break;
default : break;
}
- return "\n\t ";
+ return "\n\t ";
}
/* Syntactic sugar for sldns_rr_new_frm_str_internal */
sldns_buffer_position(strbuf));
}
hex_data_size = (size_t)atoi(token);
- if(hex_data_size > LDNS_MAX_RDFLEN ||
+ if(hex_data_size > LDNS_MAX_RDFLEN ||
*rr_cur_len + hex_data_size > *rr_len) {
return RET_ERR(LDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL,
sldns_buffer_position(strbuf));
/* check if not quoted yet, and we have encountered quotes */
if(!*quoted && sldns_rdf_type_maybe_quoted(rdftype) &&
slen >= 2 &&
- (token[0] == '"' || token[0] == '\'') &&
+ (token[0] == '"' || token[0] == '\'') &&
(token[slen-1] == '"' || token[slen-1] == '\'')) {
/* move token two smaller (quotes) with endnull */
memmove(token, token+1, slen-2);
token[2]=='\t')) {
was_unknown_rr_format = 1;
if((status=rrinternal_parse_unknown(strbuf, token,
- token_len, rr, rr_len, &rr_cur_len,
+ token_len, rr, rr_len, &rr_cur_len,
pre_data_pos)) != 0)
return status;
} else if(token_strlen > 0 || quoted) {
if (rr_type == LDNS_RR_TYPE_SVCB || rr_type == LDNS_RR_TYPE_HTTPS) {
size_t rdata_len = rr_cur_len - dname_len - 10;
uint8_t *rdata = rr+dname_len + 10;
-
+
/* skip 1st rdata field SvcPriority (uint16_t) */
if (rdata_len < sizeof(uint16_t))
return LDNS_WIREPARSE_ERR_OK;
size_t str_len;
size_t dst_len;
size_t val_len;
-
+
val_len = strlen(val);
if (val_len > sizeof(unescaped_dst)) {
sldns_write_uint16(rd + 2, dst_len);
memcpy(rd + 4, unescaped_dst, dst_len);
*rd_len = 4 + dst_len;
-
+
return LDNS_WIREPARSE_ERR_OK;
}
/* case: key=value */
if (eq_pos != NULL && eq_pos[1]) {
val_in = eq_pos + 1;
-
+
/* unescape characters and "" blocks */
if (*val_in == '"') {
val_in++;
}
*val_out = 0;
- return sldns_str2wire_svcparam_value(str, eq_pos - str,
- unescaped_val[0] ? unescaped_val : NULL, rd, rd_len);
+ return sldns_str2wire_svcparam_value(str, eq_pos - str,
+ unescaped_val[0] ? unescaped_val : NULL, rd, rd_len);
}
/* case: key= */
- else if (eq_pos != NULL && !(eq_pos[1])) {
+ else if (eq_pos != NULL && !(eq_pos[1])) {
return sldns_str2wire_svcparam_value(str, eq_pos - str, NULL, rd, rd_len);
}
/* case: key */
"Mandatory SvcParamKey is missing"},
{ LDNS_WIREPARSE_ERR_SVCB_MANDATORY_DUPLICATE_KEY,
"Keys in SvcParam mandatory MUST be unique" },
- { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_IN_MANDATORY,
+ { LDNS_WIREPARSE_ERR_SVCB_MANDATORY_IN_MANDATORY,
"mandatory MUST not be included as mandatory parameter" },
{ LDNS_WIREPARSE_ERR_SVCB_PORT_VALUE_SYNTAX,
"Could not parse port SvcParamValue" },
uint8_t* rr = *d;
size_t rrlen = *dlen, dname_off, rdlen, ordlen;
uint16_t rrtype = 0;
-
+
if(*dlen >= 3 && (*d)[0]==0 &&
sldns_read_uint16((*d)+1)==LDNS_RR_TYPE_OPT) {
/* perform EDNS OPT processing */
w += sldns_str_print(s, slen, "%s", ",");
}
w += sldns_str_print(s, slen, "\"");
-
+
return w;
}
(*s) += size;
(*slen) -= size;
- w += sldns_str_print(s, slen, "\"");
+ w += sldns_str_print(s, slen, "\"");
return w + size;
}
/* verify that we have data_len data */
if (data_len > *dlen)
- return -1;
+ return -1;
written_chars += sldns_print_svcparamkey(s, slen, svcparamkey);
if (!data_len) {
}
if (r <= 0)
return -1; /* wireformat error */
-
+
written_chars += r;
*d += data_len;
*dlen -= data_len;
unsigned i, bit, window, block_len;
uint16_t t;
int w = 0;
-
+
/* check for errors */
while(pl) {
if(pl < 2) return -1;