You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

183 lines
7.2 KiB

  1. /*
  2. * Copyright (c) 1996, 1998 by Internet Software Consortium.
  3. *
  4. * Permission to use, copy, modify, and distribute this software for any
  5. * purpose with or without fee is hereby granted, provided that the above
  6. * copyright notice and this permission notice appear in all copies.
  7. *
  8. * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
  9. * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
  10. * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
  11. * CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  12. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  13. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
  14. * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
  15. * SOFTWARE.
  16. */
  17. /*
  18. * Portions Copyright (c) 1995 by International Business Machines, Inc.
  19. *
  20. * International Business Machines, Inc. (hereinafter called IBM) grants
  21. * permission under its copyrights to use, copy, modify, and distribute this
  22. * Software with or without fee, provided that the above copyright notice and
  23. * all paragraphs of this notice appear in all copies, and that the name of IBM
  24. * not be used in connection with the marketing of any product incorporating
  25. * the Software or modifications thereof, without specific, written prior
  26. * permission.
  27. *
  28. * To the extent it has a right to do so, IBM grants an immunity from suit
  29. * under its patents, if any, for the use, sale or manufacture of products to
  30. * the extent that such products are used for performing Domain Name System
  31. * dynamic updates in TCP/IP networks by means of the Software. No immunity is
  32. * granted for any product per se or for any other function of any product.
  33. *
  34. * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
  35. * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
  36. * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
  37. * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
  38. * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
  39. * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
  40. */
  41. //#include <config.h>
  42. #include <sys/types.h>
  43. #include <sys/param.h>
  44. #include <sys/socket.h>
  45. #include <netinet/in.h>
  46. #include <arpa/inet.h>
  47. #include <ctype.h>
  48. #include <stdio.h>
  49. #include <stdlib.h>
  50. #include <string.h>
  51. #include "fdm.h"
  52. #define Assert(Cond) if (!(Cond)) abort()
  53. static const char Base64[] =
  54. "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
  55. static const char Pad64 = '=';
  56. /* (From RFC1521 and draft-ietf-dnssec-secext-03.txt)
  57. The following encoding technique is taken from RFC 1521 by Borenstein
  58. and Freed. It is reproduced here in a slightly edited form for
  59. convenience.
  60. A 65-character subset of US-ASCII is used, enabling 6 bits to be
  61. represented per printable character. (The extra 65th character, "=",
  62. is used to signify a special processing function.)
  63. The encoding process represents 24-bit groups of input bits as output
  64. strings of 4 encoded characters. Proceeding from left to right, a
  65. 24-bit input group is formed by concatenating 3 8-bit input groups.
  66. These 24 bits are then treated as 4 concatenated 6-bit groups, each
  67. of which is translated into a single digit in the base64 alphabet.
  68. Each 6-bit group is used as an index into an array of 64 printable
  69. characters. The character referenced by the index is placed in the
  70. output string.
  71. Table 1: The Base64 Alphabet
  72. Value Encoding Value Encoding Value Encoding Value Encoding
  73. 0 A 17 R 34 i 51 z
  74. 1 B 18 S 35 j 52 0
  75. 2 C 19 T 36 k 53 1
  76. 3 D 20 U 37 l 54 2
  77. 4 E 21 V 38 m 55 3
  78. 5 F 22 W 39 n 56 4
  79. 6 G 23 X 40 o 57 5
  80. 7 H 24 Y 41 p 58 6
  81. 8 I 25 Z 42 q 59 7
  82. 9 J 26 a 43 r 60 8
  83. 10 K 27 b 44 s 61 9
  84. 11 L 28 c 45 t 62 +
  85. 12 M 29 d 46 u 63 /
  86. 13 N 30 e 47 v
  87. 14 O 31 f 48 w (pad) =
  88. 15 P 32 g 49 x
  89. 16 Q 33 h 50 y
  90. Special processing is performed if fewer than 24 bits are available
  91. at the end of the data being encoded. A full encoding quantum is
  92. always completed at the end of a quantity. When fewer than 24 input
  93. bits are available in an input group, zero bits are added (on the
  94. right) to form an integral number of 6-bit groups. Padding at the
  95. end of the data is performed using the '=' character.
  96. Since all base64 input is an integral number of octets, only the
  97. following cases can arise:
  98. (1) the final quantum of encoding input is an integral
  99. multiple of 24 bits; here, the final unit of encoded
  100. output will be an integral multiple of 4 characters
  101. with no "=" padding,
  102. (2) the final quantum of encoding input is exactly 8 bits;
  103. here, the final unit of encoded output will be two
  104. characters followed by two "=" padding characters, or
  105. (3) the final quantum of encoding input is exactly 16 bits;
  106. here, the final unit of encoded output will be three
  107. characters followed by one "=" padding character.
  108. */
  109. int
  110. local_b64_ntop(uint8_t const *src, size_t srclength, char *target, size_t targsize) {
  111. size_t datalength = 0;
  112. uint8_t input[3];
  113. uint8_t output[4];
  114. size_t i;
  115. while (2 < srclength) {
  116. input[0] = *src++;
  117. input[1] = *src++;
  118. input[2] = *src++;
  119. srclength -= 3;
  120. output[0] = input[0] >> 2;
  121. output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4);
  122. output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6);
  123. output[3] = input[2] & 0x3f;
  124. Assert(output[0] < 64);
  125. Assert(output[1] < 64);
  126. Assert(output[2] < 64);
  127. Assert(output[3] < 64);
  128. if (datalength + 4 > targsize)
  129. return (-1);
  130. target[datalength++] = Base64[output[0]];
  131. target[datalength++] = Base64[output[1]];
  132. target[datalength++] = Base64[output[2]];
  133. target[datalength++] = Base64[output[3]];
  134. }
  135. /* Now we worry about padding. */
  136. if (0 != srclength) {
  137. /* Get what's left. */
  138. input[0] = input[1] = input[2] = '\0';
  139. for (i = 0; i < srclength; i++)
  140. input[i] = *src++;
  141. output[0] = input[0] >> 2;
  142. output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4);
  143. output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6);
  144. Assert(output[0] < 64);
  145. Assert(output[1] < 64);
  146. Assert(output[2] < 64);
  147. if (datalength + 4 > targsize)
  148. return (-1);
  149. target[datalength++] = Base64[output[0]];
  150. target[datalength++] = Base64[output[1]];
  151. if (srclength == 1)
  152. target[datalength++] = Pad64;
  153. else
  154. target[datalength++] = Base64[output[2]];
  155. target[datalength++] = Pad64;
  156. }
  157. if (datalength >= targsize)
  158. return (-1);
  159. target[datalength] = '\0'; /* Returned value doesn't count \0. */
  160. return (datalength);
  161. }