
7.48k
  char easterness;
1731
7.48k
  uint32_t h;
1732
7.48k
  uint32_t m;
1733
7.48k
  double s;
1734
7.48k
  uint32_t equator = (uint32_t)1 << 31; /* 2**31 */
1735
7.48k
  int w = 0;
1736
1737
7.48k
  if(*dl < 16) return -1;
1738
6.83k
  version = (*d)[0];
1739
6.83k
  if(version != 0)
1740
2.49k
    return sldns_wire2str_hex_scan(d, dl, str, sl);
1741
4.33k
  size = (*d)[1];
1742
4.33k
  horizontal_precision = (*d)[2];
1743
4.33k
  vertical_precision = (*d)[3];
1744
1745
4.33k
  latitude = sldns_read_uint32((*d)+4);
1746
4.33k
  longitude = sldns_read_uint32((*d)+8);
1747
4.33k
  altitude = sldns_read_uint32((*d)+12);
1748
1749
4.33k
  if (latitude > equator) {
1750
447
    northerness = 'N';
1751
447
    latitude = latitude - equator;
1752
3.89k
  } else {
1753
3.89k
    northerness = 'S';
1754
3.89k
    latitude = equator - latitude;
1755
3.89k
  }
1756
4.33k
  h = latitude / (1000 * 60 * 60);
1757
4.33k
  latitude = latitude % (1000 * 60 * 60);
1758
4.33k
  m = latitude / (1000 * 60);
1759
4.33k
  latitude = latitude % (1000 * 60);
1760
4.33k
  s = (double) latitude / 1000.0;
1761
4.33k
  w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1762
4.33k
    h, m, s, northerness);
1763
1764
4.33k
  if (longitude > equator) {
1765
823
    easterness = 'E';
1766
823
    longitude = longitude - equator;
1767
3.51k
  } else {
1768
3.51k
    easterness = 'W';
1769
3.51k
    longitude = equator - longitude;
1770
3.51k
  }
1771
4.33k
  h = longitude / (1000 * 60 * 60);
1772
4.33k
  longitude = longitude % (1000 * 60 * 60);
1773
4.33k
  m = longitude / (1000 * 60);
1774
4.33k
  longitude = longitude % (1000 * 60);
1775
4.33k
  s = (double) longitude / (1000.0);
1776
4.33k
  w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1777
4.33k
    h, m, s, easterness);
1778
1779
4.33k
  s = ((double) altitude) / 100;
1780
4.33k
  s -= 100000;
1781
1782
4.33k
  if(altitude%100 != 0)
1783
3.55k
    w += sldns_str_print(str, sl, "%.2f", s);
1784
783
  else
1785
783
    w += sldns_str_print(str, sl, "%.0f", s);
1786
1787
4.33k
  w += sldns_str_print(str, sl, "m ");
1788
1789
4.33k
  w += loc_cm_print(str, sl, (size & 0xf0) >> 4, size & 0x0f);
1790
4.33k
  w += sldns_str_print(str, sl, "m ");
1791
1792
4.33k
  w += loc_cm_print(str, sl, (horizontal_precision & 0xf0) >> 4,
1793
4.33k
    horizontal_precision & 0x0f);
1794
4.33k
  w += sldns_str_print(str, sl, "m ");
1795
1796
4.33k
  w += loc_cm_print(str, sl, (vertical_precision & 0xf0) >> 4,
1797
4.33k
    vertical_precision & 0x0f);
1798
4.33k
  w += sldns_str_print(str, sl, "m");
1799
1800
4.33k
  (*d)+=16;
1801
4.33k
  (*dl)-=16;
1802
4.33k
  return w;
1803
6.83k
}
1804
1805
int sldns_wire2str_wks_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1806
4.98k
{
1807
  /* protocol, followed by bitmap of services */
1808
4.98k
  const char* proto_name = NULL;
1809
4.98k
  struct protoent *protocol;
1810
4.98k
  struct servent *service;
1811
4.98k
  uint8_t protocol_nr;
1812
4.98k
  int bit, port, w = 0;
1813
4.98k
  size_t i;
1814
  /* we cannot print with strings because they
1815
   * are not portable, the presentation format may
1816
   * not be able to be read in on another computer.  */
1817
4.98k
  int print_symbols = 0;
1818
1819
  /* protocol */
1820
4.98k
  if(*dl < 1) return -1;
1821
4.98k
  protocol_nr = (*d)[0];
1822
4.98k
  (*d)++;
1823
4.98k
  (*dl)--;
1824
4.98k
  protocol = getprotobynumber((int)protocol_nr);
1825
4.98k
  if(protocol && (protocol->p_name != NULL)) {
1826
