Coverage Report

Created: 2026-03-14 06:20

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/unbound/sldns/wire2str.c
Line
Count
Source
1
/*
2
 * wire2str.c
3
 *
4
 * conversion routines from the wire format
5
 * to the presentation format (strings)
6
 *
7
 * (c) NLnet Labs, 2004-2006
8
 *
9
 * See the file LICENSE for the license
10
 */
11
/**
12
 * \file
13
 *
14
 * Contains functions to translate the wireformat to text
15
 * representation, as well as functions to print them.
16
 */
17
#include "config.h"
18
#include "sldns/wire2str.h"
19
#include "sldns/str2wire.h"
20
#include "sldns/rrdef.h"
21
#include "sldns/pkthdr.h"
22
#include "sldns/parseutil.h"
23
#include "sldns/sbuffer.h"
24
#include "sldns/keyraw.h"
25
#include "util/data/dname.h"
26
#ifdef HAVE_TIME_H
27
#include <time.h>
28
#endif
29
#include <sys/time.h>
30
#include <stdarg.h>
31
#include <ctype.h>
32
#ifdef HAVE_NETDB_H
33
#include <netdb.h>
34
#endif
35
36
/* lookup tables for standard DNS stuff  */
37
/* Taken from RFC 2535, section 7.  */
38
static sldns_lookup_table sldns_algorithms_data[] = {
39
  { LDNS_RSAMD5, "RSAMD5" },
40
  { LDNS_DH, "DH" },
41
  { LDNS_DSA, "DSA" },
42
  { LDNS_ECC, "ECC" },
43
  { LDNS_RSASHA1, "RSASHA1" },
44
  { LDNS_DSA_NSEC3, "DSA-NSEC3-SHA1" },
45
  { LDNS_RSASHA1_NSEC3, "RSASHA1-NSEC3-SHA1" },
46
  { LDNS_RSASHA256, "RSASHA256"},
47
  { LDNS_RSASHA512, "RSASHA512"},
48
  { LDNS_ECC_GOST, "ECC-GOST"},
49
  { LDNS_ECDSAP256SHA256, "ECDSAP256SHA256"},
50
  { LDNS_ECDSAP384SHA384, "ECDSAP384SHA384"},
51
  { LDNS_ED25519, "ED25519"},
52
  { LDNS_ED448, "ED448"},
53
  { LDNS_INDIRECT, "INDIRECT" },
54
  { LDNS_PRIVATEDNS, "PRIVATEDNS" },
55
  { LDNS_PRIVATEOID, "PRIVATEOID" },
56
  { 0, NULL }
57
};
58
sldns_lookup_table* sldns_algorithms = sldns_algorithms_data;
59
60
/* hash algorithms in DS record */
61
static sldns_lookup_table sldns_hashes_data[] = {
62
  { LDNS_SHA1, "SHA1" },
63
  { LDNS_SHA256, "SHA256" },
64
  { LDNS_HASH_GOST, "HASH-GOST" },
65
  { LDNS_SHA384, "SHA384" },
66
  { 0, NULL }
67
};
68
sldns_lookup_table* sldns_hashes = sldns_hashes_data;
69
70
/* Taken from RFC 4398  */
71
static sldns_lookup_table sldns_cert_algorithms_data[] = {
72
  { LDNS_CERT_PKIX, "PKIX" },
73
  { LDNS_CERT_SPKI, "SPKI" },
74
  { LDNS_CERT_PGP, "PGP" },
75
  { LDNS_CERT_IPKIX, "IPKIX" },
76
  { LDNS_CERT_ISPKI, "ISPKI" },
77
  { LDNS_CERT_IPGP, "IPGP" },
78
  { LDNS_CERT_ACPKIX, "ACPKIX" },
79
  { LDNS_CERT_IACPKIX, "IACPKIX" },
80
  { LDNS_CERT_URI, "URI" },
81
  { LDNS_CERT_OID, "OID" },
82
  { 0, NULL }
83
};
84
sldns_lookup_table* sldns_cert_algorithms = sldns_cert_algorithms_data;
85
86
/* if these are used elsewhere */
87
static sldns_lookup_table sldns_rcodes_data[] = {
88
  { LDNS_RCODE_NOERROR, "NOERROR" },
89
  { LDNS_RCODE_FORMERR, "FORMERR" },
90
  { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
91
  { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
92
  { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
93
  { LDNS_RCODE_REFUSED, "REFUSED" },
94
  { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
95
  { LDNS_RCODE_YXRRSET, "YXRRSET" },
96
  { LDNS_RCODE_NXRRSET, "NXRRSET" },
97
  { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
98
  { LDNS_RCODE_NOTZONE, "NOTZONE" },
99
  { 0, NULL }
100
};
101
sldns_lookup_table* sldns_rcodes = sldns_rcodes_data;
102
103
static sldns_lookup_table sldns_opcodes_data[] = {
104
  { LDNS_PACKET_QUERY, "QUERY" },
105
  { LDNS_PACKET_IQUERY, "IQUERY" },
106
  { LDNS_PACKET_STATUS, "STATUS" },
107
  { LDNS_PACKET_NOTIFY, "NOTIFY" },
108
  { LDNS_PACKET_UPDATE, "UPDATE" },
109
  { 0, NULL }
110
};
111
sldns_lookup_table* sldns_opcodes = sldns_opcodes_data;
112
113
static sldns_lookup_table sldns_wireparse_errors_data[] = {
114
  { LDNS_WIREPARSE_ERR_OK, "no parse error" },
115
  { LDNS_WIREPARSE_ERR_GENERAL, "parse error" },
116
  { LDNS_WIREPARSE_ERR_DOMAINNAME_OVERFLOW, "Domainname length overflow" },
117
  { LDNS_WIREPARSE_ERR_DOMAINNAME_UNDERFLOW, "Domainname length underflow (zero length)" },
118
  { LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL, "buffer too small" },
119
  { LDNS_WIREPARSE_ERR_LABEL_OVERFLOW, "Label length overflow" },
120
  { LDNS_WIREPARSE_ERR_EMPTY_LABEL, "Empty label" },
121
  { LDNS_WIREPARSE_ERR_SYNTAX_BAD_ESCAPE, "Syntax error, bad escape sequence" },
122
  { LDNS_WIREPARSE_ERR_SYNTAX, "Syntax error, could not parse the RR" },
123
  { LDNS_WIREPARSE_ERR_SYNTAX_TTL, "Syntax error, could not parse the RR's TTL" },
124
  { LDNS_WIREPARSE_ERR_SYNTAX_TYPE, "Syntax error, could not parse the RR's type" },
125
  { LDNS_WIREPARSE_ERR_SYNTAX_CLASS, "Syntax error, could not parse the RR's class" },
126
  { LDNS_WIREPARSE_ERR_SYNTAX_RDATA, "Syntax error, could not parse the RR's rdata" },
127
  { LDNS_WIREPARSE_ERR_SYNTAX_MISSING_VALUE, "Syntax error, value expected" },
128
  { LDNS_WIREPARSE_ERR_INVALID_STR, "Conversion error, string expected" },
129
  { LDNS_WIREPARSE_ERR_SYNTAX_B64, "Conversion error, b64 encoding expected" },
130
  { LDNS_WIREPARSE_ERR_SYNTAX_B32_EXT, "Conversion error, b32 ext encoding expected" },
131
  { LDNS_WIREPARSE_ERR_SYNTAX_HEX, "Conversion error, hex encoding expected" },
132
  { LDNS_WIREPARSE_ERR_CERT_BAD_ALGORITHM, "Bad algorithm type for CERT record" },
133
  { LDNS_WIREPARSE_ERR_SYNTAX_TIME, "Conversion error, time encoding expected" },
134
  { LDNS_WIREPARSE_ERR_SYNTAX_PERIOD, "Conversion error, time period encoding expected" },
135
  { LDNS_WIREPARSE_ERR_SYNTAX_ILNP64, "Conversion error, 4 colon separated hex numbers expected" },
136
  { LDNS_WIREPARSE_ERR_SYNTAX_EUI48,
137
    "Conversion error, 6 two character hex numbers "
138
    "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx" },
139
  { LDNS_WIREPARSE_ERR_SYNTAX_EUI64,
140
    "Conversion error, 8 two character hex numbers "
141
    "separated by dashes expected (i.e. xx-xx-xx-xx-xx-xx-xx-xx" },
142
  { LDNS_WIREPARSE_ERR_SYNTAX_TAG,
143
    "Conversion error, a non-zero sequence of US-ASCII letters "
144
    "and numbers in lower case expected" },
145
  { LDNS_WIREPARSE_ERR_NOT_IMPL, "not implemented" },
146
  { LDNS_WIREPARSE_ERR_SYNTAX_INT, "Conversion error, integer expected" },
147
  { LDNS_WIREPARSE_ERR_SYNTAX_IP4, "Conversion error, ip4 addr expected" },
148
  { LDNS_WIREPARSE_ERR_SYNTAX_IP6, "Conversion error, ip6 addr expected" },
149
  { LDNS_WIREPARSE_ERR_SYNTAX_INTEGER_OVERFLOW, "Syntax error, integer overflow" },
150
  { LDNS_WIREPARSE_ERR_INCLUDE, "$INCLUDE directive was seen in the zone" },
151
  { LDNS_WIREPARSE_ERR_PARENTHESIS, "Parse error, parenthesis mismatch" },
152
  { LDNS_WIREPARSE_ERR_SVCB_UNKNOWN_KEY, "Unknown SvcParamKey"},
153
  { LDNS_WIREPARSE_ERR_SVCB_MISSING_PARAM, "SvcParam is missing a SvcParamValue"},
154
  { LDNS_WIREPARSE_ERR_SVCB_DUPLICATE_KEYS, "Duplicate SVCB key found"},
155
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_TOO_MANY_KEYS, "Too many keys in mandatory" },
156
  { LDNS_WIREPARSE_ERR_SVCB_TOO_MANY_PARAMS,
157
    "Too many SvcParams. Unbound only allows 63 entries" },
158
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_MISSING_PARAM,
159
    "Mandatory SvcParamKey is missing"},
160
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_DUPLICATE_KEY,
161
    "Keys in SvcParam mandatory MUST be unique" },
162
  { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_IN_MANDATORY,
163
    "mandatory MUST not be included as mandatory parameter" },
164
  { LDNS_WIREPARSE_ERR_SVCB_PORT_VALUE_SYNTAX,
165
    "Could not parse port SvcParamValue" },
166
  { LDNS_WIREPARSE_ERR_SVCB_IPV4_TOO_MANY_ADDRESSES,
167
    "Too many IPv4 addresses in ipv4hint" },
168
  { LDNS_WIREPARSE_ERR_SVCB_IPV6_TOO_MANY_ADDRESSES,
169
    "Too many IPv6 addresses in ipv6hint" },
170
  { LDNS_WIREPARSE_ERR_SVCB_ALPN_KEY_TOO_LARGE,
171
    "Alpn strings need to be smaller than 255 chars"},
172
  { LDNS_WIREPARSE_ERR_SVCB_NO_DEFAULT_ALPN_VALUE,
173
    "No-default-alpn should not have a value" },
174
  { LDNS_WIREPARSE_ERR_SVCPARAM_BROKEN_RDATA,
175
    "General SVCParam error" },
176
  { 0, NULL }
177
};
178
sldns_lookup_table* sldns_wireparse_errors = sldns_wireparse_errors_data;
179
180
static sldns_lookup_table sldns_edns_flags_data[] = {
181
  { 3600, "do"},
182
  { 0, NULL}
183
};
184
sldns_lookup_table* sldns_edns_flags = sldns_edns_flags_data;
185
186
static sldns_lookup_table sldns_edns_options_data[] = {
187
  { 1, "LLQ" },
188
  { 2, "UL" },
189
  { 3, "NSID" },
190
  /* 4 draft-cheshire-edns0-owner-option */
191
  { 5, "DAU" },
192
  { 6, "DHU" },
193
  { 7, "N3U" },
194
  { 8, "edns-client-subnet" },
195
  { 10, "COOKIE" },
196
  { 11, "edns-tcp-keepalive"},
197
  { 12, "Padding" },
198
  { 15, "EDE"},
199
  { 0, NULL}
200
};
201
sldns_lookup_table* sldns_edns_options = sldns_edns_options_data;
202
203
/* From RFC8914 5.2 Table 3, the "Extended DNS Error Codes" registry. */
204
static sldns_lookup_table sldns_edns_ede_codes_data[] = {
205
  { LDNS_EDE_NONE, "None" },
206
  { LDNS_EDE_OTHER, "Other Error" },
207
  { LDNS_EDE_UNSUPPORTED_DNSKEY_ALG, "Unsupported DNSKEY Algorithm" },
208
  { LDNS_EDE_UNSUPPORTED_DS_DIGEST, "Unsupported DS Digest Type" },
209
  { LDNS_EDE_STALE_ANSWER, "Stale Answer" },
210
  { LDNS_EDE_FORGED_ANSWER, "Forged Answer" },
211
  { LDNS_EDE_DNSSEC_INDETERMINATE, "DNSSEC Indeterminate" },
212
  { LDNS_EDE_DNSSEC_BOGUS, "DNSSEC Bogus" },
213
  { LDNS_EDE_SIGNATURE_EXPIRED, "Signature Expired" },
214
  { LDNS_EDE_SIGNATURE_NOT_YET_VALID, "Signature Not Yet Valid" },
215
  { LDNS_EDE_DNSKEY_MISSING, "DNSKEY Missing" },
216
  { LDNS_EDE_RRSIGS_MISSING, "RRSIGs Missing" },
217
  { LDNS_EDE_NO_ZONE_KEY_BIT_SET, "No Zone Key Bit Set" },
218
  { LDNS_EDE_NSEC_MISSING, "NSEC Missing" },
219
  { LDNS_EDE_CACHED_ERROR, "Cached Error" },
220
  { LDNS_EDE_NOT_READY, "Not Ready" },
221
  { LDNS_EDE_BLOCKED, "Blocked" },
222
  { LDNS_EDE_CENSORED, "Censored" },
223
  { LDNS_EDE_FILTERED, "Filtered" },
224
  { LDNS_EDE_PROHIBITED, "Prohibited" },
225
  { LDNS_EDE_STALE_NXDOMAIN_ANSWER, "Stale NXDOMAIN Answer" },
226
  { LDNS_EDE_NOT_AUTHORITATIVE, "Not Authoritative" },
227
  { LDNS_EDE_NOT_SUPPORTED, "Not Supported" },
228
  { LDNS_EDE_NO_REACHABLE_AUTHORITY, "No Reachable Authority" },
229
  { LDNS_EDE_NETWORK_ERROR, "Network Error" },
230
  { LDNS_EDE_INVALID_DATA, "Invalid Data" },
231
  { LDNS_EDE_SIGNATURE_EXPIRED_BEFORE_VALID, "Signature Expired Before Valid" },
232
  { LDNS_EDE_TOO_EARLY, "Non-Replayable Transactions Received in 0-RTT Data" },
233
  { LDNS_EDE_UNSUPPORTED_NSEC3_ITERATIONS, "Unsupported NSEC3 Iterations Value" },
234
  { LDNS_EDE_BADPROXYPOLICY, "Unable to Conform to Policy" },
235
  { LDNS_EDE_SYNTHESIZED, "Synthesized Answer" },
236
  { LDNS_EDE_INVALID_QUERY_TYPE, "Invalid Query Type" },
237
  { 0, NULL}
238
};
239
sldns_lookup_table* sldns_edns_ede_codes = sldns_edns_ede_codes_data;
240
241
static sldns_lookup_table sldns_tsig_errors_data[] = {
242
  { LDNS_TSIG_ERROR_NOERROR, "NOERROR" },
243
  { LDNS_RCODE_FORMERR, "FORMERR" },
244
  { LDNS_RCODE_SERVFAIL, "SERVFAIL" },
245
  { LDNS_RCODE_NXDOMAIN, "NXDOMAIN" },
246
  { LDNS_RCODE_NOTIMPL, "NOTIMPL" },
247
  { LDNS_RCODE_REFUSED, "REFUSED" },
248
  { LDNS_RCODE_YXDOMAIN, "YXDOMAIN" },
249
  { LDNS_RCODE_YXRRSET, "YXRRSET" },
250
  { LDNS_RCODE_NXRRSET, "NXRRSET" },
251
  { LDNS_RCODE_NOTAUTH, "NOTAUTH" },
252
  { LDNS_RCODE_NOTZONE, "NOTZONE" },
253
  { LDNS_TSIG_ERROR_BADSIG, "BADSIG" },
254
  { LDNS_TSIG_ERROR_BADKEY, "BADKEY" },
255
  { LDNS_TSIG_ERROR_BADTIME, "BADTIME" },
256
  { LDNS_TSIG_ERROR_BADMODE, "BADMODE" },
257
  { LDNS_TSIG_ERROR_BADNAME, "BADNAME" },
258
  { LDNS_TSIG_ERROR_BADALG, "BADALG" },
259
  { 0, NULL }
260
};
261
sldns_lookup_table* sldns_tsig_errors = sldns_tsig_errors_data;
262
263
/* draft-ietf-dnsop-svcb-https-06: 6. Initial SvcParamKeys */
