Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
ISC Open Source Projects
BIND
Commits
ed019cab
Commit
ed019cab
authored
May 24, 2000
by
David Lawrence
Browse files
fixed lines > 79 columns wide
parent
e38d22f5
Changes
53
Hide whitespace changes
Inline
Side-by-side
bin/dnssec/dnssec-makekeyset.c
View file @
ed019cab
...
...
@@ -343,7 +343,8 @@ main(int argc, char *argv[]) {
isc_buffer_init
(
&
b
,
data
,
BUFSIZE
);
result
=
dst_key_todns
(
key
,
&
b
);
if
(
result
!=
ISC_R_SUCCESS
)
fatal
(
"failed to convert key %s/%s/%d to a DNS KEY: %s"
,
fatal
(
"failed to convert key %s/%s/%d "
"to a DNS KEY: %s"
,
namestr
,
id
,
algtostr
(
alg
),
isc_result_totext
(
result
));
isc_buffer_usedregion
(
&
b
,
&
r
);
...
...
bin/dnssec/dnssec-signzone.c
View file @
ed019cab
...
...
@@ -761,7 +761,8 @@ signname(dns_db_t *db, dns_dbversion_t *version, dns_dbnode_t *node,
if
(
dns_name_iswildcard
(
name
))
{
if
(
warnwild
++
==
0
)
{
fprintf
(
stderr
,
"%s: warning: BIND 9 doesn't properly "
"handle wildcards in secure zones:
\n
"
,
PROGRAM
);
"handle wildcards in secure zones:
\n
"
,
PROGRAM
);
fprintf
(
stderr
,
"
\t
- wildcard nonexistence proof is "
"not generated by the server
\n
"
);
fprintf
(
stderr
,
"
\t
- wildcard nonexistence proof is "
...
...
@@ -1512,7 +1513,7 @@ main(int argc, char *argv[]) {
"non-private key "
"'%s/%s/%d'"
,
dst_key_name
(
dkey
),
algtostr
(
dst_key_alg
(
dkey
)),
algtostr
(
dst_key_alg
(
dkey
)),
dst_key_id
(
dkey
));
break
;
}
...
...
bin/named/aclconf.c
View file @
ed019cab
...
...
@@ -166,7 +166,7 @@ dns_acl_fromconfig(dns_c_ipmatchlist_t *caml,
break
;
case
dns_c_ipmatch_localnets
:
de
->
type
=
dns_aclelementtype_localnets
;
de
->
type
=
dns_aclelementtype_localnets
;
break
;
case
dns_c_ipmatch_acl
:
de
->
type
=
dns_aclelementtype_nestedacl
;
...
...
bin/named/query.c
View file @
ed019cab
...
...
@@ -311,7 +311,8 @@ query_newrdataset(ns_client_t *client) {
rdataset
=
NULL
;
result
=
dns_message_gettemprdataset
(
client
->
message
,
&
rdataset
);
if
(
result
!=
ISC_R_SUCCESS
)
{
CTRACE
(
"query_newrdataset: dns_message_gettemprdataset failed: done"
);
CTRACE
(
"query_newrdataset: "
"dns_message_gettemprdataset failed: done"
);
return
(
NULL
);
}
dns_rdataset_init
(
rdataset
);
...
...
@@ -1747,11 +1748,14 @@ query_resume(isc_task_t *task, isc_event_t *event) {
query_putrdataset
(
client
,
&
devent
->
sigrdataset
);
isc_event_free
(
&
event
);
ns_client_next
(
client
,
ISC_R_CANCELED
);
/* This may destroy the client. */
/*
* This may destroy the client.
*/
ns_client_detach
(
&
client
);
}
else
{
RWLOCK
(
&
ns_g_server
->
conflock
,
isc_rwlocktype_read
);
dns_zonemgr_lockconf
(
ns_g_server
->
zonemgr
,
isc_rwlocktype_read
);
dns_zonemgr_lockconf
(
ns_g_server
->
zonemgr
,
isc_rwlocktype_read
);
dns_view_attach
(
client
->
view
,
&
client
->
lockview
);
RWLOCK
(
&
client
->
lockview
->
conflock
,
isc_rwlocktype_read
);
...
...
@@ -1759,7 +1763,8 @@ query_resume(isc_task_t *task, isc_event_t *event) {
RWUNLOCK
(
&
client
->
lockview
->
conflock
,
isc_rwlocktype_read
);
dns_view_detach
(
&
client
->
lockview
);
dns_zonemgr_unlockconf
(
ns_g_server
->
zonemgr
,
isc_rwlocktype_read
);
dns_zonemgr_unlockconf
(
ns_g_server
->
zonemgr
,
isc_rwlocktype_read
);
RWUNLOCK
(
&
ns_g_server
->
conflock
,
isc_rwlocktype_read
);
}
}
...