0
    w += sldns_str_print(s, sl, "%s", protocol->p_name);
1827
0
    proto_name = protocol->p_name;
1828
4.98k
  } else if(protocol_nr == 6) {
1829
27
    w += sldns_str_print(s, sl, "tcp");
1830
4.95k
  } else if(protocol_nr == 17) {
1831
69
    w += sldns_str_print(s, sl, "udp");
1832
4.89k
  } else {
1833
4.89k
    w += sldns_str_print(s, sl, "%u", (unsigned)protocol_nr);
1834
4.89k
  }
1835
1836
93.6M
  for(i=0; i<*dl; i++) {
1837
93.6M
    if((*d)[i] == 0)
1838
50.3M
      continue;
1839
390M
    for(bit=0; bit<8; bit++) {
1840
346M
      if(!(((*d)[i])&(0x80>>bit)))
1841
216M
        continue;
1842
130M
      port = (int)i*8 + bit;
1843
1844
130M
      if(!print_symbols)
1845
130M
        service = NULL;
1846
0
      else
1847
0
        service = getservbyport(
1848
0
          (int)htons((uint16_t)port), proto_name);
1849
130M
      if(service && service->s_name)
1850
0
        w += sldns_str_print(s, sl, " %s",
1851
0
          service->s_name);
1852
130M
      else  w += sldns_str_print(s, sl, " %u",
1853
130M
          (unsigned)port);
1854
130M
    }
1855
43.3M
  }
1856
1857
4.98k
#ifdef HAVE_ENDSERVENT
1858
4.98k
  endservent();
1859
4.98k
#endif
1860
4.98k
#ifdef HAVE_ENDPROTOENT
1861
4.98k
        endprotoent();
1862
4.98k
#endif
1863
4.98k
  (*d) += *dl;
1864
4.98k
  (*dl) = 0;
1865
4.98k
  return w;
1866
4.98k
}
1867
1868
int sldns_wire2str_nsap_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1869
226
{
1870
226
  return print_remainder_hex("0x", d, dl, s, sl);
1871
226
}
1872
1873
int sldns_wire2str_atma_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1874
1.40k
{
1875
1.40k
  uint8_t format;
1876
1.40k
  int w = 0;
1877
1.40k
  size_t i;
1878
1879
1.40k
  if(*dl < 1) return -1;
1880
1.40k
  format = (*d)[0];
1881
1.40k
  (*d)+=1;
1882
1.40k
  (*dl)-=1;
1883
1884
1.40k
  if(format == 0) {
1885
    /* AESA format (ATM End System Address). */
1886
477
    return print_remainder_hex("", d, dl, s, sl);
1887
926
  } else if(format == 1) {
1888
    /* E.164 format. */
1889
708
    w += sldns_str_print(s, sl, "+");
1890
1.27k
    for(i=0; i<*dl; i++) {
1891
1.00k
      if((*d)[i] < '0' || (*d)[0] > '9')
1892
439
        return -1;
1893
567
      w += sldns_str_print(s, sl, "%c", (*d)[i]);
1894
567
    }
1895
269
    (*d) += *dl;
1896
269
    (*dl) = 0;
1897
269
  } else {
1898
    /* Unknown format. */
1899
218
    return -1;
1900
218
  }
1901
269
  return w;
1902
1.40k
}
1903
1904
/* internal scan routine that can modify arguments on failure */
1905
static int sldns_wire2str_ipseckey_scan_internal(uint8_t** d, size_t* dl,
1906
  char** s, size_t* sl, uint8_t* pkt, size_t pktlen, int* comprloop)
1907
4.14k
{
1908
  /* http://www.ietf.org/internet-drafts/draft-ietf-ipseckey-rr-12.txt*/
1909
4.14k
  uint8_t precedence, gateway_type, algorithm;
1910
4.14k
  int w = 0;
1911
1912
4.14k
  if(*dl < 3) return -1;
1913
3.47k
  precedence = (*d)[0];
1914
3.47k
  gateway_type = (*d)[1];
1915
3.47k
  algorithm = (*d)[2];
1916
3.47k
  if(gateway_type > 3)
1917
464
    return -1; /* unknown */
1918
3.00k
  (*d)+=3;
1919
3.00k
  (*dl)-=3;
1920
3.00k
  w += sldns_str_print(s, sl, "%d %d %d ",
1921
3.00k
    (int)precedence, (int)gateway_type, (int)algorithm);
1922
1923
3.00k
  switch(gateway_type) {
1924
1.24k
  case 0: /* no gateway */
1925
1.24k
    w += sldns_str_print(s, sl, ".");
1926
1.24k
    break;
1927
589
  case 1: /* ip4 */
1928
589
    w += sldns_wire2str_a_scan(d, dl, s, sl);
1929
589
    break;
1930
285