264
const char *svcparamkey_strs[] = {
265
  "mandatory", "alpn", "no-default-alpn", "port",
266
  "ipv4hint", "ech", "ipv6hint", "dohpath"
267
};
268
269
char* sldns_wire2str_pkt(uint8_t* data, size_t len)
270
0
{
271
0
  size_t slen = (size_t)sldns_wire2str_pkt_buf(data, len, NULL, 0);
272
0
  char* result = (char*)malloc(slen+1);
273
0
  if(!result) return NULL;
274
0
  sldns_wire2str_pkt_buf(data, len, result, slen+1);
275
0
  return result;
276
0
}
277
278
char* sldns_wire2str_rr(uint8_t* rr, size_t len)
279
0
{
280
0
  size_t slen = (size_t)sldns_wire2str_rr_buf(rr, len, NULL, 0);
281
0
  char* result = (char*)malloc(slen+1);
282
0
  if(!result) return NULL;
283
0
  sldns_wire2str_rr_buf(rr, len, result, slen+1);
284
0
  return result;
285
0
}
286
287
char* sldns_wire2str_type(uint16_t rrtype)
288
0
{
289
0
  char buf[16];
290
0
  sldns_wire2str_type_buf(rrtype, buf, sizeof(buf));
291
0
  return strdup(buf);
292
0
}
293
294
char* sldns_wire2str_class(uint16_t rrclass)
295
0
{
296
0
  char buf[16];
297
0
  sldns_wire2str_class_buf(rrclass, buf, sizeof(buf));
298
0
  return strdup(buf);
299
0
}
300
301
char* sldns_wire2str_dname(uint8_t* dname, size_t dname_len)
302
0
{
303
0
  size_t slen=(size_t)sldns_wire2str_dname_buf(dname, dname_len, NULL, 0);
304
0
  char* result = (char*)malloc(slen+1);
305
0
  if(!result) return NULL;
306
0
  sldns_wire2str_dname_buf(dname, dname_len, result, slen+1);
307
0
  return result;
308
0
}
309
310
char* sldns_wire2str_rcode(int rcode)
311
0
{
312
0
  char buf[16];
313
0
  sldns_wire2str_rcode_buf(rcode, buf, sizeof(buf));
314
0
  return strdup(buf);
315
0
}
316
317
int sldns_wire2str_pkt_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
318
0
{
319
  /* use arguments as temporary variables */
320
0
  return sldns_wire2str_pkt_scan(&d, &dlen, &s, &slen);
321
0
}
322
323
int sldns_wire2str_rr_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
324
0
{
325
  /* use arguments as temporary variables */
326
0
  return sldns_wire2str_rr_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
327
0
}
328
329
int sldns_wire2str_rrquestion_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
330
0
{
331
  /* use arguments as temporary variables */
332
0
  return sldns_wire2str_rrquestion_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
333
0
}
334
335
int sldns_wire2str_rdata_buf(uint8_t* rdata, size_t rdata_len, char* str,
336
  size_t str_len, uint16_t rrtype)
337
0
{
338
  /* use arguments as temporary variables */
339
0
  return sldns_wire2str_rdata_scan(&rdata, &rdata_len, &str, &str_len,
340
0
    rrtype, NULL, 0, NULL);
341
0
}
342
343
int sldns_wire2str_rr_unknown_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
344
0
{
345
  /* use arguments as temporary variables */
346
0
  return sldns_wire2str_rr_unknown_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
347
0
}
348
349
int sldns_wire2str_rr_comment_buf(uint8_t* rr, size_t rrlen, size_t dname_len,
350
  char* s, size_t slen)
351
0
{
352
0
  uint16_t rrtype = sldns_wirerr_get_type(rr, rrlen, dname_len);
353
0
  return sldns_wire2str_rr_comment_print(&s, &slen, rr, rrlen, dname_len,
354
0
    rrtype);
355
0
}
356
357
int sldns_wire2str_type_buf(uint16_t rrtype, char* s, size_t slen)
358
0
{
359
  /* use arguments as temporary variables */
360
0
  return sldns_wire2str_type_print(&s, &slen, rrtype);
361
0
}
362
363
int sldns_wire2str_class_buf(uint16_t rrclass, char* s, size_t slen)
364
0
{
365
  /* use arguments as temporary variables */
366
0
  return sldns_wire2str_class_print(&s, &slen, rrclass);
367
0
}
368
369
int sldns_wire2str_rcode_buf(int rcode, char* s, size_t slen)
370
0
{
371
  /* use arguments as temporary variables */
372
0
  return sldns_wire2str_rcode_print(&s, &slen, rcode);
373
0
}
374
375
int sldns_wire2str_opcode_buf(int opcode, char* s, size_t slen)
376
0
{
377
  /* use arguments as temporary variables */
378
0
  return sldns_wire2str_opcode_print(&s, &slen, opcode);
379
0
}
380
381
int sldns_wire2str_dname_buf(uint8_t* d, size_t dlen, char* s, size_t slen)
382
0
{
383
  /* use arguments as temporary variables */
384
0
  return sldns_wire2str_dname_scan(&d, &dlen, &s, &slen, NULL, 0, NULL);
385
0
}
386
387
int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args)
388
1.08G
{
389
1.08G
  int w = vsnprintf(*str, *slen, format, args);
390
1.08G
  if(w < 0) {
391
    /* error in printout */
392
0
    return 0;
393
1.08G
  } else if((size_t)w >= *slen) {
394
1.08G
    *str = NULL; /* we do not want str to point outside of buffer*/
395
1.08G
    *slen = 0;
396
1.08G
  } else {
397
1.68M
    *str += w;
398
1.68M
    *slen -= w;
399
1.68M
  }
400
1.08G
  return w;
401
1.08G
}
402
403
int sldns_str_print(char** str, size_t* slen, const char* format, ...)
404
1.08G
{
405
1.08G
  int w;
406
1.08G
  va_list args;
407
1.08G
  va_start(args, format);
408
1.08G
  w = sldns_str_vprint(str, slen, format, args);
409
1.08G
  va_end(args);
410
1.08G
  return w;
411
1.08G
}
412
413
/** print hex format into text buffer for specified length */
414
static int print_hex_buf(char** s, size_t* slen, uint8_t* buf, size_t len)
415
84.5k
{
416
84.5k
  const char* hex = "0123456789ABCDEF";
417
84.5k
  size_t i;
418
549M
  for(i=0; i<len; i++) {
419
549M
    (void)sldns_str_print(s, slen, "%c%c", hex[(buf[i]&0xf0)>>4],
420
549M
      hex[buf[i]&0x0f]);
421
549M
  }
422
84.5k
  return (int)len*2;
423
84.5k
}
424
425
/** print remainder of buffer in hex format with prefixed text */
426
static int print_remainder_hex(const char* pref, uint8_t** d, size_t* dlen,
427
  char** s, size_t* slen)
428
5.69k
{
429
5.69k
  int w = 0;
430
5.69k
  w += sldns_str_print(s, slen, "%s", pref);
431
5.69k
  w += print_hex_buf(s, slen, *d, *dlen);
432
5.69k
  *d += *dlen;
433
5.69k
  *dlen = 0;
434
5.69k
  return w;
435
5.69k
}
436
437
int sldns_wire2str_pkt_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
438
4.60k
{
439
4.60k
  int w = 0, comprloop = 0;
440
4.60k
  unsigned qdcount, ancount, nscount, arcount, i;
441
4.60k
  uint8_t* pkt = *d;
442
4.60k
  size_t pktlen = *dlen;
443
4.60k
  if(*dlen >= LDNS_HEADER_SIZE) {
444
4.31k
    qdcount = (unsigned)LDNS_QDCOUNT(*d);
445
4.31k
    ancount = (unsigned)LDNS_ANCOUNT(*d);
446
4.31k
    nscount = (unsigned)LDNS_NSCOUNT(*d);
447
4.31k
    arcount = (unsigned)LDNS_ARCOUNT(*d);
448
4.31k
  } else {
449
288
    qdcount = ancount = nscount = arcount = 0;
450
288
  }
451
4.60k
  w += sldns_wire2str_header_scan(d, dlen, s, slen);
452
4.60k
  w += sldns_str_print(s, slen, "\n");
453
4.60k
  w += sldns_str_print(s, slen, ";; QUESTION SECTION:\n");
454
540k
  for(i=0; i<qdcount; i++) {
455
536k
    w += sldns_wire2str_rrquestion_scan(d, dlen, s, slen,
456
536k
      pkt, pktlen, &comprloop);
457
536k
    if(!*dlen) break;
458
536k
  }
459
4.60k
  w += sldns_str_print(s, slen, "\n");
460
4.60k
  w += sldns_str_print(s, slen, ";; ANSWER SECTION:\n");
461
70.8k
  for(i=0; i<ancount; i++) {
462
69.5k
    w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
463
69.5k
    if(!*dlen) break;
464
69.5k
  }
465
4.60k
  w += sldns_str_print(s, slen, "\n");
466
4.60k
  w += sldns_str_print(s, slen, ";; AUTHORITY SECTION:\n");
467
102k
  for(i=0; i<nscount; i++) {
468
101k
    w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
469
101k
    if(!*dlen) break;
470
101k
  }
471
4.60k
  w += sldns_str_print(s, slen, "\n");
472
4.60k
  w += sldns_str_print(s, slen, ";; ADDITIONAL SECTION:\n");
473
137k
  for(i=0; i<arcount; i++) {
474
136k
    w += sldns_wire2str_rr_scan(d, dlen, s, slen, pkt, pktlen, &comprloop);
475
136k
    if(!*dlen) break;
476
136k
  }
477
  /* other fields: WHEN(time), SERVER(IP) not available here. */
478
4.60k
  w += sldns_str_print(s, slen, ";; MSG SIZE  rcvd: %d\n", (int)pktlen);
479
4.60k
  if(*dlen > 0) {
480
53
    w += print_remainder_hex(";; trailing garbage 0x",
481
53
      d, dlen, s, slen);
482
53
    w += sldns_str_print(s, slen, "\n");
483
53
  }
484
4.60k
  return w;
485
4.60k
}
486
487
/** scan type, class and ttl and printout, for rr */
488
static int sldns_rr_tcttl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
489
298k
{
490
298k
  int w = 0;
491
298k
  uint16_t t, c;
492
298k
  uint32_t ttl;
493
298k
  if(*dl < 8) {
494
0
    if(*dl < 4)
495
0
      return w + print_remainder_hex("; Error malformed 0x",
496
0
        d, dl, s, sl);
497
    /* these print values or 0x.. if none left */
498
0
    t = sldns_read_uint16(*d);
499
0
    c = sldns_read_uint16((*d)+2);
500
0
    (*d)+=4;
501
0
    (*dl)-=4;
502
0
    w += sldns_wire2str_class_print(s, sl, c);
503
0
    w += sldns_str_print(s, sl, "\t");
504
0
    w += sldns_wire2str_type_print(s, sl, t);
505
0
    if(*dl == 0)
506
0
      return w + sldns_str_print(s, sl, "; Error no ttl");
507
0
    return w + print_remainder_hex(
508
0
      "; Error malformed ttl 0x", d, dl, s, sl);
509
0
  }
510
298k
  t = sldns_read_uint16(*d);
511
298k
  c = sldns_read_uint16((*d)+2);
512
298k
  ttl = sldns_read_uint32((*d)+4);
513
298k
  (*d)+=8;
514
298k
  (*dl)-=8;
515
298k
  w += sldns_str_print(s, sl, "%lu\t", (unsigned long)ttl);
516
298k
  w += sldns_wire2str_class_print(s, sl, c);
517
298k
  w += sldns_str_print(s, sl, "\t");
518
298k
  w += sldns_wire2str_type_print(s, sl, t);
519
298k
  return w;
520
298k
}
521
522
int sldns_wire2str_rr_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
523
  uint8_t* pkt, size_t pktlen, int* comprloop)
524
308k
{
525
308k
  int w = 0;
526
308k
  uint8_t* rr = *d;
527
308k
  size_t rrlen = *dlen, dname_off, rdlen, ordlen;
528
308k
  uint16_t rrtype = 0;
529
530
308k
  if(*dlen >= 3 && (*d)[0]==0 &&
531
273k
    sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
532
    /* perform EDNS OPT processing */
533
2.51k
    return sldns_wire2str_edns_scan(d, dlen, s, slen, pkt, pktlen);
534
2.51k
  }
535
536
  /* try to scan the rdata with pretty-printing, but if that fails, then
537
   * scan the rdata as an unknown RR type */
538
305k
  w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
539
305k
  w += sldns_str_print(s, slen, "\t");
540
305k
  dname_off = rrlen-(*dlen);
541
305k
  if(*dlen == 4) {
542
    /* like a question-RR */
543
41
    uint16_t t = sldns_read_uint16(*d);
544
41
    uint16_t c = sldns_read_uint16((*d)+2);
545
41
    (*d)+=4;
546
41
    (*dlen)-=4;
547
41
    w += sldns_wire2str_class_print(s, slen, c);
548
41
    w += sldns_str_print(s, slen, "\t");
549
41
    w += sldns_wire2str_type_print(s, slen, t);
550
41
    w += sldns_str_print(s, slen, " ; Error no ttl,rdata\n");
551
41
    return w;
552
41
  }
553
305k
  if(*dlen < 8) {
554
7.06k
    if(*dlen == 0)
555
6.86k
      return w + sldns_str_print(s, slen, ";Error missing RR\n");
556
206
    w += print_remainder_hex(";Error partial RR 0x", d, dlen, s, slen);
557
206
    return w + sldns_str_print(s, slen, "\n");
558
7.06k
  }
559
298k
  rrtype = sldns_read_uint16(*d);
560
298k
  w += sldns_rr_tcttl_scan(d, dlen, s, slen);
561
298k
  w += sldns_str_print(s, slen, "\t");
562
563
  /* rdata */
564
298k
  if(*dlen < 2) {
565
41
    if(*dlen == 0)
566
30
      return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
567
11
    w += print_remainder_hex(";Error missing rdatalen 0x",
568
11
      d, dlen, s, slen);
569
11
    return w + sldns_str_print(s, slen, "\n");
570
41
  }
571
298k
  rdlen = sldns_read_uint16(*d);
572
298k
  ordlen = rdlen;
573
298k
  (*d)+=2;
574
298k
  (*dlen)-=2;
575
298k
  if(*dlen < rdlen) {
576
656
    w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
577
656
    if(*dlen == 0)
578
28
      return w + sldns_str_print(s, slen, ";Error missing rdata\n");
579
628
    w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
580
628
    return w + sldns_str_print(s, slen, "\n");
581
656
  }
582
297k