...
bin/named/server.c
View file @
ed019cab
...
...
@@ -285,7 +285,7 @@ get_view_querysource_dispatch(dns_c_ctx_t *cctx, dns_c_view_t *cview,
if
(
cview
!=
NULL
)
result
=
dns_c_view_getquerysource
(
cview
,
&
sa
);
if
(
result
!=
ISC_R_SUCCESS
)
result
=
dns_c_ctx_getquerysource
(
cctx
,
&
sa
);
result
=
dns_c_ctx_getquerysource
(
cctx
,
&
sa
);
if
(
result
!=
ISC_R_SUCCESS
)
isc_sockaddr_any
(
&
sa
);
break
;
...
...
bin/named/update.c
View file @
ed019cab
...
...
@@ -1294,11 +1294,13 @@ next_active(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *oldname,
dns_dbnode_t
*
node
=
NULL
;
if
(
forward
)
result
=
dns_dbiterator_next
(
dbit
);
result
=
dns_dbiterator_next
(
dbit
);
else
result
=
dns_dbiterator_prev
(
dbit
);
if
(
result
==
ISC_R_NOMORE
)
{
/* Wrap around. */
/*
* Wrap around.
*/
if
(
forward
)
CHECK
(
dns_dbiterator_first
(
dbit
));
else
...
...
@@ -1329,7 +1331,8 @@ next_active(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *oldname,
* Add a NXT record for "name", recording the change in "diff".
*/
static
isc_result_t
add_nxt
(
dns_db_t
*
db
,
dns_dbversion_t
*
ver
,
dns_name_t
*
name
,
dns_diff_t
*
diff
)
{
add_nxt
(
dns_db_t
*
db
,
dns_dbversion_t
*
ver
,
dns_name_t
*
name
,
dns_diff_t
*
diff
)
{
isc_result_t
result
;
dns_dbnode_t
*
node
=
NULL
;
unsigned
char
buffer
[
DNS_NXT_BUFFERSIZE
];
...
...
@@ -1342,16 +1345,22 @@ add_nxt(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff)
target
=
dns_fixedname_name
(
&
fixedname
);
/* Find the successor name, aka NXT target. */
/*
* Find the successor name, aka NXT target.
*/
CHECK
(
next_active
(
db
,
ver
,
name
,
target
,
ISC_TRUE
));
/* Create the NXT RDATA. */
/*
* Create the NXT RDATA.
*/
CHECK
(
dns_db_findnode
(
db
,
name
,
ISC_FALSE
,
&
node
));
dns_rdata_init
(
&
rdata
);
CHECK
(
dns_buildnxtrdata
(
db
,
ver
,
node
,
target
,
buffer
,
&
rdata
));
dns_db_detachnode
(
db
,
&
node
);
/* Create a diff tuple, update the database, and record the change. */
/*
* Create a diff tuple, update the database, and record the change.
*/
CHECK
(
dns_difftuple_create
(
diff
->
mctx
,
DNS_DIFFOP_ADD
,
name
,
3600
,
/* XXXRTH */
&
rdata
,
&
tuple
));
...
...
@@ -1368,7 +1377,8 @@ add_nxt(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff)
* Add a placeholder NXT record for "name", recording the change in "diff".
*/
static
isc_result_t
add_placeholder_nxt
(
dns_db_t
*
db
,
dns_dbversion_t
*
ver
,
dns_name_t
*
name
,
dns_diff_t
*
diff
)
{
add_placeholder_nxt
(
dns_db_t
*
db
,
dns_dbversion_t
*
ver
,
dns_name_t
*
name
,
dns_diff_t
*
diff
)
{
isc_result_t
result
;
dns_difftuple_t
*
tuple
=
NULL
;
isc_region_t
r
;
...
...
@@ -1647,11 +1657,14 @@ update_signatures(isc_mem_t *mctx, dns_db_t *db, dns_dbversion_t *oldver,
dns_rdatatype_nxt
,
0
,
NULL
,
&
nxt_diff
));
}
else
{
/* This name is not obscured. It should have a NXT. */
/*
* This name is not obscured. It should have a NXT.
*/
CHECK
(
rrset_exists
(
db
,
newver
,
&
t
->
name
,
dns_rdatatype_nxt
,
0
,
&
flag
));
if
(
!
flag
)
{
add_placeholder_nxt
(
db
,
newver
,
&
t
->
name
,
diff
);
add_placeholder_nxt
(
db
,
newver
,
&
t
->
name
,
diff
);
}
}
}
...
...
bin/tests/dst/t_dst.c
View file @
ed019cab
...
...