  case 2: /* ip6 */
1931
285
    w += sldns_wire2str_aaaa_scan(d, dl, s, sl);
1932
285
    break;
1933
891
  case 3: /* dname */
1934
891
    w += sldns_wire2str_dname_scan(d, dl, s, sl, pkt, pktlen, comprloop);
1935
891
    break;
1936
0
  default: /* unknown */
1937
0
    return -1;
1938
3.00k
  }
1939
1940
3.00k
  if(*dl < 1)
1941
1.96k
    return -1;
1942
1.04k
  w += sldns_str_print(s, sl, " ");
1943
1.04k
  w += sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1944
1.04k
  return w;
1945
3.00k
}
1946
1947
int sldns_wire2str_ipseckey_scan(uint8_t** d, size_t* dl, char** s, size_t* sl,
1948
  uint8_t* pkt, size_t pktlen, int* comprloop)
1949
4.14k
{
1950
4.14k
  uint8_t* od = *d;
1951
4.14k
  char* os = *s;
1952
4.14k
  size_t odl = *dl, osl = *sl;
1953
4.14k
  int w=sldns_wire2str_ipseckey_scan_internal(d, dl, s, sl, pkt, pktlen, comprloop);
1954
4.14k
  if(w == -1) {
1955
3.09k
    *d = od;
1956
3.09k
    *s = os;
1957
3.09k
    *dl = odl;
1958
3.09k
    *sl = osl;
1959
3.09k
    return -1;
1960
3.09k
  }
1961
1.04k
  return w;
1962
4.14k
}
1963
1964
int sldns_wire2str_hip_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1965
5.80k
{
1966
5.80k
  int w;
1967
5.80k
  uint8_t algo, hitlen;
1968
5.80k
  uint16_t pklen;
1969
1970
  /* read lengths */
1971
5.80k
  if(*dl < 4)
1972
319
    return -1;
1973
5.48k
  hitlen = (*d)[0];
1974
5.48k
  algo = (*d)[1];
1975
5.48k
  pklen = sldns_read_uint16((*d)+2);
1976
5.48k
  if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen)
1977
3.04k
    return -1;
1978
1979
  /* write: algo hit pubkey */
1980
2.44k
  w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
1981
2.44k
  w += print_hex_buf(s, sl, (*d)+4, hitlen);
1982
2.44k
  w += sldns_str_print(s, sl, " ");
1983
2.44k
  (*d)+=4+hitlen;
1984
2.44k
  (*dl)-= (4+hitlen);
1985
2.44k
  w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
1986
2.44k
  return w;
1987
5.48k
}
1988
1989
int sldns_wire2str_int16_data_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1990
7.06k
{
1991
7.06k
  int w;
1992
7.06k
  uint16_t n;
1993
7.06k
  if(*dl < 2)
1994
101
    return -1;
1995
6.96k
  n = sldns_read_uint16(*d);
1996
6.96k
  if(*dl < 2+(size_t)n)
1997
2.80k
    return -1;
1998
4.16k
  (*d)+=2;
1999
4.16k
  (*dl)-=2;
2000
4.16k
  if(n == 0) {
2001
2.53k
    return sldns_str_print(s, sl, "0");
2002
2.53k
  }
2003
1.63k
  w = sldns_str_print(s, sl, "%u ", (unsigned)n);
2004
1.63k
  w += sldns_wire2str_b64_scan_num(d, dl, s, sl, n);
2005
1.63k
  return w;
2006
4.16k
}
2007
2008
int sldns_wire2str_nsec3_next_owner_scan(uint8_t** d, size_t* dl, char** s,
2009
  size_t* sl)
2010
0
{
2011
0
  return sldns_wire2str_b32_ext_scan(d, dl, s, sl);
2012
0
}
2013
2014
int sldns_wire2str_ilnp64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2015
1.75k
{
2016
1.75k
  int w;
2017
1.75k
  if(*dl < 8)
2018
1.54k
    return -1;
2019
210
  w = sldns_str_print(s, sl, "%.4x:%.4x:%.4x:%.4x",
2020
210
    sldns_read_uint16(*d), sldns_read_uint16((*d)+2),
2021
210
    sldns_read_uint16((*d)+4), sldns_read_uint16((*d)+6));
2022
210
  (*d)+=8;
2023
210
  (*dl)-=8;
2024
210
  return w;
2025
1.75k
}
2026
2027
int sldns_wire2str_eui48_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2028
699
{
2029
699
  int w;
2030
699
  if(*dl < 6)
2031
503
    return -1;
2032
196
  w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
2033
196
    (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5]);
2034
196
  (*d)+=6;
2035
196
  (*dl)-=6;
2036
196
  return w;