  w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen,
583
297k
    comprloop);
584
297k
  (*dlen) -= (ordlen-rdlen);
585
586
  /* default comment */
587
297k
  w += sldns_wire2str_rr_comment_print(s, slen, rr, rrlen, dname_off,
588
297k
    rrtype);
589
297k
  w += sldns_str_print(s, slen, "\n");
590
297k
  return w;
591
298k
}
592
593
int sldns_wire2str_rrquestion_scan(uint8_t** d, size_t* dlen, char** s,
594
  size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
595
536k
{
596
536k
  int w = 0;
597
536k
  uint16_t t, c;
598
536k
  w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
599
536k
  w += sldns_str_print(s, slen, "\t");
600
536k
  if(*dlen < 4) {
601
425
    if(*dlen == 0)
602
312
      return w + sldns_str_print(s, slen, "Error malformed\n");
603
113
    w += print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
604
113
    return w + sldns_str_print(s, slen, "\n");
605
425
  }
606
536k
  t = sldns_read_uint16(*d);
607
536k
  c = sldns_read_uint16((*d)+2);
608
536k
  (*d)+=4;
609
536k
  (*dlen)-=4;
610
536k
  w += sldns_wire2str_class_print(s, slen, c);
611
536k
  w += sldns_str_print(s, slen, "\t");
612
536k
  w += sldns_wire2str_type_print(s, slen, t);
613
536k
  w += sldns_str_print(s, slen, "\n");
614
536k
  return w;
615
536k
}
616
617
int sldns_wire2str_rr_unknown_scan(uint8_t** d, size_t* dlen, char** s,
618
  size_t* slen, uint8_t* pkt, size_t pktlen, int* comprloop)
619
0
{
620
0
  size_t rdlen, ordlen;
621
0
  int w = 0;
622
0
  w += sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
623
0
  w += sldns_str_print(s, slen, "\t");
624
0
  w += sldns_rr_tcttl_scan(d, dlen, s, slen);
625
0
  w += sldns_str_print(s, slen, "\t");
626
0
  if(*dlen < 2) {
627
0
    if(*dlen == 0)
628
0
      return w + sldns_str_print(s, slen, ";Error missing rdatalen\n");
629
0
    w += print_remainder_hex(";Error missing rdatalen 0x",
630
0
      d, dlen, s, slen);
631
0
    return w + sldns_str_print(s, slen, "\n");
632
0
  }
633
0
  rdlen = sldns_read_uint16(*d);
634
0
  ordlen = rdlen;
635
0
  (*d) += 2;
636
0
  (*dlen) -= 2;
637
0
  if(*dlen < rdlen) {
638
0
    w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen);
639
0
    if(*dlen == 0)
640
0
      return w + sldns_str_print(s, slen, ";Error missing rdata\n");
641
0
    w += print_remainder_hex(";Error partial rdata 0x", d, dlen, s, slen);
642
0
    return w + sldns_str_print(s, slen, "\n");
643
0
  }
644
0
  w += sldns_wire2str_rdata_unknown_scan(d, &rdlen, s, slen);
645
0
  (*dlen) -= (ordlen-rdlen);
646
0
  w += sldns_str_print(s, slen, "\n");
647
0
  return w;
648
0
}
649
650
/** print rr comment for type DNSKEY */
651
static int rr_comment_dnskey(char** s, size_t* slen, uint8_t* rr,
652
  size_t rrlen, size_t dname_off)
653
10.8k
{
654
10.8k
  size_t rdlen;
655
10.8k
  uint8_t* rdata;
656
10.8k
  int flags, w = 0;
657
10.8k
  if(rrlen < dname_off + 10) return 0;
658
10.8k
  rdlen = sldns_read_uint16(rr+dname_off+8);
659
10.8k
  if(rrlen < dname_off + 10 + rdlen) return 0;
660
10.8k
  if(rdlen < 2) return 0;
661
10.3k
  rdata = rr + dname_off + 10;
662
10.3k
  flags = (int)sldns_read_uint16(rdata);
663
10.3k
  w += sldns_str_print(s, slen, " ;{");
664
665
  /* id */
666
10.3k
  w += sldns_str_print(s, slen, "id = %u",
667
10.3k
    sldns_calc_keytag_raw(rdata, rdlen));
668
669
  /* flags */
670
10.3k
  if((flags&LDNS_KEY_ZONE_KEY)) {
671
7.43k
    if((flags&LDNS_KEY_SEP_KEY))
672
6.37k
      w += sldns_str_print(s, slen, " (ksk)");
673
1.06k
    else  w += sldns_str_print(s, slen, " (zsk)");
674
7.43k
  }
675
676
  /* keysize */
677
10.3k
  if(rdlen > 4) {
678
9.27k
    w += sldns_str_print(s, slen, ", ");
679
9.27k
    w += sldns_str_print(s, slen, "size = %db",
680
9.27k
      (int)sldns_rr_dnskey_key_size_raw(
681
9.27k
      (unsigned char*)rdata+4, rdlen-4, (int)(rdata[3])));
682
9.27k
  }
683
684
10.3k
  w += sldns_str_print(s, slen, "}");
685
10.3k
  return w;
686
10.8k
}
687
688
/** print rr comment for type RRSIG */
689
static int rr_comment_rrsig(char** s, size_t* slen, uint8_t* rr,
690
  size_t rrlen, size_t dname_off)
691
2.10k
{
692
2.10k
  size_t rdlen;
693
2.10k
  uint8_t* rdata;
694
2.10k
  if(rrlen < dname_off + 10) return 0;
695
2.10k
  rdlen = sldns_read_uint16(rr+dname_off+8);
696
2.10k
  if(rrlen < dname_off + 10 + rdlen) return 0;
697
2.10k
  rdata = rr + dname_off + 10;
698
2.10k
  if(rdlen < 18) return 0;
699
642
  return sldns_str_print(s, slen, " ;{id = %d}",
700
642
    (int)sldns_read_uint16(rdata+16));
701
2.10k
}
702
703
/** print rr comment for type NSEC3 */
704
static int rr_comment_nsec3(char** s, size_t* slen, uint8_t* rr,
705
  size_t rrlen, size_t dname_off)
706
3.86k
{
707
3.86k
  size_t rdlen;
708
3.86k
  uint8_t* rdata;
709
3.86k
  int w = 0;
710
3.86k
  if(rrlen < dname_off + 10) return 0;
711
3.86k
  rdlen = sldns_read_uint16(rr+dname_off+8);
712
3.86k
  if(rrlen < dname_off + 10 + rdlen) return 0;
713
3.86k
  rdata = rr + dname_off + 10;
714
3.86k
  if(rdlen < 2) return 0;
715
3.31k
  if((rdata[1] & LDNS_NSEC3_VARS_OPTOUT_MASK))
716
1.51k
    w += sldns_str_print(s, slen, " ;{flags: optout}");
717
3.31k
  return w;
718
3.86k
}
719
720
int sldns_wire2str_rr_comment_print(char** s, size_t* slen, uint8_t* rr,
721
  size_t rrlen, size_t dname_off, uint16_t rrtype)
722
297k
{
723
297k
  if(rrtype == LDNS_RR_TYPE_DNSKEY) {
724
10.8k
    return rr_comment_dnskey(s, slen, rr, rrlen, dname_off);
725
286k
  } else if(rrtype == LDNS_RR_TYPE_RRSIG) {
726
2.10k
    return rr_comment_rrsig(s, slen, rr, rrlen, dname_off);
727
284k
  } else if(rrtype == LDNS_RR_TYPE_NSEC3) {
728
3.86k
    return rr_comment_nsec3(s, slen, rr, rrlen, dname_off);
729
3.86k
  }
730
280k
  return 0;
731
297k
}
732
733
int sldns_wire2str_header_scan(uint8_t** d, size_t* dlen, char** s,
734
  size_t* slen)
735
9.21k
{
736
9.21k
  int w = 0;
737
9.21k
  int opcode, rcode;
738
9.21k
  w += sldns_str_print(s, slen, ";; ->>HEADER<<- ");
739
9.21k
  if(*dlen == 0)
740
0
    return w+sldns_str_print(s, slen, "Error empty packet");
741
9.21k
  if(*dlen < 4)
742
226
    return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
743
8.98k
  opcode = (int)LDNS_OPCODE_WIRE(*d);
744
8.98k
  rcode = (int)LDNS_RCODE_WIRE(*d);
745
8.98k
  w += sldns_str_print(s, slen, "opcode: ");
746
8.98k
  w += sldns_wire2str_opcode_print(s, slen, opcode);
747
8.98k
  w += sldns_str_print(s, slen, ", ");
748
8.98k
  w += sldns_str_print(s, slen, "rcode: ");
749
8.98k
  w += sldns_wire2str_rcode_print(s, slen, rcode);
750
8.98k
  w += sldns_str_print(s, slen, ", ");
751
8.98k
  w += sldns_str_print(s, slen, "id: %d\n", (int)LDNS_ID_WIRE(*d));
752
8.98k
  w += sldns_str_print(s, slen, ";; flags:");
753
8.98k
  if(LDNS_QR_WIRE(*d)) w += sldns_str_print(s, slen, " qr");
754
8.98k
  if(LDNS_AA_WIRE(*d)) w += sldns_str_print(s, slen, " aa");
755
8.98k
  if(LDNS_TC_WIRE(*d)) w += sldns_str_print(s, slen, " tc");
756
8.98k
  if(LDNS_RD_WIRE(*d)) w += sldns_str_print(s, slen, " rd");
757
8.98k
  if(LDNS_CD_WIRE(*d)) w += sldns_str_print(s, slen, " cd");
758
8.98k
  if(LDNS_RA_WIRE(*d)) w += sldns_str_print(s, slen, " ra");
759
8.98k
  if(LDNS_AD_WIRE(*d)) w += sldns_str_print(s, slen, " ad");
760
8.98k
  if(LDNS_Z_WIRE(*d))  w += sldns_str_print(s, slen, " z");
761
8.98k
  w += sldns_str_print(s, slen, " ; ");
762
8.98k
  if(*dlen < LDNS_HEADER_SIZE)
763
350
    return w+print_remainder_hex("Error header too short 0x", d, dlen, s, slen);
764
8.63k
  w += sldns_str_print(s, slen, "QUERY: %d, ", (int)LDNS_QDCOUNT(*d));
765
8.63k
  w += sldns_str_print(s, slen, "ANSWER: %d, ", (int)LDNS_ANCOUNT(*d));
766
8.63k
  w += sldns_str_print(s, slen, "AUTHORITY: %d, ", (int)LDNS_NSCOUNT(*d));
767
8.63k
  w += sldns_str_print(s, slen, "ADDITIONAL: %d ", (int)LDNS_ARCOUNT(*d));
768
8.63k
  *d += LDNS_HEADER_SIZE;
769
8.63k
  *dlen -= LDNS_HEADER_SIZE;
770
8.63k
  return w;
771
8.98k
}
772
773
int sldns_wire2str_rdata_scan(uint8_t** d, size_t* dlen, char** s,
774
  size_t* slen, uint16_t rrtype, uint8_t* pkt, size_t pktlen,
775
  int* comprloop)
776
297k
{
777
  /* try to prettyprint, but if that fails, use unknown format */
778
297k
  uint8_t* origd = *d;
779
297k
  char* origs = *s;
780
297k
  size_t origdlen = *dlen, origslen = *slen;
781
297k
  size_t r_cnt, r_max;
782
297k
  sldns_rdf_type rdftype;
783
297k
  int w = 0, n;
784
785
297k
  const sldns_rr_descriptor *desc = sldns_rr_descript(rrtype);
786
297k
  if(!desc) /* unknown format */
787
0
    return sldns_wire2str_rdata_unknown_scan(d, dlen, s, slen);
788
  /* dlen equals the rdatalen for the rdata */
789
790
297k
  r_max = sldns_rr_descriptor_maximum(desc);
791
630k
  for(r_cnt=0; r_cnt < r_max; r_cnt++) {
792
601k
    if(*dlen == 0) {
793
245k
      if(r_cnt < sldns_rr_descriptor_minimum(desc))
794
8.35k
        goto failed;
795
237k
      break; /* nothing more to print */
796
245k
    }
797
356k
    rdftype = sldns_rr_descriptor_field_type(desc, r_cnt);
798
356k
    if(r_cnt != 0)
799
295k
      w += sldns_str_print(s, slen, " ");
800
356k
    n = sldns_wire2str_rdf_scan(d, dlen, s, slen, rdftype,
801
356k
      pkt, pktlen, comprloop);
802
356k
    if(n == -1) {
803
33.5k
    failed:
804
      /* failed, use unknown format */
805
33.5k
      *d = origd; *s = origs;
806
33.5k
      *dlen = origdlen; *slen = origslen;
807
33.5k
      return sldns_wire2str_rdata_unknown_scan(d, dlen,
808
33.5k
        s, slen);
809
23.4k
    }
810
332k
    w += n;
811
332k
  }
812
265k
  if(*dlen != 0) {
813
1.79k
    goto failed;
814
1.79k
  }
815
264k
  return w;
816
265k
}
817
818
int sldns_wire2str_rdata_unknown_scan(uint8_t** d, size_t* dlen, char** s,
819
  size_t* slen)
820
47.0k
{
821
47.0k
  int w = 0;
822
823
  /* print length */
824
47.0k
  w += sldns_str_print(s, slen, "\\# %u", (unsigned)*dlen);
825
826
  /* print rdlen in hex */
827
47.0k
  if(*dlen != 0)
828
42.8k
    w += sldns_str_print(s, slen, " ");
829
47.0k
  w += print_hex_buf(s, slen, *d, *dlen);
830
47.0k
  (*d) += *dlen;
831
47.0k
  (*dlen) = 0;
832
47.0k
  return w;
833
47.0k
}
834
835
/** print and escape one character for a domain dname */
836
static int dname_char_print(char** s, size_t* slen, uint8_t c)
837
6.15M
{
838
6.15M
  if(c == '.' || c == ';' || c == '(' || c == ')' || c == '\\')
839
26.4k
    return sldns_str_print(s, slen, "\\%c", c);
840
6.12M
  else if(!(isascii((unsigned char)c) && isgraph((unsigned char)c)))
841
1.82M
    return sldns_str_print(s, slen, "\\%03u", (unsigned)c);
842
  /* plain printout */
843
4.29M
  if(*slen) {
844
440
    **s = (char)c;
845
440
    (*s)++;
846
440
    (*slen)--;
847
440
  }
848
4.29M
  return 1;
849
6.15M
}
850
851
int sldns_wire2str_dname_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
852
  uint8_t* pkt, size_t pktlen, int* comprloop)
853
949k
{
854
949k
  int w = 0;
855
  /* spool labels onto the string, use compression if its there */
856
949k
  uint8_t* pos = *d;
857
949k
  unsigned i, counter=0;
858
949k
  unsigned maxcompr = MAX_COMPRESS_PTRS; /* loop detection, max compr ptrs */
859
949k
  int in_buf = 1;
860
949k
  size_t dname_len = 0;
861
949k
  if(comprloop) {
862
949k
    if(*comprloop != 0)
863
29.1k
      maxcompr = 30; /* for like ipv6 reverse name, per label */
864
949k
    if(*comprloop > 4)
865
26.1k
      maxcompr = 4; /* just don't want to spend time, any more */
866
949k
  }
867
949k
  if(*dlen == 0) return sldns_str_print(s, slen, "ErrorMissingDname");
868
942k
  if(*pos == 0) {
869
760k
    (*d)++;
870
760k
    (*dlen)--;
871
760k
    return sldns_str_print(s, slen, ".");
872
760k
  }
873
608k
  while((!pkt || pos < pkt+pktlen) && *pos) {
874
    /* read label length */
875
499k
    uint8_t labellen = *pos++;
876
499k
    if(in_buf) { (*d)++; (*dlen)--; }
877
878
    /* find out what sort of label we have */
879
499k
    if((labellen&0xc0) == 0xc0) {
