/*1* Copyright (c) 1996, 1998 by Internet Software Consortium.2*3* Permission to use, copy, modify, and distribute this software for any4* purpose with or without fee is hereby granted, provided that the above5* copyright notice and this permission notice appear in all copies.6*7* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS8* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES9* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE10* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL11* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR12* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS13* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS14* SOFTWARE.15*/1617/*18* Portions Copyright (c) 1995 by International Business Machines, Inc.19*20* International Business Machines, Inc. (hereinafter called IBM) grants21* permission under its copyrights to use, copy, modify, and distribute this22* Software with or without fee, provided that the above copyright notice and23* all paragraphs of this notice appear in all copies, and that the name of IBM24* not be used in connection with the marketing of any product incorporating25* the Software or modifications thereof, without specific, written prior26* permission.27*28* To the extent it has a right to do so, IBM grants an immunity from suit29* under its patents, if any, for the use, sale or manufacture of products to30* the extent that such products are used for performing Domain Name System31* dynamic updates in TCP/IP networks by means of the Software. No immunity is32* granted for any product per se or for any other function of any product.33*34* THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,35* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A36* PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,37* DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING38* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN39* IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.40*/41#include <ldns/config.h>42#include <ctype.h>43#include <stdlib.h>44#include <string.h>4546static const char Base64[] =47"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";48static const char Pad64 = '=';4950/* (From RFC1521 and draft-ietf-dnssec-secext-03.txt)51The following encoding technique is taken from RFC 1521 by Borenstein52and Freed. It is reproduced here in a slightly edited form for53convenience.5455A 65-character subset of US-ASCII is used, enabling 6 bits to be56represented per printable character. (The extra 65th character, "=",57is used to signify a special processing function.)5859The encoding process represents 24-bit groups of input bits as output60strings of 4 encoded characters. Proceeding from left to right, a6124-bit input group is formed by concatenating 3 8-bit input groups.62These 24 bits are then treated as 4 concatenated 6-bit groups, each63of which is translated into a single digit in the base64 alphabet.6465Each 6-bit group is used as an index into an array of 64 printable66characters. The character referenced by the index is placed in the67output string.6869Table 1: The Base64 Alphabet7071Value Encoding Value Encoding Value Encoding Value Encoding720 A 17 R 34 i 51 z731 B 18 S 35 j 52 0742 C 19 T 36 k 53 1753 D 20 U 37 l 54 2764 E 21 V 38 m 55 3775 F 22 W 39 n 56 4786 G 23 X 40 o 57 5797 H 24 Y 41 p 58 6808 I 25 Z 42 q 59 7819 J 26 a 43 r 60 88210 K 27 b 44 s 61 98311 L 28 c 45 t 62 +8412 M 29 d 46 u 63 /8513 N 30 e 47 v8614 O 31 f 48 w (pad) =8715 P 32 g 49 x8816 Q 33 h 50 y8990Special processing is performed if fewer than 24 bits are available91at the end of the data being encoded. A full encoding quantum is92always completed at the end of a quantity. When fewer than 24 input93bits are available in an input group, zero bits are added (on the94right) to form an integral number of 6-bit groups. Padding at the95end of the data is performed using the '=' character.9697Since all base64 input is an integral number of octets, only the98-------------------------------------------------99following cases can arise:100101(1) the final quantum of encoding input is an integral102multiple of 24 bits; here, the final unit of encoded103output will be an integral multiple of 4 characters104with no "=" padding,105(2) the final quantum of encoding input is exactly 8 bits;106here, the final unit of encoded output will be two107characters followed by two "=" padding characters, or108(3) the final quantum of encoding input is exactly 16 bits;109here, the final unit of encoded output will be three110characters followed by one "=" padding character.111*/112113/* skips all whitespace anywhere.114converts characters, four at a time, starting at (or after)115src from base - 64 numbers into three 8 bit bytes in the target area.116it returns the number of data bytes stored at the target, or -1 on error.117*/118119int120ldns_b64_pton(char const *origsrc, uint8_t *target, size_t targsize)121{122unsigned char const* src = (unsigned char*)origsrc;123int tarindex, state, ch;124char *pos;125126state = 0;127tarindex = 0;128129if (strlen(origsrc) == 0) {130return 0;131}132133while ((ch = *src++) != '\0') {134if (isspace((unsigned char)ch)) /* Skip whitespace anywhere. */135continue;136137if (ch == Pad64)138break;139140pos = strchr(Base64, ch);141if (pos == 0) {142/* A non-base64 character. */143return (-1);144}145146switch (state) {147case 0:148if (target) {149if ((size_t)tarindex >= targsize)150return (-1);151target[tarindex] = (pos - Base64) << 2;152}153state = 1;154break;155case 1:156if (target) {157if ((size_t)tarindex + 1 >= targsize)158return (-1);159target[tarindex] |= (pos - Base64) >> 4;160target[tarindex+1] = ((pos - Base64) & 0x0f)161<< 4 ;162}163tarindex++;164state = 2;165break;166case 2:167if (target) {168if ((size_t)tarindex + 1 >= targsize)169return (-1);170target[tarindex] |= (pos - Base64) >> 2;171target[tarindex+1] = ((pos - Base64) & 0x03)172<< 6;173}174tarindex++;175state = 3;176break;177case 3:178if (target) {179if ((size_t)tarindex >= targsize)180return (-1);181target[tarindex] |= (pos - Base64);182}183tarindex++;184state = 0;185break;186default:187abort();188}189}190191/*192* We are done decoding Base-64 chars. Let's see if we ended193* on a byte boundary, and/or with erroneous trailing characters.194*/195196if (ch == Pad64) { /* We got a pad char. */197ch = *src++; /* Skip it, get next. */198switch (state) {199case 0: /* Invalid = in first position */200case 1: /* Invalid = in second position */201return (-1);202203case 2: /* Valid, means one byte of info */204/* Skip any number of spaces. */205for ((void)NULL; ch != '\0'; ch = *src++)206if (!isspace((unsigned char)ch))207break;208/* Make sure there is another trailing = sign. */209if (ch != Pad64)210return (-1);211ch = *src++; /* Skip the = */212/* Fall through to "single trailing =" case. */213/* FALLTHROUGH */214215case 3: /* Valid, means two bytes of info */216/*217* We know this char is an =. Is there anything but218* whitespace after it?219*/220for ((void)NULL; ch != '\0'; ch = *src++)221if (!isspace((unsigned char)ch))222return (-1);223224/*225* Now make sure for cases 2 and 3 that the "extra"226* bits that slopped past the last full byte were227* zeros. If we don't check them, they become a228* subliminal channel.229*/230if (target && target[tarindex] != 0)231return (-1);232}233} else {234/*235* We ended by seeing the end of the string. Make sure we236* have no partial bytes lying around.237*/238if (state != 0)239return (-1);240}241242return (tarindex);243}244245246