2037
699
}
2038
2039
int sldns_wire2str_eui64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2040
5.10k
{
2041
5.10k
  int w;
2042
5.10k
  if(*dl < 8)
2043
593
    return -1;
2044
4.51k
  w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
2045
4.51k
    (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5],
2046
4.51k
    (*d)[6], (*d)[7]);
2047
4.51k
  (*d)+=8;
2048
4.51k
  (*dl)-=8;
2049
4.51k
  return w;
2050
5.10k
}
2051
2052
int sldns_wire2str_unquoted_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2053
24.4k
{
2054
24.4k
  int w = 0;
2055
24.4k
  size_t i, len;
2056
24.4k
  if(*dl < 1) return -1;
2057
24.4k
  len = **d;
2058
24.4k
  if(*dl < 1+len) return -1;
2059
24.2k
  (*d)++;
2060
24.2k
  (*dl)--;
2061
175k
  for(i=0; i<len; i++) {
2062
151k
    if(isspace((unsigned char)(*d)[i]) || (*d)[i] == '(' ||
2063
151k
      (*d)[i] == ')' || (*d)[i] == '\'')
2064
4.76k
      w += sldns_str_print(s, sl, "\\%c", (char)(*d)[i]);
2065
146k
    else  w += str_char_print(s, sl, (*d)[i]);
2066
151k
  }
2067
24.2k
  (*d)+=len;
2068
24.2k
  (*dl)-=len;
2069
24.2k
  return w;
2070
24.4k
}
2071
2072
int sldns_wire2str_tag_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2073
6.22k
{
2074
6.22k
  size_t i, n;
2075
6.22k
  int w = 0;
2076
6.22k
  if(*dl < 1)
2077
0
    return -1;
2078
6.22k
  n = (size_t)((*d)[0]);
2079
6.22k
  if(*dl < 1+n)
2080
1.58k
    return -1;
2081
6.41k
  for(i=0; i<n; i++)
2082
3.96k
    if(!isalnum((unsigned char)(*d)[i+1]))
2083
2.19k
      return -1;
2084
3.90k
  for(i=0; i<n; i++)
2085
1.45k
    w += sldns_str_print(s, sl, "%c", (char)(*d)[i+1]);
2086
2.44k
  (*d)+=n+1;
2087
2.44k
  (*dl)-=(n+1);
2088
2.44k
  return w;
2089
4.63k
}
2090
2091
int sldns_wire2str_long_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2092
5.41k
{
2093
5.41k
  size_t i;
2094
5.41k
  int w = 0;
2095
5.41k
  w += sldns_str_print(s, sl, "\"");
2096
97.5M
  for(i=0; i<*dl; i++)
2097
97.5M
    w += str_char_print(s, sl, (*d)[i]);
2098
5.41k
  w += sldns_str_print(s, sl, "\"");
2099
5.41k
  (*d)+=*dl;
2100
5.41k
  (*dl)=0;
2101
5.41k
  return w;
2102
5.41k
}
2103
2104
int sldns_wire2str_tsigerror_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2105
5.97k
{
2106
5.97k
  sldns_lookup_table *lt;
2107
5.97k
  int data, w;
2108
5.97k
  if(*dl < 2) return -1;
2109
5.34k
  data = (int)sldns_read_uint16(*d);
2110
5.34k
  lt = sldns_lookup_by_id(sldns_tsig_errors, data);
2111
5.34k
  if(lt && lt->name)
2112
1.58k
    w = sldns_str_print(s, sl, "%s", lt->name);
2113
3.75k
  else  w = sldns_str_print(s, sl, "%d", data);
2114
5.34k
  (*dl)-=2;
2115
5.34k
  (*d)+=2;
2116
5.34k
  return w;
2117
5.97k
}
2118
2119
int sldns_wire2str_edns_llq_print(char** s, size_t* sl, uint8_t* data,
2120
  size_t len)
2121
6.05k
{
2122
  /* LLQ constants */
2123
6.05k
  const char* llq_errors[] = {"NO-ERROR", "SERV-FULL", "STATIC",
2124
6.05k
    "FORMAT-ERR", "NO-SUCH-LLQ", "BAD-VERS", "UNKNOWN_ERR"};
2125
6.05k
  const unsigned int llq_errors_num = 7;
2126
6.05k
  const char* llq_opcodes[] = {"LLQ-SETUP", "LLQ-REFRESH", "LLQ-EVENT"};
2127
6.05k
  const unsigned int llq_opcodes_num = 3;
2128
6.05k
  uint16_t version, llq_opcode, error_code;
2129
6.05k
  uint64_t llq_id;
2130
6.05k
  uint32_t lease_life; /* Requested or granted life of LLQ, in seconds */
2131
6.05k
  int w = 0;
2132
2133
  /* read the record */
2134
6.05k
  if(len != 18) {
2135
5.56k
    w += sldns_str_print(s, sl, "malformed LLQ ");
2136
5.56k