880
      /* compressed */
881
96.5k
      uint16_t target = 0;
882
96.5k
      if(in_buf && *dlen == 0)
883
299
        return w + sldns_str_print(s, slen,
884
299
          "ErrorPartialDname");
885
96.2k
      else if(!in_buf && pos+1 > pkt+pktlen)
886
201
        return w + sldns_str_print(s, slen,
887
201
          "ErrorPartialDname");
888
96.0k
      target = ((labellen&0x3f)<<8) | *pos;
889
96.0k
      if(in_buf) { (*d)++; (*dlen)--; }
890
      /* move to target, if possible */
891
96.0k
      if(!pkt || target >= pktlen)
892
5.12k
        return w + sldns_str_print(s, slen,
893
5.12k
          "ErrorComprPtrOutOfBounds");
894
90.8k
      if(counter++ > maxcompr) {
895
1.10k
        if(comprloop && *comprloop < 10)
896
304
          (*comprloop)++;
897
1.10k
        return w + sldns_str_print(s, slen,
898
1.10k
          "ErrorComprPtrLooped");
899
1.10k
      }
900
89.7k
      in_buf = 0;
901
89.7k
      pos = pkt+target;
902
89.7k
      continue;
903
402k
    } else if((labellen&0xc0)) {
904
      /* notimpl label type */
905
46.7k
      w += sldns_str_print(s, slen,
906
46.7k
        "ErrorLABELTYPE%xIsUnknown",
907
46.7k
        (int)(labellen&0xc0));
908
46.7k
      return w;
909
46.7k
    }
910
911
    /* spool label characters, end with '.' */
912
356k
    if(in_buf && *dlen < (size_t)labellen)
913
489
      labellen = (uint8_t)*dlen;
914
355k
    else if(!in_buf && pos+(size_t)labellen > pkt+pktlen)
915
752
      labellen = (uint8_t)(pkt + pktlen - pos);
916
356k
    dname_len += ((size_t)labellen)+1;
917
356k
    if(dname_len > LDNS_MAX_DOMAINLEN) {
918
      /* dname_len counts the uncompressed length we have
919
       * seen so far, and the domain name has become too
920
       * long, prevent the loop from printing overly long
921
       * content. */
922
18.2k
      w += sldns_str_print(s, slen,
923
18.2k
        "ErrorDomainNameTooLong");
924
18.2k
      return w;
925
18.2k
    }
926
6.48M
    for(i=0; i<(unsigned)labellen; i++) {
927
6.15M
      w += dname_char_print(s, slen, *pos++);
928
6.15M
    }
929
337k
    if(in_buf) {
930
225k
      (*d) += labellen;
931
225k
      (*dlen) -= labellen;
932
225k
      if(*dlen == 0) break;
933
225k
    }
934
337k
    w += sldns_str_print(s, slen, ".");
935
337k
  }
936
  /* skip over final root label */
937
110k
  if(in_buf && *dlen > 0) { (*d)++; (*dlen)--; }
938
  /* in case we printed no labels, terminate dname */
939
110k
  if(w == 0) w += sldns_str_print(s, slen, ".");
940
110k
  return w;
941
181k
}
942
943
int sldns_wire2str_opcode_print(char** s, size_t* slen, int opcode)
944
8.98k
{
945
8.98k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_opcodes, opcode);
946
8.98k
  if (lt && lt->name) {
947
6.14k
    return sldns_str_print(s, slen, "%s", lt->name);
948
6.14k
  }
949
2.84k
  return sldns_str_print(s, slen, "OPCODE%u", (unsigned)opcode);
950
8.98k
}
951
952
int sldns_wire2str_rcode_print(char** s, size_t* slen, int rcode)
953
8.98k
{
954
8.98k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rcodes, rcode);
955
8.98k
  if (lt && lt->name) {
956
7.25k
    return sldns_str_print(s, slen, "%s", lt->name);
957
7.25k
  }
958
1.72k
  return sldns_str_print(s, slen, "RCODE%u", (unsigned)rcode);
959
8.98k
}
960
961
int sldns_wire2str_class_print(char** s, size_t* slen, uint16_t rrclass)
962
834k
{
963
834k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_rr_classes,
964
834k
    (int)rrclass);
965
834k
  if (lt && lt->name) {
966
29.6k
    return sldns_str_print(s, slen, "%s", lt->name);
967
29.6k
  }
968
805k
  return sldns_str_print(s, slen, "CLASS%u", (unsigned)rrclass);
969
834k
}
970
971
int sldns_wire2str_type_print(char** s, size_t* slen, uint16_t rrtype)
972
24.9M
{
973
24.9M
  const sldns_rr_descriptor *descriptor = sldns_rr_descript(rrtype);
974
24.9M
  if (descriptor && descriptor->_name) {
975
2.09M
    return sldns_str_print(s, slen, "%s", descriptor->_name);
976
2.09M
  }
977
22.8M
  return sldns_str_print(s, slen, "TYPE%u", (unsigned)rrtype);
978
24.9M
}
979
980
int sldns_wire2str_edns_option_code_print(char** s, size_t* slen,
981
  uint16_t opcode)
982
11.5k
{
983
11.5k
  sldns_lookup_table *lt = sldns_lookup_by_id(sldns_edns_options,
984
11.5k
    (int)opcode);
985
11.5k
  if (lt && lt->name) {
986
8.90k
    return sldns_str_print(s, slen, "%s", lt->name);
987
8.90k
  }
988
2.62k
  return sldns_str_print(s, slen, "OPT%u", (unsigned)opcode);
989
11.5k
}
990
991
int sldns_wire2str_class_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
992
0
{
993
0
  uint16_t c;
994
0
  if(*dlen == 0) return 0;
995
0
  if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
996
0
  c = sldns_read_uint16(*d);
997
0
  (*d)+=2;
998
0
  (*dlen)-=2;
999
0
  return sldns_wire2str_class_print(s, slen, c);
1000
0
}
1001
1002
int sldns_wire2str_type_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
1003
1.94k
{
1004
1.94k
  uint16_t t;
1005
1.94k
  if(*dlen == 0) return 0;
1006
1.94k
  if(*dlen < 2) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
1007
1.63k
  t = sldns_read_uint16(*d);
1008
1.63k
  (*d)+=2;
1009
1.63k
  (*dlen)-=2;
1010
1.63k
  return sldns_wire2str_type_print(s, slen, t);
1011
1.94k
}
1012
1013
int sldns_wire2str_ttl_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
1014
0
{
1015
0
  uint32_t ttl;
1016
0
  if(*dlen == 0) return 0;
1017
0
  if(*dlen < 4) return print_remainder_hex("Error malformed 0x", d, dlen, s, slen);
1018
0
  ttl = sldns_read_uint32(*d);
1019
0
  (*d)+=4;
1020
0
  (*dlen)-=4;
1021
0
  return sldns_str_print(s, slen, "%u", (unsigned)ttl);
1022
0
}
1023
1024
static int
1025
sldns_print_svcparamkey(char** s, size_t* slen, uint16_t svcparamkey)
1026
169k
{
1027
169k
  if (svcparamkey < SVCPARAMKEY_COUNT) {
1028
85.8k
    return sldns_str_print(s, slen, "%s", svcparamkey_strs[svcparamkey]);
1029
85.8k
  }
1030
83.5k
  else {
1031
83.5k
    return sldns_str_print(s, slen, "key%d", (int)svcparamkey);
1032
83.5k
  }
1033
169k
}
1034
1035
static int sldns_wire2str_svcparam_port2str(char** s,
1036
  size_t* slen, uint16_t data_len, uint8_t* data)
1037
4.99k
{
1038
4.99k
  int w = 0;
1039
1040
4.99k
  if (data_len != 2)
1041
216
    return -1; /* wireformat error, a short is 2 bytes */
1042
4.78k
  w = sldns_str_print(s, slen, "=%d", (int)sldns_read_uint16(data));
1043
1044
4.78k
  return w;
1045
4.99k
}
1046
1047
static int sldns_wire2str_svcparam_ipv4hint2str(char** s,
1048
  size_t* slen, uint16_t data_len, uint8_t* data)
1049
1.12k
{
1050
1.12k
  char ip_str[INET_ADDRSTRLEN + 1];
1051
1052
1.12k
  int w = 0;
1053
1054
1.12k
  assert(data_len > 0);
1055
1056
1.12k
  if ((data_len % LDNS_IP4ADDRLEN) == 0) {
1057
856
    if (inet_ntop(AF_INET, data, ip_str, sizeof(ip_str)) == NULL)
1058
0
      return -1; /* wireformat error, incorrect size or inet family */
1059
1060
856
    w += sldns_str_print(s, slen, "=%s", ip_str);
1061
856
    data += LDNS_IP4ADDRLEN;
1062
1063
2.06k
    while ((data_len -= LDNS_IP4ADDRLEN) > 0) {
1064
1.20k
      if (inet_ntop(AF_INET, data, ip_str, sizeof(ip_str)) == NULL)
1065
0
        return -1; /* wireformat error, incorrect size or inet family */
1066
1067
1.20k
      w += sldns_str_print(s, slen, ",%s", ip_str);
1068
1.20k
      data += LDNS_IP4ADDRLEN;
1069
1.20k
    }
1070
856
  } else
1071
268
    return -1;
1072
1073
856
  return w;
1074
1.12k
}
1075
1076
static int sldns_wire2str_svcparam_ipv6hint2str(char** s,
1077
  size_t* slen, uint16_t data_len, uint8_t* data)
1078
850
{
1079
850
  char ip_str[INET6_ADDRSTRLEN + 1];
1080
1081
850
  int w = 0;
1082
1083
850
  assert(data_len > 0);
1084
1085
850
  if ((data_len % LDNS_IP6ADDRLEN) == 0) {
1086
429
    if (inet_ntop(AF_INET6, data, ip_str, sizeof(ip_str)) == NULL)
1087
0
      return -1; /* wireformat error, incorrect size or inet family */
1088
1089
429
    w += sldns_str_print(s, slen, "=%s", ip_str);
1090
429
    data += LDNS_IP6ADDRLEN;
1091
1092
7.72k
    while ((data_len -= LDNS_IP6ADDRLEN) > 0) {
1093
7.29k
      if (inet_ntop(AF_INET6, data, ip_str, sizeof(ip_str)) == NULL)
1094
0
        return -1; /* wireformat error, incorrect size or inet family */
1095
1096
7.29k
      w += sldns_str_print(s, slen, ",%s", ip_str);
1097
7.29k
      data += LDNS_IP6ADDRLEN;
1098
7.29k
    }
1099
429
  } else
1100
421
    return -1;
1101
1102
429
  return w;
1103
850
}
1104
1105
static int sldns_wire2str_svcparam_mandatory2str(char** s,
1106
  size_t* slen, uint16_t data_len, uint8_t* data)
1107
1.20k
{
1108
1.20k
  int w = 0;
1109
1110
1.20k
  assert(data_len > 0);
1111
1112
1.20k
  if (data_len % sizeof(uint16_t))
1113
315
    return -1; /* wireformat error, data_len must be multiple of shorts */
1114
885
  w += sldns_str_print(s, slen, "=");
1115
885
  w += sldns_print_svcparamkey(s, slen, sldns_read_uint16(data));
1116
885
  data += 2;
1117
1118
143k
  while ((data_len -= sizeof(uint16_t))) {
1119
142k
    w += sldns_str_print(s, slen, ",");
1120
142k
    w += sldns_print_svcparamkey(s, slen, sldns_read_uint16(data));
1121
142k
    data += 2;
1122
142k
  }
1123
1124
885
  return w;
1125
1.20k
}
1126
1127
static int sldns_wire2str_svcparam_alpn2str(char** s,
1128
  size_t* slen, uint16_t data_len, uint8_t* data)
1129
9.98k
{
1130
9.98k
  uint8_t *dp = (void *)data;
1131
9.98k
  int w = 0;
1132
1133
9.98k
  assert(data_len > 0); /* Guaranteed by sldns_wire2str_svcparam_scan */
1134
1135
9.98k
  w += sldns_str_print(s, slen, "=\"");
1136
92.0k
  while (data_len) {
1137
    /* alpn is list of length byte (str_len) followed by a string of that size */
1138
82.7k
    uint8_t i, str_len = *dp++;
1139
1140
82.7k
    if (str_len > --data_len)
1141
694
      return -1;
1142
1143
261k
    for (i = 0; i < str_len; i++) {
1144
179k
      if (dp[i] == '"' || dp[i] == '\\')
1145
1.07k
        w += sldns_str_print(s, slen, "\\\\\\%c", dp[i]);
1146
1147
178k
      else if (dp[i] == ',')
1148
293
        w += sldns_str_print(s, slen, "\\\\%c", dp[i]);
1149
1150
177k
      else if (!isprint(dp[i]))
1151
163k
        w += sldns_str_print(s, slen, "\\%03u", (unsigned) dp[i]);
1152
1153
14.5k
      else
1154
14.5k
        w += sldns_str_print(s, slen, "%c", dp[i]);
1155
179k
    }
1156
82.0k
    dp += str_len;
1157
82.0k
    if ((data_len -= str_len))
1158
72.7k
      w += sldns_str_print(s, slen, "%s", ",");
1159
82.0k
  }
1160
9.29k
  w += sldns_str_print(s, slen, "\"");
1161
1162
9.29k
  return w;
1163
9.98k
}
1164
1165
static int sldns_wire2str_svcparam_ech2str(char** s,
1166
  size_t* slen, uint16_t data_len, uint8_t* data)
1167
399
{
1168
399
  int size;
1169
399
  int w = 0;
1170
1171
399
  assert(data_len > 0); /* Guaranteed by sldns_wire2str_svcparam_scan */
1172
1173
399
  w += sldns_str_print(s, slen, "=\"");
1174
1175
399
  if ((size = sldns_b64_ntop(data, data_len, *s, *slen)) < 0)
1176
389
    return -1;
1177
1178
10
  (*s) += size;
1179
10
  (*slen) -= size;
1180
1181
10
  w += sldns_str_print(s, slen, "\"");
1182
1183
10
  return w + size;
1184
399
}
1185
1186
int sldns_wire2str_svcparam_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen)
1187
29.3k
{
1188
29.3k
  uint8_t ch;
1189
29.3k
  uint16_t svcparamkey, data_len;
1190
29.3k
  int written_chars = 0;
1191
29.3k
  int r, i;
1192
1193
  /* verify that we have enough data to read svcparamkey and data_len */
1194
29.3k
  if(*dlen < 4)
1195
1.08k
    return -1;
1196
1197
28.2k
  svcparamkey = sldns_read_uint16(*d);
1198
28.2k
  data_len = sldns_read_uint16(*d+2);
1199
28.2k
  *d    += 4;
1200
28.2k
  *dlen -= 4;
1201
1202
  /* verify that we have data_len data */
1203
28.2k
  if (data_len > *dlen)
1204
2.10k
    return -1;
1205
1206
26.1k
  written_chars += sldns_print_svcparamkey(s, slen, svcparamkey);
1207
26.1k
  if (!data_len) {
1208
1209
    /* Some SvcParams MUST have values */
1210
2.45k
    switch (svcparamkey) {