    w += print_hex_buf(s, sl, data, len);
2137
5.56k
    return w;
2138
5.56k
  }
2139
493
  version = sldns_read_uint16(data);
2140
493
  llq_opcode = sldns_read_uint16(data+2);
2141
493
  error_code = sldns_read_uint16(data+4);
2142
493
  memmove(&llq_id, data+6, sizeof(llq_id));
2143
493
  lease_life = sldns_read_uint32(data+14);
2144
2145
  /* print it */
2146
493
  w += sldns_str_print(s, sl, "v%d ", (int)version);
2147
493
  if(llq_opcode < llq_opcodes_num)
2148
362
    w += sldns_str_print(s, sl, "%s", llq_opcodes[llq_opcode]);
2149
131
  else  w += sldns_str_print(s, sl, "opcode %d", (int)llq_opcode);
2150
493
  if(error_code < llq_errors_num)
2151
87
    w += sldns_str_print(s, sl, " %s", llq_errors[error_code]);
2152
406
  else  w += sldns_str_print(s, sl, " error %d", (int)error_code);
2153
493
#ifndef USE_WINSOCK
2154
493
  w += sldns_str_print(s, sl, " id %llx lease-life %lu",
2155
493
    (unsigned long long)llq_id, (unsigned long)lease_life);
2156
#else
2157
  w += sldns_str_print(s, sl, " id %I64x lease-life %lu",
2158
    (unsigned long long)llq_id, (unsigned long)lease_life);
2159
#endif
2160
493
  return w;
2161
6.05k
}
2162
2163
int sldns_wire2str_edns_ul_print(char** s, size_t* sl, uint8_t* data,
2164
  size_t len)
2165
5.84k
{
2166
5.84k
  uint32_t lease;
2167
5.84k
  int w = 0;
2168
5.84k
  if(len != 4) {
2169
5.42k
    w += sldns_str_print(s, sl, "malformed UL ");
2170
5.42k
    w += print_hex_buf(s, sl, data, len);
2171
5.42k
    return w;
2172
5.42k
  }
2173
424
  lease = sldns_read_uint32(data);
2174
424
  w += sldns_str_print(s, sl, "lease %lu", (unsigned long)lease);
2175
424
  return w;
2176
5.84k
}
2177
2178
int sldns_wire2str_edns_nsid_print(char** s, size_t* sl, uint8_t* data,
2179
  size_t len)
2180
6.76k
{
2181
6.76k
  int w = 0;
2182
6.76k
  size_t i, printed=0;
2183
6.76k
  w += print_hex_buf(s, sl, data, len);
2184
93.4M
  for(i=0; i<len; i++) {
2185
93.4M
    if(isprint((unsigned char)data[i]) || data[i] == '\t') {
2186
13.8M
      if(!printed) {
2187
4.36k
        w += sldns_str_print(s, sl, " (");
2188
4.36k
        printed = 1;
2189
4.36k
      }
2190
13.8M
      w += sldns_str_print(s, sl, "%c", (char)data[i]);
2191
13.8M
    }
2192
93.4M
  }
2193
6.76k
  if(printed)
2194
4.36k
    w += sldns_str_print(s, sl, ")");
2195
6.76k
  return w;
2196
6.76k
}
2197
2198
int sldns_wire2str_edns_dau_print(char** s, size_t* sl, uint8_t* data,
2199
  size_t len)
2200
4.66k
{
2201
4.66k
  sldns_lookup_table *lt;
2202
4.66k
  size_t i;
2203
4.66k
  int w = 0;
2204
93.5M
  for(i=0; i<len; i++) {
2205
93.5M
    lt = sldns_lookup_by_id(sldns_algorithms, (int)data[i]);
2206
93.5M
    if(lt && lt->name)
2207
18.8M
      w += sldns_str_print(s, sl, " %s", lt->name);
2208
74.6M
    else  w += sldns_str_print(s, sl, " %d", (int)data[i]);
2209
93.5M
  }
2210
4.66k
  return w;
2211
4.66k
}
2212
2213
int sldns_wire2str_edns_dhu_print(char** s, size_t* sl, uint8_t* data,
2214
  size_t len)
2215
4.85k
{
2216
4.85k
  sldns_lookup_table *lt;
2217
4.85k
  size_t i;
2218
4.85k
  int w = 0;
2219
93.4M
  for(i=0; i<len; i++) {
2220
93.4M
    lt = sldns_lookup_by_id(sldns_hashes, (int)data[i]);
2221
93.4M
    if(lt && lt->name)
2222
12.9M
      w += sldns_str_print(s, sl, " %s", lt->name);
2223
80.5M
    else  w += sldns_str_print(s, sl, " %d", (int)data[i]);
2224
93.4M
  }
2225
4.85k
  return w;
2226
4.85k
}
2227
2228
int sldns_wire2str_edns_n3u_print(char** s, size_t* sl, uint8_t* data,
2229
  size_t len)
2230
4.74k
{
2231
4.74k
  size_t i;
2232
4.74k
  int w = 0;
2233
93.5M
  for(i=0; i<len; i++) {
2234
93.5M
    if(data[i] == 1)
2235
10.5M
      w += sldns_str_print(s, sl, " SHA1");
2236
83.0M
    else  w += sldns_str_print(s, sl, " %d", (int)data[i]);
2237
93.5M
  }
2238
4.74k
  return w;
2239
4.74k
}
2240
2241
int sldns_wire2str_edns_subnet_print(char** s, size_t* sl, uint8_t* data,
2242
  size_t len)
2243
6.57k
{
2244
6.57k
  int w = 0;
2245
6.57k
  uint16_t family;
2246
6.57k
  uint8_t source, scope;
2247
6.57k
  if(len < 4) {
2248
1.54k
    w += sldns_str_print(s, sl, "malformed subnet ");
2249
1.54k
    w += print_hex_buf(s, sl, data, len);
2250
1.54k
    return w;
2251
1.54k
  }
2252
5.02k
  family = sldns_read_uint16(data);
2253
5.02k
  source = data[2];
2254
5.02k
  scope = data[3];
2255
5.02k
  if(family == 1) {
2256
    /* IP4 */
2257
530
    char buf[64];
2258
530
    uint8_t ip4[4];
2259
530
    memset(ip4, 0, sizeof(ip4));
2260
530
    if(len-4 > 4) {
2261
392
      w += sldns_str_print(s, sl, "trailingdata:");
2262
392
      w += print_hex_buf(s, sl, data+4+4, len-4-4);
2263
392
      w += sldns_str_print(s, sl, " ");
2264
392
      len = 4+4;
2265
392
    }
2266
530
    memmove(ip4, data+4, len-4);
2267
530
    if(!inet_ntop(AF_INET, ip4, buf, (socklen_t)sizeof(buf))) {
2268
0
      w += sldns_str_print(s, sl, "ip4ntoperror ");
2269
0
      w += print_hex_buf(s, sl, data+4+4, len-4-4);
2270
530
    } else {
2271
530
      w += sldns_str_print(s, sl, "%s", buf);
2272
530
    }
2273
4.49k
  } else if(family == 2) {
2274
    /* IP6 */
2275
609
    char buf[64];
2276
609
    uint8_t ip6[16];
2277
609
    memset(ip6, 0, sizeof(ip6));
2278
609
    if(len-4 > 16) {
2279
351
      w += sldns_str_print(s, sl, "trailingdata:");
2280
351
      w += print_hex_buf(s, sl, data+4+16, len-4-16);
2281
351
      w += sldns_str_print(s, sl, " ");
2282
351
      len = 4+16;
2283
351
    }
2284
609
    memmove(ip6, data+4, len-4);
2285
609
#ifdef AF_INET6
2286
609
    if(!inet_ntop(AF_INET6, ip6, buf, (socklen_t)sizeof(buf))) {
2287
0
      w += sldns_str_print(s, sl, "ip6ntoperror ");
2288
0
      w += print_hex_buf(s, sl, data+4+4, len-4-4);
2289
609
    } else {
2290
609
      w += sldns_str_print(s, sl, "%s", buf);
2291
609
    }
2292
#else
2293
    w += print_hex_buf(s, sl, data+4+4, len-4-4);
2294
#endif
2295
3.89k
  } else {
2296
    /* unknown */
2297
3.89k
    w += sldns_str_print(s, sl, "family %d ",
2298
3.89k
      (int)family);
2299
3.89k
    w += print_hex_buf(s, sl, data, len);
2300
3.89k
  }
2301
5.02k
  w += sldns_str_print(s, sl, "/%d scope /%d", (int)source, (int)scope);
2302
5.02k
  return w;
2303
6.57k
}
2304
2305
static int sldns_wire2str_edns_keepalive_print(char** s, size_t* sl,
2306
  uint8_t* data, size_t len)
2307
1.06k
{
2308
1.06k
  int w = 0;
2309
1.06k
  uint16_t timeout;
2310
1.06k
  if(!(len == 0 || len == 2)) {
2311
395
    w += sldns_str_print(s, sl, "malformed keepalive ");
2312
395
    w += print_hex_buf(s, sl, data, len);
2313
395
    return w;
2314
395
  }
2315
666
  if(len == 0 ) {
2316
578
    w += sldns_str_print(s, sl, "no timeout value (only valid for client option) ");
2317
578
  } else {
2318
88
    timeout = sldns_read_uint16(data);
2319
88
    w += sldns_str_print(s, sl, "timeout value in units of 100ms %u", (int)timeout);
2320
88
  }
2321
666
  return w;
2322
1.06k
}
2323
2324
int sldns_wire2str_edns_ede_print(char** s, size_t* sl,
2325
  uint8_t* data, size_t len)
2326
2.19k
{
2327
2.19k
  uint16_t ede_code;
2328