1211
21
    case SVCB_KEY_ALPN:
1212
32
    case SVCB_KEY_PORT:
1213
50
    case SVCB_KEY_IPV4HINT:
1214
209
    case SVCB_KEY_IPV6HINT:
1215
896
    case SVCB_KEY_MANDATORY:
1216
905
    case SVCB_KEY_DOHPATH:
1217
905
      return -1;
1218
1.55k
    default:
1219
1.55k
      return written_chars;
1220
2.45k
    }
1221
2.45k
  }
1222
1223
23.6k
  switch (svcparamkey) {
1224
4.99k
  case SVCB_KEY_PORT:
1225
4.99k
    r = sldns_wire2str_svcparam_port2str(s, slen, data_len, *d);
1226
4.99k
    break;
1227
1.12k
  case SVCB_KEY_IPV4HINT:
1228
1.12k
    r = sldns_wire2str_svcparam_ipv4hint2str(s, slen, data_len, *d);
1229
1.12k
    break;
1230
850
  case SVCB_KEY_IPV6HINT:
1231
850
    r = sldns_wire2str_svcparam_ipv6hint2str(s, slen, data_len, *d);
1232
850
    break;
1233
1.20k
  case SVCB_KEY_MANDATORY:
1234
1.20k
    r = sldns_wire2str_svcparam_mandatory2str(s, slen, data_len, *d);
1235
1.20k
    break;
1236
1.21k
  case SVCB_KEY_NO_DEFAULT_ALPN:
1237
1.21k
    return -1;  /* wireformat error, should not have a value */
1238
9.98k
  case SVCB_KEY_ALPN:
1239
9.98k
    r = sldns_wire2str_svcparam_alpn2str(s, slen, data_len, *d);
1240
9.98k
    break;
1241
399
  case SVCB_KEY_ECH:
1242
399
    r = sldns_wire2str_svcparam_ech2str(s, slen, data_len, *d);
1243
399
    break;
1244
0
  case SVCB_KEY_DOHPATH:
1245
0
    ATTR_FALLTHROUGH
1246
    /* fallthrough */
1247
3.89k
  default:
1248
3.89k
    r = sldns_str_print(s, slen, "=\"");
1249
1250
546k
    for (i = 0; i < data_len; i++) {
1251
542k
      ch = (*d)[i];
1252
1253
542k
      if (ch == '"' || ch == '\\')
1254
1.29k
        r += sldns_str_print(s, slen, "\\%c", ch);
1255
1256
541k
      else if (!isprint(ch))
1257
481k
        r += sldns_str_print(s, slen, "\\%03u", (unsigned) ch);
1258
1259
60.0k
      else
1260
60.0k
        r += sldns_str_print(s, slen, "%c", ch);
1261
1262
542k
    }
1263
3.89k
    r += sldns_str_print(s, slen, "\"");
1264
3.89k
    break;
1265
23.6k
  }
1266
22.4k
  if (r <= 0)
1267
2.30k
    return -1; /* wireformat error */
1268
1269
20.1k
  written_chars += r;
1270
20.1k
  *d    += data_len;
1271
20.1k
  *dlen -= data_len;
1272
20.1k
  return written_chars;
1273
22.4k
}
1274
1275
int sldns_wire2str_rdf_scan(uint8_t** d, size_t* dlen, char** s, size_t* slen,
1276
  int rdftype, uint8_t* pkt, size_t pktlen, int* comprloop)
1277
356k
{
1278
356k
  if(*dlen == 0) return 0;
1279
356k
  switch(rdftype) {
1280
0
  case LDNS_RDF_TYPE_NONE:
1281
0
    return 0;
1282
106k
  case LDNS_RDF_TYPE_DNAME:
1283
106k
    return sldns_wire2str_dname_scan(d, dlen, s, slen, pkt, pktlen, comprloop);
1284
20.1k
  case LDNS_RDF_TYPE_INT8:
1285
20.1k
    return sldns_wire2str_int8_scan(d, dlen, s, slen);
1286
31.4k
  case LDNS_RDF_TYPE_INT16:
1287
31.4k
    return sldns_wire2str_int16_scan(d, dlen, s, slen);
1288
1.30k
  case LDNS_RDF_TYPE_INT32:
1289
1.30k
    return sldns_wire2str_int32_scan(d, dlen, s, slen);
1290
720
  case LDNS_RDF_TYPE_PERIOD:
1291
720
    return sldns_wire2str_period_scan(d, dlen, s, slen);
1292
955
  case LDNS_RDF_TYPE_TSIGTIME:
1293
955
    return sldns_wire2str_tsigtime_scan(d, dlen, s, slen);
1294
1.94k
  case LDNS_RDF_TYPE_A:
1295
1.94k
    return sldns_wire2str_a_scan(d, dlen, s, slen);
1296
538
  case LDNS_RDF_TYPE_AAAA:
1297
538
    return sldns_wire2str_aaaa_scan(d, dlen, s, slen);
1298
74.0k
  case LDNS_RDF_TYPE_STR:
1299
74.0k
    return sldns_wire2str_str_scan(d, dlen, s, slen);
1300
3.26k
  case LDNS_RDF_TYPE_APL:
1301
3.26k
    return sldns_wire2str_apl_scan(d, dlen, s, slen);
1302
0
  case LDNS_RDF_TYPE_B32_EXT:
1303
0
    return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
1304
10.5k
  case LDNS_RDF_TYPE_B64:
1305
10.5k
    return sldns_wire2str_b64_scan(d, dlen, s, slen);
1306
350
  case LDNS_RDF_TYPE_HEX:
1307
350
    return sldns_wire2str_hex_scan(d, dlen, s, slen);
1308
1.46k
  case LDNS_RDF_TYPE_NSEC:
1309
1.46k
    return sldns_wire2str_nsec_scan(d, dlen, s, slen);
1310
3.45k
  case LDNS_RDF_TYPE_NSEC3_SALT:
1311
3.45k
    return sldns_wire2str_nsec3_salt_scan(d, dlen, s, slen);
1312
1.94k
  case LDNS_RDF_TYPE_TYPE:
1313
1.94k
    return sldns_wire2str_type_scan(d, dlen, s, slen);
1314
0
  case LDNS_RDF_TYPE_CLASS:
1315
0
    return sldns_wire2str_class_scan(d, dlen, s, slen);
1316
790
  case LDNS_RDF_TYPE_CERT_ALG:
1317
790
    return sldns_wire2str_cert_alg_scan(d, dlen, s, slen);
1318
10.5k
  case LDNS_RDF_TYPE_ALG:
1319
10.5k
    return sldns_wire2str_alg_scan(d, dlen, s, slen);
1320
8.90k
  case LDNS_RDF_TYPE_UNKNOWN:
1321
8.90k
    return sldns_wire2str_unknown_scan(d, dlen, s, slen);
1322
3.15k
  case LDNS_RDF_TYPE_TIME:
1323
3.15k
    return sldns_wire2str_time_scan(d, dlen, s, slen);
1324
1.95k
  case LDNS_RDF_TYPE_LOC:
1325
1.95k
    return sldns_wire2str_loc_scan(d, dlen, s, slen);
1326
922
  case LDNS_RDF_TYPE_WKS:
1327
922
  case LDNS_RDF_TYPE_SERVICE:
1328
922
    return sldns_wire2str_wks_scan(d, dlen, s, slen);
1329
226
  case LDNS_RDF_TYPE_NSAP:
1330
226
    return sldns_wire2str_nsap_scan(d, dlen, s, slen);
1331
1.41k
  case LDNS_RDF_TYPE_ATMA:
1332
1.41k
    return sldns_wire2str_atma_scan(d, dlen, s, slen);
1333
2.58k
  case LDNS_RDF_TYPE_IPSECKEY:
1334
2.58k
    return sldns_wire2str_ipseckey_scan(d, dlen, s, slen, pkt,
1335
2.58k
      pktlen, comprloop);
1336
1.66k
  case LDNS_RDF_TYPE_HIP:
1337
1.66k
    return sldns_wire2str_hip_scan(d, dlen, s, slen);
1338
1.20k
  case LDNS_RDF_TYPE_INT16_DATA:
1339
1.20k
    return sldns_wire2str_int16_data_scan(d, dlen, s, slen);
1340
2.56k
  case LDNS_RDF_TYPE_NSEC3_NEXT_OWNER:
1341
2.56k
    return sldns_wire2str_b32_ext_scan(d, dlen, s, slen);
1342
479
  case LDNS_RDF_TYPE_ILNP64:
1343
479
    return sldns_wire2str_ilnp64_scan(d, dlen, s, slen);
1344
1.01k
  case LDNS_RDF_TYPE_EUI48:
1345
1.01k
    return sldns_wire2str_eui48_scan(d, dlen, s, slen);
1346
678
  case LDNS_RDF_TYPE_EUI64:
1347
678
    return sldns_wire2str_eui64_scan(d, dlen, s, slen);
1348
26.0k
  case LDNS_RDF_TYPE_UNQUOTED:
1349
26.0k
    return sldns_wire2str_unquoted_scan(d, dlen, s, slen);
1350
1.73k
  case LDNS_RDF_TYPE_TAG:
1351
1.73k
    return sldns_wire2str_tag_scan(d, dlen, s, slen);
1352
1.22k
  case LDNS_RDF_TYPE_LONG_STR:
1353
1.22k
    return sldns_wire2str_long_str_scan(d, dlen, s, slen);
1354
29.3k
  case LDNS_RDF_TYPE_SVCPARAM:
1355
29.3k
    return sldns_wire2str_svcparam_scan(d, dlen, s, slen);
1356
1.02k
  case LDNS_RDF_TYPE_TSIGERROR:
1357
1.02k
    return sldns_wire2str_tsigerror_scan(d, dlen, s, slen);
1358
356k
  }
1359
  /* unknown rdf type */
1360
0
  return -1;
1361
356k
}
1362
1363
int sldns_wire2str_int8_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1364
30.7k
{
1365
30.7k
  int w;
1366
30.7k
  if(*dl < 1) return -1;
1367
30.7k
  w = sldns_str_print(s, sl, "%u", (unsigned)**d);
1368
30.7k
  (*d)++;
1369
30.7k
  (*dl)--;
1370
30.7k
  return w;
1371
30.7k
}
1372
1373
int sldns_wire2str_int16_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1374
31.4k
{
1375
31.4k
  int w;
1376
31.4k
  if(*dl < 2) return -1;
1377
29.6k
  w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint16(*d));
1378
29.6k
  (*d)+=2;
1379
29.6k
  (*dl)-=2;
1380
29.6k
  return w;
1381
31.4k
}
1382
1383
int sldns_wire2str_int32_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1384
1.30k
{
1385
1.30k
  int w;
1386
1.30k
  if(*dl < 4) return -1;
1387
1.08k
  w = sldns_str_print(s, sl, "%lu", (unsigned long)sldns_read_uint32(*d));
1388
1.08k
  (*d)+=4;
1389
1.08k
  (*dl)-=4;
1390
1.08k
  return w;
1391
1.30k
}
1392
1393
int sldns_wire2str_period_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1394
720
{
1395
720
  int w;
1396
720
  if(*dl < 4) return -1;
1397
383
  w = sldns_str_print(s, sl, "%u", (unsigned)sldns_read_uint32(*d));
1398
383
  (*d)+=4;
1399
383
  (*dl)-=4;
1400
383
  return w;
1401
720
}
1402
1403
int sldns_wire2str_tsigtime_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1404
955
{
1405
  /* tsigtime is 48 bits network order unsigned integer */
1406
955
  int w;
1407
955
  uint64_t tsigtime = 0;
1408
955
  uint64_t d0, d1, d2, d3, d4, d5;
1409
955
  if(*dl < 6) return -1;
1410
759
  d0 = (*d)[0]; /* cast to uint64 for shift operations */
1411
759
  d1 = (*d)[1];
1412
759
  d2 = (*d)[2];
1413
759
  d3 = (*d)[3];
1414
759
  d4 = (*d)[4];
1415
759
  d5 = (*d)[5];
1416
759
  tsigtime = (d0<<40) | (d1<<32) | (d2<<24) | (d3<<16) | (d4<<8) | d5;
1417
759
#ifndef USE_WINSOCK
1418
759
  w = sldns_str_print(s, sl, "%llu", (long long)tsigtime);
1419
#else
1420
  w = sldns_str_print(s, sl, "%I64u", (long long)tsigtime);
1421
#endif
1422
759
  (*d)+=6;
1423
759
  (*dl)-=6;
1424
759
  return w;
1425
955
}
1426
1427
int sldns_wire2str_a_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1428
2.30k
{
1429
2.30k
  char buf[32];
1430
2.30k
  int w;
1431
2.30k
  if(*dl < 4) return -1;
1432
1.54k
  if(!inet_ntop(AF_INET, *d, buf, (socklen_t)sizeof(buf)))
1433
0
    return -1;
1434
1.54k
  w = sldns_str_print(s, sl, "%s", buf);
1435
1.54k
  (*d)+=4;
1436
1.54k
  (*dl)-=4;
1437
1.54k
  return w;
1438
1.54k
}
1439
1440
int sldns_wire2str_aaaa_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1441
971
{
1442
971
#ifdef AF_INET6
1443
971
  char buf[64];
1444
971
  int w;
1445
971
  if(*dl < 16) return -1;
1446
548
  if(!inet_ntop(AF_INET6, *d, buf, (socklen_t)sizeof(buf)))
1447
0
    return -1;
1448
548
  w = sldns_str_print(s, sl, "%s", buf);
1449
548
  (*d)+=16;
1450
548
  (*dl)-=16;
1451
548
  return w;
1452
#else
1453
  return -1;
1454
#endif
1455
548
}
1456
1457
/** printout escaped TYPE_STR character */
1458
static int str_char_print(char** s, size_t* sl, uint8_t c)
1459
93.8M
{
1460
93.8M
  if(isprint((unsigned char)c) || c == '\t') {
1461
10.3M
    if(c == '\"' || c == '\\')
1462
169k
      return sldns_str_print(s, sl, "\\%c", c);
1463
10.2M
    if(*sl) {
1464
25.8k
      **s = (char)c;
1465
25.8k
      (*s)++;
1466
25.8k
      (*sl)--;
1467
25.8k
    }
1468
10.2M
    return 1;
1469
10.3M
  }
1470
83.4M
  return sldns_str_print(s, sl, "\\%03u", (unsigned)c);
1471
93.8M
}
1472
1473
int sldns_wire2str_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1474
78.6k
{
1475
78.6k
  int w = 0;
1476
78.6k
  size_t i, len;
1477
78.6k
  if(*dl < 1) return -1;
1478
78.6k
  len = **d;
1479
78.6k
  if(*dl < 1+len) return -1;
1480
77.5k
  (*d)++;
1481
77.5k
  (*dl)--;
1482
77.5k
  w += sldns_str_print(s, sl, "\"");
1483
194k
  for(i=0; i<len; i++)
1484
117k
    w += str_char_print(s, sl, (*d)[i]);
1485
77.5k
  w += sldns_str_print(s, sl, "\"");
1486
77.5k
  (*d)+=len;
1487
77.5k
  (*dl)-=len;
1488
77.5k
  return w;
1489
78.6k
}
1490
1491
int sldns_wire2str_apl_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1492
7.86k
{
1493
7.86k
  int i, w = 0;
1494
7.86k
  uint16_t family;
1495
7.86k
  uint8_t negation, prefix, adflength;
1496
7.86k
  if(*dl < 4) return -1;
1497
7.54k
  family = sldns_read_uint16(*d);
1498
7.54k
  prefix = (*d)[2];
1499
7.54k
  negation = ((*d)[3] & LDNS_APL_NEGATION);
1500
7.54k
  adflength = ((*d)[3] & LDNS_APL_MASK);
1501
7.54k
  if(*dl < 4+(size_t)adflength) return -1;
1502
6.54k
  if(family != LDNS_APL_IP4 && family != LDNS_APL_IP6)
1503
3.54k
    return -1; /* unknown address family */
1504
3.00k
  if(negation)
1505
613
    w += sldns_str_print(s, sl, "!");
1506
3.00k
  w += sldns_str_print(s, sl, "%u:", (unsigned)family);
1507
3.00k
  if(family == LDNS_APL_IP4) {
1508
    /* check if prefix <32 ? */
1509
    /* address is variable length 0 - 4 */
1510
4.75k
    for(i=0; i<4; i++) {
1511
3.80k
      if(i > 0)
1512
2.85k
        w += sldns_str_print(s, sl, ".");
1513
3.80k
      if(i < (int)adflength)
1514
764
        w += sldns_str_print(s, sl, "%d", (*d)[4+i]);
1515
3.03k
      else  w += sldns_str_print(s, sl, "0");
1516
3.80k
    }
1517
2.05k
  } else if(family == LDNS_APL_IP6) {
1518
    /* check if prefix <128 ? */
1519
    /* address is variable length 0 - 16 */
1520
34.8k
    for(i=0; i<16; i++) {
1521
32.8k
      if(i%2 == 0 && i>0)
1522
14.3k
        w += sldns_str_print(s, sl, ":");
1523
32.8k
      if(i < (int)adflength)
1524
2.01k
        w += sldns_str_print(s, sl, "%02x", (*d)[4+i]);
1525
30.7k
      else  w += sldns_str_print(s, sl, "00");
1526
32.8k
    }
1527
2.05k
  }
1528
3.00k
  w += sldns_str_print(s, sl, "/%u", (unsigned)prefix);
1529
3.00k
  (*d) += 4+adflength;
1530
3.00k
  (*dl) -= 4+adflength;
1531
3.00k
  return w;
1532
6.54k
}
1533
1534
int sldns_wire2str_b32_ext_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1535
7.16k
{
1536
7.16k
  size_t datalen;
1537
7.16k
  size_t sz;
1538
7.16k
  if(*dl < 1) return -1;
1539
7.16k
  datalen = (*d)[0];
1540
7.16k
  if(*dl < 1+datalen) return -1;
1541
4.84k
  sz = sldns_b32_ntop_calculate_size(datalen);
1542
4.84k
  if(*sl < sz+1) {
1543
2.23k
    (*d) += datalen+1;
1544
2.23k
    (*dl) -= (datalen+1);
1545
2.23k
    return (int)sz; /* out of space really, but would need buffer
1546
      in order to truncate the output */
1547
2.23k
  }
1548
2.60k
  sldns_b32_ntop_extended_hex((*d)+1, datalen, *s, *sl);
1549
2.60k
  (*d) += datalen+1;
1550
2.60k
  (*dl) -= (datalen+1);
1551
2.60k
  (*s) += sz;
1552
2.60k
  (*sl) -= sz;
1553
2.60k
  return (int)sz;
1554
4.84k
}
1555
1556
/** scan number of bytes from wire into b64 presentation format */
1557
static int sldns_wire2str_b64_scan_num(uint8_t** d, size_t* dl, char** s,
1558
  size_t* sl, size_t num)
1559
14.8k
{
1560
  /* b64_ntop_calculate size includes null at the end */
1561
14.8k
  size_t sz = sldns_b64_ntop_calculate_size(num)-1;
1562
14.8k
  if(*sl < sz+1) {
1563
13.4k
    (*d) += num;
1564
13.4k
    (*dl) -= num;
1565
13.4k
    return (int)sz; /* out of space really, but would need buffer
1566
      in order to truncate the output */
1567
13.4k
  }
1568
1.48k
  sldns_b64_ntop(*d, num, *s, *sl);
1569
1.48k
  (*d) += num;
1570
1.48k
  (*dl) -= num;
1571
1.48k
  (*s) += sz;
1572
1.48k
  (*sl) -= sz;
1573
1.48k
  return (int)sz;
1574
14.8k
}
1575
1576
int sldns_wire2str_b64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1577
10.5k
{
1578
10.5k
  if(*dl == 0) {
1579
0
    return sldns_str_print(s, sl, "0");
1580
0
  }
1581
10.5k
  return sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1582
10.5k
}
1583
1584
int sldns_wire2str_hex_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1585
3.09k
{
1586
3.09k
  if(*dl == 0) {
1587
0
    return sldns_str_print(s, sl, "0");
1588
0
  }
1589
3.09k
  return print_remainder_hex("", d, dl, s, sl);
1590
3.09k
}
1591
1592
int sldns_wire2str_nsec_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1593
6.06k
{
1594
6.06k
  uint8_t* p = *d;
1595
6.06k
  size_t pl = *dl;
1596
6.06k
  unsigned i, bit, window, block_len;
1597
6.06k
  uint16_t t;
1598
6.06k
  int w = 0;
1599
1600
  /* check for errors */
1601
11.7M
  while(pl) {
1602
11.7M
    if(pl < 2) return -1;
1603
11.6M
    block_len = (unsigned)p[1];
1604
11.6M
    if(pl < 2+block_len) return -1;
1605
11.6M
    p += block_len+2;
1606
11.6M
    pl -= block_len+2;
1607
11.6M
  }
1608
1609
  /* do it */
1610
738
  p = *d;
1611
738
  pl = *dl;
1612
3.25M
  while(pl) {
1613
3.25M
    if(pl < 2) return -1; /* cannot happen */
1614
3.25M
    window = (unsigned)p[0];
1615
3.25M
    block_len = (unsigned)p[1];
1616
3.25M
    if(pl < 2+block_len) return -1; /* cannot happen */
1617
3.25M
    p += 2;
1618
16.4M
    for(i=0; i<block_len; i++) {
1619
13.2M
      if(p[i] == 0) continue;
1620
      /* base type number for this octet */
1621
7.45M
      t = ((window)<<8) | (i << 3);
1622
67.0M
      for(bit=0; bit<8; bit++) {
1623
59.6M
        if((p[i]&(0x80>>bit))) {
1624
24.0M
          if(w) w += sldns_str_print(s, sl, " ");
1625
24.0M
          w += sldns_wire2str_type_print(s, sl,
1626
24.0M
            t+bit);
1627
24.0M
        }
1628
59.6M
      }
1629
7.45M
    }
1630
3.25M
    p += block_len;
1631
3.25M
    pl -= block_len+2;
1632
3.25M
  }
1633
738
  (*d) += *dl;
1634
738
  (*dl) = 0;
1635
738
  return w;
1636
738
}
1637
1638
int sldns_wire2str_nsec3_salt_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1639
8.06k
{
1640
8.06k
  size_t salt_len;
1641
8.06k
  int w;
1642
8.06k
  if(*dl < 1) return -1;
1643
8.06k
  salt_len = (size_t)(*d)[0];
1644
8.06k
  if(*dl < 1+salt_len) return -1;
1645
6.50k
  (*d)++;
1646
6.50k
  (*dl)--;
1647
6.50k
  if(salt_len == 0) {
1648
3.33k
    return sldns_str_print(s, sl, "-");
1649
3.33k
  }
1650
3.17k
  w = print_hex_buf(s, sl, *d, salt_len);
1651
3.17k
  (*dl)-=salt_len;
1652
3.17k
  (*d)+=salt_len;
1653
3.17k
  return w;
1654
6.50k
}
1655
1656
int sldns_wire2str_cert_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1657
5.39k
{
1658
5.39k
  sldns_lookup_table *lt;
1659
5.39k
  int data, w;
1660
5.39k
  if(*dl < 2) return -1;
1661
5.01k
  data = (int)sldns_read_uint16(*d);
1662
5.01k
  lt = sldns_lookup_by_id(sldns_cert_algorithms, data);
1663
5.01k
  if(lt && lt->name)
1664
980
    w = sldns_str_print(s, sl, "%s", lt->name);
1665
4.03k
  else  w = sldns_str_print(s, sl, "%d", data);
1666
5.01k
  (*dl)-=2;
1667
5.01k
  (*d)+=2;
1668
5.01k
  return w;
1669
5.39k
}
1670
1671
int sldns_wire2str_alg_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1672
10.5k
{
1673
  /* don't use algorithm mnemonics in the presentation format
1674
   * this kind of got sneaked into the rfc's */
1675
10.5k
  return sldns_wire2str_int8_scan(d, dl, s, sl);
1676
10.5k
}
1677
1678
int sldns_wire2str_unknown_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1679
8.90k
{
1680
8.90k
  return sldns_wire2str_rdata_unknown_scan(d, dl, s, sl);
1681
8.90k
}
1682
1683
int sldns_wire2str_time_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1684
3.15k
{
1685
  /* create a YYYYMMDDHHMMSS string if possible */
1686
3.15k
  struct tm tm;
1687
3.15k
  char date_buf[16];
1688
3.15k
  uint32_t t;
1689
3.15k
  memset(&tm, 0, sizeof(tm));
1690
3.15k
  if(*dl < 4) return -1;
1691
2.88k
  t = sldns_read_uint32(*d);
1692
2.88k
  date_buf[15]=0;
1693
2.88k
  if(sldns_serial_arithmetics_gmtime_r(t, time(NULL), &tm) &&
1694
2.88k
    strftime(date_buf, 15, "%Y%m%d%H%M%S", &tm)) {
1695
2.88k
    (*d) += 4;
1696
2.88k
    (*dl) -= 4;
1697
2.88k
    return sldns_str_print(s, sl, "%s", date_buf);
1698
2.88k
  }
1699
0
  return -1;
1700
2.88k
}
1701
1702
static int
1703
loc_cm_print(char** str, size_t* sl, uint8_t mantissa, uint8_t exponent)
1704
9.33k
{
1705
9.33k
  int w = 0;
1706
9.33k
  uint8_t i;
1707
  /* is it 0.<two digits> ? */
1708
9.33k
  if(exponent < 2) {
1709
4.97k
    if(exponent == 1)
1710
1.38k
      mantissa *= 10;
1711
4.97k
    return sldns_str_print(str, sl, "0.%02ld", (long)mantissa);
1712
4.97k
  }
1713
  /* always <digit><string of zeros> */
1714
4.36k
  w += sldns_str_print(str, sl, "%d", (int)mantissa);
1715
36.4k
  for(i=0; i<exponent-2; i++)
1716
32.0k
    w += sldns_str_print(str, sl, "0");
1717
4.36k
  return w;
1718
9.33k
}
1719
1720
int sldns_wire2str_loc_scan(uint8_t** d, size_t* dl, char** str, size_t* sl)
1721
6.55k
{
1722
  /* we could do checking (ie degrees < 90 etc)? */
1723
6.55k
  uint8_t version;
1724
6.55k
  uint8_t size;
1725
6.55k
  uint8_t horizontal_precision;
1726
6.55k
  uint8_t vertical_precision;
1727
6.55k
  uint32_t longitude;
1728
6.55k
  uint32_t latitude;
1729
6.55k
  uint32_t altitude;
1730
6.55k
  char northerness;
1731
6.55k
  char easterness;
1732
6.55k
  uint32_t h;
1733
6.55k
  uint32_t m;
1734
6.55k
  double s;
1735
6.55k
  uint32_t equator = (uint32_t)1 << 31; /* 2**31 */
1736
6.55k
  int w = 0;
1737
1738
6.55k
  if(*dl < 16) return -1;
1739
5.85k
  version = (*d)[0];
1740
5.85k
  if(version != 0)
1741
2.74k
    return sldns_wire2str_hex_scan(d, dl, str, sl);
1742
3.11k
  size = (*d)[1];
1743
3.11k
  horizontal_precision = (*d)[2];
1744
3.11k
  vertical_precision = (*d)[3];
1745
1746
3.11k
  latitude = sldns_read_uint32((*d)+4);
1747
3.11k
  longitude = sldns_read_uint32((*d)+8);
1748
3.11k
  altitude = sldns_read_uint32((*d)+12);
1749
1750
3.11k
  if (latitude > equator) {
1751
563
    northerness = 'N';
1752
563
    latitude = latitude - equator;
1753
2.54k
  } else {
1754
2.54k
    northerness = 'S';
1755
2.54k
    latitude = equator - latitude;
1756
2.54k
  }
1757
3.11k
  h = latitude / (1000 * 60 * 60);
1758
3.11k
  latitude = latitude % (1000 * 60 * 60);
1759
3.11k
  m = latitude / (1000 * 60);
1760
3.11k
  latitude = latitude % (1000 * 60);
1761
3.11k
  s = (double) latitude / 1000.0;
1762
3.11k
  w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1763
3.11k
    h, m, s, northerness);
1764
1765
3.11k
  if (longitude > equator) {
1766
950
    easterness = 'E';
1767
950
    longitude = longitude - equator;
1768
2.16k
  } else {
1769
2.16k
    easterness = 'W';
1770
2.16k
    longitude = equator - longitude;
1771
2.16k
  }
1772
3.11k
  h = longitude / (1000 * 60 * 60);
1773
3.11k
  longitude = longitude % (1000 * 60 * 60);
1774
3.11k
  m = longitude / (1000 * 60);
1775
3.11k
  longitude = longitude % (1000 * 60);
1776
3.11k
  s = (double) longitude / (1000.0);
1777
3.11k
  w += sldns_str_print(str, sl, "%02u %02u %06.3f %c ",
1778
3.11k
    h, m, s, easterness);
1779
1780
3.11k
  s = ((double) altitude) / 100;
1781
3.11k
  s -= 100000;
1782
1783
3.11k
  if(altitude%100 != 0)
1784
2.71k
    w += sldns_str_print(str, sl, "%.2f", s);
1785
395
  else
1786
395
    w += sldns_str_print(str, sl, "%.0f", s);
1787
1788
3.11k
  w += sldns_str_print(str, sl, "m ");
1789
1790
3.11k
  w += loc_cm_print(str, sl, (size & 0xf0) >> 4, size & 0x0f);
1791
3.11k
  w += sldns_str_print(str, sl, "m ");
1792
1793
3.11k
  w += loc_cm_print(str, sl, (horizontal_precision & 0xf0) >> 4,
1794
3.11k
    horizontal_precision & 0x0f);
1795
3.11k
  w += sldns_str_print(str, sl, "m ");
1796
1797
3.11k
  w += loc_cm_print(str, sl, (vertical_precision & 0xf0) >> 4,
1798
3.11k
    vertical_precision & 0x0f);
1799
3.11k
  w += sldns_str_print(str, sl, "m");
1800
1801
3.11k
  (*d)+=16;
1802
3.11k
  (*dl)-=16;
1803
3.11k
  return w;
1804
5.85k
}
1805
1806
int sldns_wire2str_wks_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1807
5.52k
{
1808
  /* protocol, followed by bitmap of services */
1809
5.52k
  const char* proto_name = NULL;
1810
5.52k
  struct protoent *protocol;
1811
5.52k
  struct servent *service;
1812
5.52k
  uint8_t protocol_nr;
1813
5.52k
  int bit, port, w = 0;
1814
5.52k
  size_t i;
1815
  /* we cannot print with strings because they
1816
   * are not portable, the presentation format may
1817
   * not be able to be read in on another computer.  */
1818
5.52k
  int print_symbols = 0;
1819
1820
  /* protocol */
1821
5.52k
  if(*dl < 1) return -1;
1822
5.52k
  protocol_nr = (*d)[0];
1823
5.52k
  (*d)++;
1824
5.52k
  (*dl)--;
1825
5.52k
  protocol = getprotobynumber((int)protocol_nr);
1826
5.52k
  if(protocol && (protocol->p_name != NULL)) {
1827
0
    w += sldns_str_print(s, sl, "%s", protocol->p_name);
1828
0
    proto_name = protocol->p_name;
1829
5.52k
  } else if(protocol_nr == 6) {
1830
39
    w += sldns_str_print(s, sl, "tcp");
1831
5.48k
  } else if(protocol_nr == 17) {
1832
114
    w += sldns_str_print(s, sl, "udp");
1833
5.37k
  } else {
1834
5.37k
    w += sldns_str_print(s, sl, "%u", (unsigned)protocol_nr);
1835
5.37k
  }
1836
1837
89.9M
  for(i=0; i<*dl; i++) {
1838
89.9M
    if((*d)[i] == 0)
1839
49.5M
      continue;
1840
362M
    for(bit=0; bit<8; bit++) {
1841
322M
      if(!(((*d)[i])&(0x80>>bit)))
1842
205M
        continue;
1843
117M
      port = (int)i*8 + bit;
1844
1845
117M
      if(!print_symbols)
1846
117M
        service = NULL;
1847
0
      else
1848
0
        service = getservbyport(
1849
0
          (int)htons((uint16_t)port), proto_name);
1850
117M
      if(service && service->s_name)