2.19k
  int w = 0;
2329
2.19k
  sldns_lookup_table *lt;
2330
2.19k
  size_t i;
2331
2.19k
  int printable;
2332
2333
2.19k
  if(len < 2) {
2334
776
    w += sldns_str_print(s, sl, "malformed ede ");
2335
776
    w += print_hex_buf(s, sl, data, len);
2336
776
    return w;
2337
776
  }
2338
2339
1.42k
  ede_code = sldns_read_uint16(data);
2340
1.42k
  lt = sldns_lookup_by_id(sldns_edns_ede_codes, (int)ede_code);
2341
1.42k
  if(lt && lt->name)
2342
348
    w += sldns_str_print(s, sl, "%s", lt->name);
2343
1.07k
  else  w += sldns_str_print(s, sl, "%d", (int)ede_code);
2344
2345
1.42k
  if(len == 2)
2346
269
    return w;
2347
2348
1.15k
  w += sldns_str_print(s, sl, " ");
2349
2350
  /* If it looks like text, show it as text. */
2351
1.15k
  printable=1;
2352
9.39k
  for(i=2; i<len; i++) {
2353
9.27k
    if(isprint((unsigned char)data[i]) || data[i] == '\t')
2354
8.24k
      continue;
2355
1.02k
    printable = 0;
2356
1.02k
    break;
2357
9.27k
  }
2358
1.15k
  if(printable) {
2359
122
    w += sldns_str_print(s, sl, "\"");
2360
1.54k
    for(i=2; i<len; i++) {
2361
1.41k
      w += str_char_print(s, sl, data[i]);
2362
1.41k
    }
2363
122
    w += sldns_str_print(s, sl, "\"");
2364
1.02k
  } else {
2365
1.02k
    w += print_hex_buf(s, sl, data+2, len-2);
2366
1.02k
  }
2367
1.15k
  return w;
2368
1.42k
}
2369
2370
int sldns_wire2str_edns_option_print(char** s, size_t* sl,
2371
  uint16_t option_code, uint8_t* optdata, size_t optlen)
2372
49.9k
{
2373
49.9k
  int w = 0;
2374
49.9k
  w += sldns_wire2str_edns_option_code_print(s, sl, option_code);
2375
49.9k
  w += sldns_str_print(s, sl, ": ");
2376
49.9k
  switch(option_code) {
2377
1.75k
  case LDNS_EDNS_LLQ:
2378
1.75k
    w += sldns_wire2str_edns_llq_print(s, sl, optdata, optlen);
2379
1.75k
    break;
2380
1.54k
  case LDNS_EDNS_UL:
2381
1.54k
    w += sldns_wire2str_edns_ul_print(s, sl, optdata, optlen);
2382
1.54k
    break;
2383
2.46k
  case LDNS_EDNS_NSID:
2384
2.46k
    w += sldns_wire2str_edns_nsid_print(s, sl, optdata, optlen);
2385
2.46k
    break;
2386
368
  case LDNS_EDNS_DAU:
2387
368
    w += sldns_wire2str_edns_dau_print(s, sl, optdata, optlen);
2388
368
    break;
2389
551
  case LDNS_EDNS_DHU:
2390
551
    w += sldns_wire2str_edns_dhu_print(s, sl, optdata, optlen);
2391
551
    break;
2392
442
  case LDNS_EDNS_N3U:
2393
442
    w += sldns_wire2str_edns_n3u_print(s, sl, optdata, optlen);
2394
442
    break;
2395
2.27k
  case LDNS_EDNS_CLIENT_SUBNET:
2396
2.27k
    w += sldns_wire2str_edns_subnet_print(s, sl, optdata, optlen);
2397
2.27k
    break;
2398
1.06k
   case LDNS_EDNS_KEEPALIVE:
2399
1.06k
    w += sldns_wire2str_edns_keepalive_print(s, sl, optdata, optlen);
2400
1.06k
    break;
2401
771
  case LDNS_EDNS_PADDING:
2402
771
    w += print_hex_buf(s, sl, optdata, optlen);
2403
771
    break;
2404
2.19k
  case LDNS_EDNS_EDE:
2405
2.19k
    w += sldns_wire2str_edns_ede_print(s, sl, optdata, optlen);
2406
2.19k
    break;
2407
36.5k
  default:
2408
    /* unknown option code */
2409
36.5k
    w += print_hex_buf(s, sl, optdata, optlen);
2410
36.5k
    break;
2411
49.9k
  }
2412
49.9k
  return w;
2413
49.9k
}
2414
2415
/** print the edns options to string */
2416
static int
2417
print_edns_opts(char** s, size_t* sl, uint8_t* rdata, size_t rdatalen)
2418
2.48k
{
2419
2.48k
  uint16_t option_code, option_len;
2420
2.48k
  int w = 0;
2421
52.4k
  while(rdatalen > 0) {
2422
    /* option name */
2423
51.5k
    if(rdatalen < 4) {
2424
529