1851
0
        w += sldns_str_print(s, sl, " %s",
1852
0
          service->s_name);
1853
117M
      else  w += sldns_str_print(s, sl, " %u",
1854
117M
          (unsigned)port);
1855
117M
    }
1856
40.3M
  }
1857
1858
5.52k
#ifdef HAVE_ENDSERVENT
1859
5.52k
  endservent();
1860
5.52k
#endif
1861
5.52k
#ifdef HAVE_ENDPROTOENT
1862
5.52k
        endprotoent();
1863
5.52k
#endif
1864
5.52k
  (*d) += *dl;
1865
5.52k
  (*dl) = 0;
1866
5.52k
  return w;
1867
5.52k
}
1868
1869
int sldns_wire2str_nsap_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1870
226
{
1871
226
  return print_remainder_hex("0x", d, dl, s, sl);
1872
226
}
1873
1874
int sldns_wire2str_atma_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1875
1.41k
{
1876
1.41k
  uint8_t format;
1877
1.41k
  int w = 0;
1878
1.41k
  size_t i;
1879
1880
1.41k
  if(*dl < 1) return -1;
1881
1.41k
  format = (*d)[0];
1882
1.41k
  (*d)+=1;
1883
1.41k
  (*dl)-=1;
1884
1885
1.41k
  if(format == 0) {
1886
    /* AESA format (ATM End System Address). */
1887
449
    return print_remainder_hex("", d, dl, s, sl);
1888
966
  } else if(format == 1) {
1889
    /* E.164 format. */
1890
730
    w += sldns_str_print(s, sl, "+");
1891
1.07k
    for(i=0; i<*dl; i++) {
1892
783
      if((*d)[i] < '0' || (*d)[0] > '9')
1893
434
        return -1;
1894
349
      w += sldns_str_print(s, sl, "%c", (*d)[i]);
1895
349
    }
1896
296
    (*d) += *dl;
1897
296
    (*dl) = 0;
1898
296
  } else {
1899
    /* Unknown format. */
1900
236
    return -1;
1901
236
  }
1902
296
  return w;
1903
1.41k
}
1904
1905
/* internal scan routine that can modify arguments on failure */
1906
static int sldns_wire2str_ipseckey_scan_internal(uint8_t** d, size_t* dl,
1907
  char** s, size_t* sl, uint8_t* pkt, size_t pktlen, int* comprloop)
1908
2.58k
{
1909
  /* http://www.ietf.org/internet-drafts/draft-ietf-ipseckey-rr-12.txt*/
1910
2.58k
  uint8_t precedence, gateway_type, algorithm;
1911
2.58k
  int w = 0;
1912
1913
2.58k
  if(*dl < 3) return -1;
1914
2.35k
  precedence = (*d)[0];
1915
2.35k
  gateway_type = (*d)[1];
1916
2.35k
  algorithm = (*d)[2];
1917
2.35k
  if(gateway_type > 3)
1918
382
    return -1; /* unknown */
1919
1.96k
  (*d)+=3;
1920
1.96k
  (*dl)-=3;
1921
1.96k
  w += sldns_str_print(s, sl, "%d %d %d ",
1922
1.96k
    (int)precedence, (int)gateway_type, (int)algorithm);
1923
1924
1.96k
  switch(gateway_type) {
1925
444
  case 0: /* no gateway */
1926
444
    w += sldns_str_print(s, sl, ".");
1927
444
    break;
1928
352
  case 1: /* ip4 */
1929
352
    w += sldns_wire2str_a_scan(d, dl, s, sl);
1930
352
    break;
1931
433
  case 2: /* ip6 */
1932
433
    w += sldns_wire2str_aaaa_scan(d, dl, s, sl);
1933
433
    break;
1934
740
  case 3: /* dname */
1935
740
    w += sldns_wire2str_dname_scan(d, dl, s, sl, pkt, pktlen, comprloop);
1936
740
    break;
1937
0
  default: /* unknown */
1938
0
    return -1;
1939
1.96k
  }
1940
1941
1.96k
  if(*dl < 1)
1942
1.38k
    return -1;
1943
589
  w += sldns_str_print(s, sl, " ");
1944
589
  w += sldns_wire2str_b64_scan_num(d, dl, s, sl, *dl);
1945
589
  return w;
1946
1.96k
}
1947
1948
int sldns_wire2str_ipseckey_scan(uint8_t** d, size_t* dl, char** s, size_t* sl,
1949
  uint8_t* pkt, size_t pktlen, int* comprloop)
1950
2.58k
{
1951
2.58k
  uint8_t* od = *d;
1952
2.58k
  char* os = *s;
1953
2.58k
  size_t odl = *dl, osl = *sl;
1954
2.58k
  int w=sldns_wire2str_ipseckey_scan_internal(d, dl, s, sl, pkt, pktlen, comprloop);
1955
2.58k
  if(w == -1) {
1956
1.99k
    *d = od;
1957
1.99k
    *s = os;
1958
1.99k
    *dl = odl;
1959
1.99k
    *sl = osl;
1960
1.99k
    return -1;
1961
1.99k
  }
1962
589
  return w;
1963
2.58k
}
1964
1965
int sldns_wire2str_hip_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1966
6.26k
{
1967
6.26k
  int w;
1968
6.26k
  uint8_t algo, hitlen;
1969
6.26k
  uint16_t pklen;
1970
1971
  /* read lengths */
1972
6.26k
  if(*dl < 4)
1973
355
    return -1;
1974
5.91k
  hitlen = (*d)[0];
1975
5.91k
  algo = (*d)[1];
1976
5.91k
  pklen = sldns_read_uint16((*d)+2);
1977
5.91k
  if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen)
1978
3.81k
    return -1;
1979
1980
  /* write: algo hit pubkey */
1981
2.09k
  w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
1982
2.09k
  w += print_hex_buf(s, sl, (*d)+4, hitlen);
1983
2.09k
  w += sldns_str_print(s, sl, " ");
1984
2.09k
  (*d)+=4+hitlen;
1985
2.09k
  (*dl)-= (4+hitlen);
1986
2.09k
  w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
1987
2.09k
  return w;
1988
5.91k
}
1989
1990
int sldns_wire2str_int16_data_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
1991
5.81k
{
1992
5.81k
  int w;
1993
5.81k
  uint16_t n;
1994
5.81k
  if(*dl < 2)
1995
284
    return -1;
1996
5.53k
  n = sldns_read_uint16(*d);
1997
5.53k
  if(*dl < 2+(size_t)n)
1998
2.93k
    return -1;
1999
2.59k
  (*d)+=2;
2000
2.59k
  (*dl)-=2;
2001
2.59k
  if(n == 0) {
2002
968
    return sldns_str_print(s, sl, "0");
2003
968
  }
2004
1.62k
  w = sldns_str_print(s, sl, "%u ", (unsigned)n);
2005
1.62k
  w += sldns_wire2str_b64_scan_num(d, dl, s, sl, n);
2006
1.62k
  return w;
2007
2.59k
}
2008
2009
int sldns_wire2str_nsec3_next_owner_scan(uint8_t** d, size_t* dl, char** s,
2010
  size_t* sl)
2011
0
{
2012
0
  return sldns_wire2str_b32_ext_scan(d, dl, s, sl);
2013
0
}
2014
2015
int sldns_wire2str_ilnp64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2016
479
{
2017
479
  int w;
2018
479
  if(*dl < 8)
2019
238
    return -1;
2020
241
  w = sldns_str_print(s, sl, "%.4x:%.4x:%.4x:%.4x",
2021
241
    sldns_read_uint16(*d), sldns_read_uint16((*d)+2),
2022
241
    sldns_read_uint16((*d)+4), sldns_read_uint16((*d)+6));
2023
241
  (*d)+=8;
2024
241
  (*dl)-=8;
2025
241
  return w;
2026
479
}
2027
2028
int sldns_wire2str_eui48_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2029
1.01k
{
2030
1.01k
  int w;
2031
1.01k
  if(*dl < 6)
2032
766
    return -1;
2033
252
  w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
2034
252
    (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5]);
2035
252
  (*d)+=6;
2036
252
  (*dl)-=6;
2037
252
  return w;
2038
1.01k
}
2039
2040
int sldns_wire2str_eui64_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2041
5.28k
{
2042
5.28k
  int w;
2043
5.28k
  if(*dl < 8)
2044
716
    return -1;
2045
4.56k
  w = sldns_str_print(s, sl, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x-%.2x",
2046
4.56k
    (*d)[0], (*d)[1], (*d)[2], (*d)[3], (*d)[4], (*d)[5],
2047
4.56k
    (*d)[6], (*d)[7]);
2048
4.56k
  (*d)+=8;
2049
4.56k
  (*dl)-=8;
2050
4.56k
  return w;
2051
5.28k
}
2052
2053
int sldns_wire2str_unquoted_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2054
26.0k
{
2055
26.0k
  int w = 0;
2056
26.0k
  size_t i, len;
2057
26.0k
  if(*dl < 1) return -1;
2058
26.0k
  len = **d;
2059
26.0k
  if(*dl < 1+len) return -1;
2060
25.8k
  (*d)++;
2061
25.8k
  (*dl)--;
2062
192k
  for(i=0; i<len; i++) {
2063
166k
    if(isspace((unsigned char)(*d)[i]) || (*d)[i] == '(' ||
2064
162k
      (*d)[i] == ')' || (*d)[i] == '\'')
2065
5.82k
      w += sldns_str_print(s, sl, "\\%c", (char)(*d)[i]);
2066
161k
    else  w += str_char_print(s, sl, (*d)[i]);
2067
166k
  }
2068
25.8k
  (*d)+=len;
2069
25.8k
  (*dl)-=len;
2070
25.8k
  return w;
2071
26.0k
}
2072
2073
int sldns_wire2str_tag_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2074
6.34k
{
2075
6.34k
  size_t i, n;
2076
6.34k
  int w = 0;
2077
6.34k
  if(*dl < 1)
2078
0
    return -1;
2079
6.34k
  n = (size_t)((*d)[0]);
2080
6.34k
  if(*dl < 1+n)
2081
1.61k
    return -1;
2082
6.70k
  for(i=0; i<n; i++)
2083
4.20k
    if(!isalnum((unsigned char)(*d)[i+1]))
2084
2.22k
      return -1;
2085
4.04k
  for(i=0; i<n; i++)
2086
1.54k
    w += sldns_str_print(s, sl, "%c", (char)(*d)[i+1]);
2087
2.50k
  (*d)+=n+1;
2088
2.50k
  (*dl)-=(n+1);
2089
2.50k
  return w;
2090
4.72k
}
2091
2092
int sldns_wire2str_long_str_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2093
5.82k
{
2094
5.82k
  size_t i;
2095
5.82k
  int w = 0;
2096
5.82k
  w += sldns_str_print(s, sl, "\"");
2097
93.5M
  for(i=0; i<*dl; i++)
2098
93.5M
    w += str_char_print(s, sl, (*d)[i]);
2099
5.82k
  w += sldns_str_print(s, sl, "\"");
2100
5.82k
  (*d)+=*dl;
2101
5.82k
  (*dl)=0;
2102
5.82k
  return w;
2103
5.82k
}
2104
2105
int sldns_wire2str_tsigerror_scan(uint8_t** d, size_t* dl, char** s, size_t* sl)
2106
5.62k
{
2107
5.62k
  sldns_lookup_table *lt;
2108
5.62k
  int data, w;
2109
5.62k
  if(*dl < 2) return -1;
2110
5.31k
  data = (int)sldns_read_uint16(*d);
2111
5.31k
  lt = sldns_lookup_by_id(sldns_tsig_errors, data);
2112
5.31k
  if(lt && lt->name)
2113
1.56k
    w = sldns_str_print(s, sl, "%s", lt->name);
2114
3.74k
  else  w = sldns_str_print(s, sl, "%d", data);
2115
5.31k
  (*dl)-=2;
2116
5.31k
  (*d)+=2;
2117
5.31k
  return w;
2118
5.62k
}
2119
2120
int sldns_wire2str_edns_llq_print(char** s, size_t* sl, uint8_t* data,
2121
  size_t len)
2122
5.90k
{
2123
  /* LLQ constants */
2124
5.90k
  const char* llq_errors[] = {"NO-ERROR", "SERV-FULL", "STATIC",
2125
5.90k
    "FORMAT-ERR", "NO-SUCH-LLQ", "BAD-VERS", "UNKNOWN_ERR"};
2126
5.90k
  const unsigned int llq_errors_num = 7;
2127
5.90k
  const char* llq_opcodes[] = {"LLQ-SETUP", "LLQ-REFRESH", "LLQ-EVENT"};
2128
5.90k
  const unsigned int llq_opcodes_num = 3;
2129
5.90k
  uint16_t version, llq_opcode, error_code;
2130
5.90k
  uint64_t llq_id;
2131
5.90k
  uint32_t lease_life; /* Requested or granted life of LLQ, in seconds */
2132
5.90k
  int w = 0;
2133
2134
  /* read the record */
2135
5.90k
  if(len != 18) {
2136
5.20k
    w += sldns_str_print(s, sl, "malformed LLQ ");
2137
5.20k
    w += print_hex_buf(s, sl, data, len);
2138
5.20k
    return w;
2139
5.20k
  }
2140
699
  version = sldns_read_uint16(data);
2141
699
  llq_opcode = sldns_read_uint16(data+2);
2142
699
  error_code = sldns_read_uint16(data+4);
2143
699
  memmove(&llq_id, data+6, sizeof(llq_id));
2144
699
  lease_life = sldns_read_uint32(data+14);
2145
2146
  /* print it */
2147
699
  w += sldns_str_print(s, sl, "v%d ", (int)version);
2148
699
  if(llq_opcode < llq_opcodes_num)
2149
425
    w += sldns_str_print(s, sl, "%s", llq_opcodes[llq_opcode]);
2150
274
  else  w += sldns_str_print(s, sl, "opcode %d", (int)llq_opcode);
2151
699
  if(error_code < llq_errors_num)
2152
249
    w += sldns_str_print(s, sl, " %s", llq_errors[error_code]);
2153
450
  else  w += sldns_str_print(s, sl, " error %d", (int)error_code);
2154
699
#ifndef USE_WINSOCK
2155
699
  w += sldns_str_print(s, sl, " id %llx lease-life %lu",
2156
699
    (unsigned long long)llq_id, (unsigned long)lease_life);
2157
#else
2158
  w += sldns_str_print(s, sl, " id %I64x lease-life %lu",
2159
    (unsigned long long)llq_id, (unsigned long)lease_life);
2160
#endif
2161
699
  return w;
2162
5.90k
}
2163
2164
int sldns_wire2str_edns_ul_print(char** s, size_t* sl, uint8_t* data,
2165
  size_t len)
2166
5.38k
{
2167
5.38k
  uint32_t lease;
2168
5.38k
  int w = 0;
2169
5.38k
  if(len != 4) {
2170
5.10k
    w += sldns_str_print(s, sl, "malformed UL ");
2171
5.10k
    w += print_hex_buf(s, sl, data, len);
2172
5.10k
    return w;
2173
5.10k
  }
2174
281
  lease = sldns_read_uint32(data);
2175
281
  w += sldns_str_print(s, sl, "lease %lu", (unsigned long)lease);
2176
281
  return w;
2177
5.38k
}
2178
2179
int sldns_wire2str_edns_nsid_print(char** s, size_t* sl, uint8_t* data,
2180
  size_t len)
2181
5.29k
{
2182
5.29k
  int w = 0;
2183
5.29k
  size_t i, printed=0;
2184
5.29k
  w += print_hex_buf(s, sl, data, len);
2185
89.8M
  for(i=0; i<len; i++) {
2186
89.8M
    if(isprint((unsigned char)data[i]) || data[i] == '\t') {
2187
10.0M
      if(!printed) {
2188
4.54k
        w += sldns_str_print(s, sl, " (");
2189
4.54k
        printed = 1;
2190
4.54k
      }
2191
10.0M
      w += sldns_str_print(s, sl, "%c", (char)data[i]);
2192
10.0M
    }
2193
89.8M
  }
2194
5.29k
  if(printed)
2195
4.54k
    w += sldns_str_print(s, sl, ")");
2196
5.29k
  return w;
2197
5.29k
}
2198
2199
int sldns_wire2str_edns_dau_print(char** s, size_t* sl, uint8_t* data,
2200
  size_t len)
2201
5.08k
{
2202
5.08k
  sldns_lookup_table *lt;
2203
5.08k
  size_t i;
2204
5.08k
  int w = 0;
2205
90.0M
  for(i=0; i<len; i++) {
2206
90.0M
    lt = sldns_lookup_by_id(sldns_algorithms, (int)data[i]);
2207
90.0M
    if(lt && lt->name)
2208
19.6M
      w += sldns_str_print(s, sl, " %s", lt->name);
2209
70.4M
    else  w += sldns_str_print(s, sl, " %d", (int)data[i]);
2210
90.0M
  }
2211
5.08k
  return w;
2212
5.08k
}
2213
2214
int sldns_wire2str_edns_dhu_print(char** s, size_t* sl, uint8_t* data,
2215
  size_t len)
2216
5.08k
{
2217
5.08k
  sldns_lookup_table *lt;
2218
5.08k
  size_t i;
2219
5.08k
  int w = 0;
2220
89.9M
  for(i=0; i<len; i++) {
2221
89.9M
    lt = sldns_lookup_by_id(sldns_hashes, (int)data[i]);
2222
89.9M
    if(lt && lt->name)
2223
13.5M
      w += sldns_str_print(s, sl, " %s", lt->name);
2224
76.4M
    else  w += sldns_str_print(s, sl, " %d", (int)data[i]);
2225
89.9M
  }
2226
5.08k
  return w;
2227
5.08k
}
2228
2229
int sldns_wire2str_edns_n3u_print(char** s, size_t* sl, uint8_t* data,
2230
  size_t len)
2231
5.07k
{
2232
5.07k
  size_t i;
2233
5.07k
  int w = 0;
2234
89.9M
  for(i=0; i<len; i++) {
2235
89.9M
    if(data[i] == 1)
2236
10.9M
      w += sldns_str_print(s, sl, " SHA1");
2237
79.0M
    else  w += sldns_str_print(s, sl, " %d", (int)data[i]);
2238
89.9M
  }
2239
5.07k
  return w;
2240
5.07k
}
2241
2242
int sldns_wire2str_edns_subnet_print(char** s, size_t* sl, uint8_t* data,
2243
  size_t len)
2244
6.64k
{
2245
6.64k
  int w = 0;
2246
6.64k
  uint16_t family;
2247
6.64k
  uint8_t source, scope;
2248
6.64k
  if(len < 4) {
2249
903
    w += sldns_str_print(s, sl, "malformed subnet ");
2250
903
    w += print_hex_buf(s, sl, data, len);
2251
903
    return w;
2252
903
  }
2253
5.73k
  family = sldns_read_uint16(data);
2254
5.73k
  source = data[2];
2255
5.73k
  scope = data[3];
2256
5.73k
  if(family == 1) {
2257
    /* IP4 */
2258
809
    char buf[64];
2259
809
    uint8_t ip4[4];
2260
809
    memset(ip4, 0, sizeof(ip4));
2261
809
    if(len-4 > 4) {
2262
540
      w += sldns_str_print(s, sl, "trailingdata:");
2263
540
      w += print_hex_buf(s, sl, data+4+4, len-4-4);
2264
540
      w += sldns_str_print(s, sl, " ");
2265
540
      len = 4+4;
2266
540
    }
2267
809
    memmove(ip4, data+4, len-4);
2268
809
    if(!inet_ntop(AF_INET, ip4, buf, (socklen_t)sizeof(buf))) {
2269
0
      w += sldns_str_print(s, sl, "ip4ntoperror ");
2270
0
      w += print_hex_buf(s, sl, data+4+4, len-4-4);
2271
809
    } else {
2272
809
      w += sldns_str_print(s, sl, "%s", buf);
2273
809
    }
2274
4.93k
  } else if(family == 2) {
2275
    /* IP6 */
2276
869
    char buf[64];
2277
869
    uint8_t ip6[16];
2278
869
    memset(ip6, 0, sizeof(ip6));
2279
869
    if(len-4 > 16) {
2280
441
      w += sldns_str_print(s, sl, "trailingdata:");
2281
441
      w += print_hex_buf(s, sl, data+4+16, len-4-16);
2282
441
      w += sldns_str_print(s, sl, " ");
2283
441
      len = 4+16;
2284
441
    }
2285
869
    memmove(ip6, data+4, len-4);
2286
869
#ifdef AF_INET6
2287
869
    if(!inet_ntop(AF_INET6, ip6, buf, (socklen_t)sizeof(buf))) {
2288
0
      w += sldns_str_print(s, sl, "ip6ntoperror ");
2289
0
      w += print_hex_buf(s, sl, data+4+4, len-4-4);
2290
869
    } else {
2291
869
      w += sldns_str_print(s, sl, "%s", buf);
2292
869
    }
2293
#else
2294
    w += print_hex_buf(s, sl, data+4+4, len-4-4);
2295
#endif
2296
4.06k
  } else {
2297
    /* unknown */
2298
4.06k
    w += sldns_str_print(s, sl, "family %d ",
2299
4.06k
      (int)family);
2300
4.06k
    w += print_hex_buf(s, sl, data, len);
2301
4.06k
  }
2302
5.73k
  w += sldns_str_print(s, sl, "/%d scope /%d", (int)source, (int)scope);
2303
5.73k
  return w;
2304
6.64k
}
2305
2306
static int sldns_wire2str_edns_keepalive_print(char** s, size_t* sl,
2307
  uint8_t* data, size_t len)
2308
713
{
2309
713
  int w = 0;
2310
713
  uint16_t timeout;
2311
713
  if(!(len == 0 || len == 2)) {
2312
231
    w += sldns_str_print(s, sl, "malformed keepalive ");
2313
231
    w += print_hex_buf(s, sl, data, len);
2314
231
    return w;
2315
231
  }
2316
482
  if(len == 0 ) {
2317
284
    w += sldns_str_print(s, sl, "no timeout value (only valid for client option) ");
2318
284
  } else {
2319
198
    timeout = sldns_read_uint16(data);
2320
198
    w += sldns_str_print(s, sl, "timeout value in units of 100ms %u", (int)timeout);
2321
198
  }
2322
482
  return w;
2323
713
}
2324
2325
int sldns_wire2str_edns_ede_print(char** s, size_t* sl,
2326
  uint8_t* data, size_t len)
2327
1.30k
{
2328
1.30k
  uint16_t ede_code;
2329
1.30k
  int w = 0;
2330
1.30k
  sldns_lookup_table *lt;
2331
1.30k
  size_t i;
2332
1.30k
  int printable;
2333
2334
1.30k
  if(len < 2) {
2335
472
    w += sldns_str_print(s, sl, "malformed ede ");
2336
472
    w += print_hex_buf(s, sl, data, len);
2337
472
    return w;
2338
472
  }
2339
2340
834
  ede_code = sldns_read_uint16(data);
2341
834
  lt = sldns_lookup_by_id(sldns_edns_ede_codes, (int)ede_code);
2342
834
  if(lt && lt->name)
2343
251
    w += sldns_str_print(s, sl, "%s", lt->name);
2344
583
  else  w += sldns_str_print(s, sl, "%d", (int)ede_code);
2345
2346
834
  if(len == 2)
2347
302
    return w;
2348
2349
532
  w += sldns_str_print(s, sl, " ");
2350
2351
  /* If it looks like text, show it as text. */
2352
532
  printable=1;
2353
2.06k
  for(i=2; i<len; i++) {
2354
1.78k
    if(isprint((unsigned char)data[i]) || data[i] == '\t')
2355
1.53k
      continue;
2356
252
    printable = 0;
2357
252
    break;
2358
1.78k
  }
2359
532
  if(printable) {
2360
280
    w += sldns_str_print(s, sl, "\"");
2361
1.72k
    for(i=2; i<len; i++) {
2362
1.44k
      w += str_char_print(s, sl, data[i]);
2363
1.44k
    }
2364
280
    w += sldns_str_print(s, sl, "\"");
2365
280
  } else {
2366
252
    w += print_hex_buf(s, sl, data+2, len-2);
2367
252
  }
2368
532
  return w;
2369
834
}
2370
2371
int sldns_wire2str_edns_option_print(char** s, size_t* sl,
2372
  uint16_t option_code, uint8_t* optdata, size_t optlen)
2373
10.8k
{
2374
10.8k
  int w = 0;
2375
10.8k
  w += sldns_wire2str_edns_option_code_print(s, sl, option_code);
2376
10.8k
  w += sldns_str_print(s, sl, ": ");
2377
10.8k
  switch(option_code) {
2378
1.29k
  case LDNS_EDNS_LLQ:
2379
1.29k
    w += sldns_wire2str_edns_llq_print(s, sl, optdata, optlen);
2380
1.29k
    break;
2381
781
  case LDNS_EDNS_UL:
2382
781
    w += sldns_wire2str_edns_ul_print(s, sl, optdata, optlen);
2383
781
    break;
2384
694
  case LDNS_EDNS_NSID:
2385
694
    w += sldns_wire2str_edns_nsid_print(s, sl, optdata, optlen);
2386
694
    break;
2387
475
  case LDNS_EDNS_DAU:
2388
475
    w += sldns_wire2str_edns_dau_print(s, sl, optdata, optlen);
2389
475
    break;
2390
477
  case LDNS_EDNS_DHU:
2391
477
    w += sldns_wire2str_edns_dhu_print(s, sl, optdata, optlen);
2392
477
    break;
2393
473
  case LDNS_EDNS_N3U:
2394
473
    w += sldns_wire2str_edns_n3u_print(s, sl, optdata, optlen);
2395
473
    break;
2396
2.03k
  case LDNS_EDNS_CLIENT_SUBNET:
2397
2.03k
    w += sldns_wire2str_edns_subnet_print(s, sl, optdata, optlen);
2398
2.03k
    break;
2399
713
   case LDNS_EDNS_KEEPALIVE:
2400
713
    w += sldns_wire2str_edns_keepalive_print(s, sl, optdata, optlen);
2401
713
    break;
2402
418
  case LDNS_EDNS_PADDING:
2403
418
    w += print_hex_buf(s, sl, optdata, optlen);
2404
418
    break;
2405
1.30k
  case LDNS_EDNS_EDE:
2406
1.30k
    w += sldns_wire2str_edns_ede_print(s, sl, optdata, optlen);
2407
1.30k
    break;
2408
2.20k
  default:
2409
    /* unknown option code */
2410
2.20k
    w += print_hex_buf(s, sl, optdata, optlen);
2411
2.20k
    break;
2412
10.8k
  }
2413
10.8k
  return w;
2414
10.8k
}
2415
2416
/** print the edns options to string */
2417
static int
2418
print_edns_opts(char** s, size_t* sl, uint8_t* rdata, size_t rdatalen)
2419
2.02k
{
2420
2.02k
  uint16_t option_code, option_len;
2421
2.02k
  int w = 0;
2422
12.9k
  while(rdatalen > 0) {
2423
    /* option name */
2424
12.1k
    if(rdatalen < 4) {
2425
663
      w += sldns_str_print(s, sl, " ; malformed: ");
2426
663
      w += print_hex_buf(s, sl, rdata, rdatalen);
2427
663
      return w;
2428
663
    }
2429
11.5k
    option_code = sldns_read_uint16(rdata);
2430
11.5k
    option_len = sldns_read_uint16(rdata+2);
2431
11.5k
    rdata += 4;
2432
11.5k
    rdatalen -= 4;
2433
2434
    /* option value */
2435
11.5k
    if(rdatalen < (size_t)option_len) {
2436
661
      w += sldns_str_print(s, sl, " ; malformed ");
2437
661
      w += sldns_wire2str_edns_option_code_print(s, sl,
2438
661
        option_code);
2439
661
      w += sldns_str_print(s, sl, ": ");
2440
661
      w += print_hex_buf(s, sl, rdata, rdatalen);
2441
661
      return w;
2442
661
    }
2443
10.8k
    w += sldns_str_print(s, sl, " ; ");
2444
10.8k
    w += sldns_wire2str_edns_option_print(s, sl, option_code,
2445
10.8k
      rdata, option_len);
2446
10.8k
    rdata += option_len;
2447
10.8k
    rdatalen -= option_len;
2448
10.8k
  }
2449
704
  return w;
2450
2.02k
}
2451
2452
int sldns_wire2str_edns_scan(uint8_t** data, size_t* data_len, char** str,
2453
        size_t* str_len, uint8_t* pkt, size_t pktlen)
2454
2.51k
{
2455
2.51k
  int w = 0;
2456
2.51k
  uint8_t ext_rcode, edns_version;
2457
2.51k
  uint16_t udpsize, edns_bits, rdatalen;
2458
2.51k
  w += sldns_str_print(str, str_len, "; EDNS:");
2459
2460
  /* some input checks, domain name */
2461
2.51k
  if(*data_len < 1+10)
2462
17
    return w + print_remainder_hex("Error malformed 0x",
2463
17
      data, data_len, str, str_len);
2464
2.49k
  if(*data[0] != 0) {
2465
0
    return w + print_remainder_hex("Error nonrootdname 0x",
2466
0
      data, data_len, str, str_len);
2467
0
  }
2468
2.49k
  (*data)++;
2469
2.49k
  (*data_len)--;
2470
2471
  /* check type and read fixed contents */
2472
2.49k
  if(sldns_read_uint16((*data)) != LDNS_RR_TYPE_OPT) {
2473
0
    return w + print_remainder_hex("Error nottypeOPT 0x",
2474
0
      data, data_len, str, str_len);
2475
0
  }
2476
2.49k
  udpsize = sldns_read_uint16((*data)+2);
2477
2.49k
  ext_rcode = (*data)[4];
2478
2.49k
  edns_version = (*data)[5];
2479
2.49k
  edns_bits = sldns_read_uint16((*data)+6);
2480
2.49k
  rdatalen = sldns_read_uint16((*data)+8);
2481
2.49k
  (*data)+=10;
2482
2.49k
  (*data_len)-=10;
2483
2484
2.49k
  w += sldns_str_print(str, str_len, " version: %u;",
2485
2.49k
    (unsigned)edns_version);
2486
2.49k
  w += sldns_str_print(str, str_len, " flags:");
2487
2.49k
  if((edns_bits & LDNS_EDNS_MASK_DO_BIT))
2488
1.13k
    w += sldns_str_print(str, str_len, " do");
2489
2.49k
  if((edns_bits & LDNS_EDNS_MASK_CO_BIT))
2490
847
    w += sldns_str_print(str, str_len, " co");
2491
  /* the extended rcode is the value set, shifted four bits,
2492
   * and or'd with the original rcode */
2493
2.49k
  if(ext_rcode) {
2494
1.53k
    int rc = ((int)ext_rcode)<<4;
2495
1.53k
    if(pkt && pktlen >= LDNS_HEADER_SIZE)
2496
1.53k
      rc |= LDNS_RCODE_WIRE(pkt);
2497
1.53k
    w += sldns_str_print(str, str_len, " ; ext-rcode: %d", rc);
2498
1.53k
  }
2499
2.49k
  w += sldns_str_print(str, str_len, " ; udp: %u", (unsigned)udpsize);
2500
2501
2.49k
  if(rdatalen) {
2502
2.02k
    if((size_t)*data_len < rdatalen) {
2503
708
      w += sldns_str_print(str, str_len,
2504
708
        " ; Error EDNS rdata too short; ");
2505
708
      rdatalen = (uint16_t)*data_len;
2506
708
    }
2507
2.02k
    w += print_edns_opts(str, str_len, *data, rdatalen);
2508
2.02k
    (*data) += rdatalen;
2509
2.02k
    (*data_len) -= rdatalen;
2510
2.02k
  }
2511
2.49k
  w += sldns_str_print(str, str_len, "\n");
2512
2.49k
  return w;
2513
2.49k
}