      w += sldns_str_print(s, sl, " ; malformed: ");
2425
529
      w += print_hex_buf(s, sl, rdata, rdatalen);
2426
529
      return w;
2427
529
    }
2428
51.0k
    option_code = sldns_read_uint16(rdata);
2429
51.0k
    option_len = sldns_read_uint16(rdata+2);
2430
51.0k
    rdata += 4;
2431
51.0k
    rdatalen -= 4;
2432
2433
    /* option value */
2434
51.0k
    if(rdatalen < (size_t)option_len) {
2435
1.08k
      w += sldns_str_print(s, sl, " ; malformed ");
2436
1.08k
      w += sldns_wire2str_edns_option_code_print(s, sl,
2437
1.08k
        option_code);
2438
1.08k
      w += sldns_str_print(s, sl, ": ");
2439
1.08k
      w += print_hex_buf(s, sl, rdata, rdatalen);
2440
1.08k
      return w;
2441
1.08k
    }
2442
49.9k
    w += sldns_str_print(s, sl, " ; ");
2443
49.9k
    w += sldns_wire2str_edns_option_print(s, sl, option_code,
2444
49.9k
      rdata, option_len);
2445
49.9k
    rdata += option_len;
2446
49.9k
    rdatalen -= option_len;
2447
49.9k
  }
2448
875
  return w;
2449
2.48k
}
2450
2451
int sldns_wire2str_edns_scan(uint8_t** data, size_t* data_len, char** str,
2452
        size_t* str_len, uint8_t* pkt, size_t pktlen)
2453
3.14k
{
2454
3.14k
  int w = 0;
2455
3.14k
  uint8_t ext_rcode, edns_version;
2456
3.14k
  uint16_t udpsize, edns_bits, rdatalen;
2457
3.14k
  w += sldns_str_print(str, str_len, "; EDNS:");
2458
2459
  /* some input checks, domain name */
2460
3.14k
  if(*data_len < 1+10)
2461
12
    return w + print_remainder_hex("Error malformed 0x",
2462
12
      data, data_len, str, str_len);
2463
3.13k
  if(*data[0] != 0) {
2464
0
    return w + print_remainder_hex("Error nonrootdname 0x",
2465
0
      data, data_len, str, str_len);
2466
0
  }
2467
3.13k
  (*data)++;
2468
3.13k
  (*data_len)--;
2469
2470
  /* check type and read fixed contents */
2471
3.13k
  if(sldns_read_uint16((*data)) != LDNS_RR_TYPE_OPT) {
2472
0
    return w + print_remainder_hex("Error nottypeOPT 0x",
2473
0
      data, data_len, str, str_len);
2474
0
  }
2475
3.13k
  udpsize = sldns_read_uint16((*data)+2);
2476
3.13k
  ext_rcode = (*data)[4];
2477
3.13k
  edns_version = (*data)[5];
2478
3.13k
  edns_bits = sldns_read_uint16((*data)+6);
2479
3.13k
  rdatalen = sldns_read_uint16((*data)+8);
2480
3.13k
  (*data)+=10;
2481
3.13k
  (*data_len)-=10;
2482
2483
3.13k
  w += sldns_str_print(str, str_len, " version: %u;",
2484
3.13k
    (unsigned)edns_version);
2485
3.13k
  w += sldns_str_print(str, str_len, " flags:");
2486
3.13k
  if((edns_bits & LDNS_EDNS_MASK_DO_BIT))
2487
820
    w += sldns_str_print(str, str_len, " do");
2488
  /* the extended rcode is the value set, shifted four bits,
2489
   * and or'd with the original rcode */
2490
3.13k
  if(ext_rcode) {
2491
1.58k
    int rc = ((int)ext_rcode)<<4;
2492
1.58k
    if(pkt && pktlen >= LDNS_HEADER_SIZE)
2493
1.58k
      rc |= LDNS_RCODE_WIRE(pkt);
2494
1.58k
    w += sldns_str_print(str, str_len, " ; ext-rcode: %d", rc);
2495
1.58k
  }
2496
3.13k
  w += sldns_str_print(str, str_len, " ; udp: %u", (unsigned)udpsize);
2497
2498
3.13k
  if(rdatalen) {
2499
2.48k
    if((size_t)*data_len < rdatalen) {
2500
701
      w += sldns_str_print(str, str_len,
2501
701
        " ; Error EDNS rdata too short; ");
2502
701
      rdatalen = (uint16_t)*data_len;
2503
701
    }
2504
2.48k
    w += print_edns_opts(str, str_len, *data, rdatalen);
2505
2.48k
    (*data) += rdatalen;
2506
2.48k
    (*data_len) -= rdatalen;
2507
2.48k
  }
2508
3.13k
  w += sldns_str_print(str, str_len, "\n");
2509
3.13k
  return w;
2510
3.13k
}