@@ -247,7 +247,8 @@ io(char *name, int id, int alg, int type, isc_mem_t *mctx,
ret
=
dst_key_fromfile
(
name
,
id
,
alg
,
type
,
mctx
,
&
key
);
if
(
ret
!=
ISC_R_SUCCESS
)
{
t_info
(
"dst_key_fromfile(%d) returned: %s
\n
"
,
alg
,
dst_result_totext
(
ret
));
t_info
(
"dst_key_fromfile(%d) returned: %s
\n
"
,
alg
,
dst_result_totext
(
ret
));
++*
nfails
;
return
;
}
...
...
@@ -275,8 +276,9 @@ io(char *name, int id, int alg, int type, isc_mem_t *mctx,
ret
=
dst_key_tofile
(
key
,
type
);
if
(
ret
!=
0
)
{
t_info
(
"dst_key_tofile(%d) returned: %s
\n
"
,
alg
,
dst_result_totext
(
ret
));
(
void
)
chdir
(
current
);
t_info
(
"dst_key_tofile(%d) returned: %s
\n
"
,
alg
,
dst_result_totext
(
ret
));
(
void
)
chdir
(
current
);
++*
nfails
;
return
;
}
...
...
@@ -401,7 +403,10 @@ t1(void) {
generate
(
DST_ALG_RSA
,
mctx
,
512
,
&
nfails
);
generate
(
DST_ALG_DSA
,
mctx
,
512
,
&
nfails
);
generate
(
DST_ALG_DH
,
mctx
,
512
,
&
nfails
);
generate
(
DST_ALG_DH
,
mctx
,
768
,
&
nfails
);
/* this one uses a constant */
/*
* This one uses a constant.
*/
generate
(
DST_ALG_DH
,
mctx
,
768
,
&
nfails
);
generate
(
DST_ALG_HMACMD5
,
mctx
,
512
,
&
nfails
);
t_info
(
"testing random number sequence generation
\n
"
);
...
...
@@ -420,7 +425,7 @@ t1(void) {
#define T_SIGMAX 512
#undef NEWSIG
/*
d
efine NEWSIG to generate the original signature file */
#undef NEWSIG
/*
D
efine NEWSIG to generate the original signature file
.
*/
#ifdef NEWSIG
...
...
bin/tests/names/t_names.c
View file @
ed019cab
...
...
@@ -87,13 +87,15 @@ pbuf(isc_buffer_t *pbuf) {
#endif
/* NEED_PBUF */
/*
*
c
ompare data at buf with data in hex representation at exp_data,
*
C
ompare data at buf with data in hex representation at exp_data,
* of length exp_data_len, for equality.
*
r
eturn 0 if equal, else non-zero
*
R
eturn 0 if equal, else non-zero
.
*/
static
int
chkdata
(
unsigned
char
*
buf
,
size_t
buflen
,
char
*
exp_data
,
size_t
exp_data_len
)
{
chkdata
(
unsigned
char
*
buf
,
size_t
buflen
,
char
*
exp_data
,
size_t
exp_data_len
)
{
int
result
;
unsigned
char
*
p
;
unsigned
char
*
v
;
...
...
@@ -1142,9 +1144,9 @@ t_dns_name_compare(void) {
}
}
char
*
a30
=
"dns_name_rdatacompare(name1, name2) returns information
about
"
"the relative ordering of name1 and name2 as if they
are part
"
"of rdata in DNSSEC canonical form"
;
char
*
a30
=
"dns_name_rdatacompare(name1, name2) returns information "
"
about
the relative ordering of name1 and name2 as if they "
"
are part
of rdata in DNSSEC canonical form"
;
/*
* a31, a32 merged into a30.
...
...
@@ -2335,7 +2337,7 @@ test_dns_name_towire(char *testname, int dc_method, char *exp_data,
result
=
T_PASS
;
}
else
{
t_info
(
"dns_name_towire unexpectedly returned %s
\n
"
,
dns_result_totext
(
dns_result
));
dns_result_totext
(
dns_result
));
result
=
T_FAIL
;
}
}
else
{
...
...
bin/tests/rdata_test.c
View file @
ed019cab
...
...
@@ -513,7 +513,8 @@ viastruct(dns_rdata_t *rdata, isc_mem_t *mctx,
rdt
=
rdata
->
type
;
result
=
dns_rdata_fromstruct
(
rdata2
,
rdc
,
rdt
,
sp
,
b
);
if
(
result
!=
ISC_R_SUCCESS
)
fprintf
(
stdout
,
"viastruct: fromstuct %d %d return %s
\n
"
,
fprintf
(
stdout
,
"viastruct: fromstuct %d %d return %s
\n
"
,
rdata
->
type
,
rdata
->
rdclass
,
dns_result_totext
(
result
));
else
if
(
rdata
->
length
!=
rdata2
->
length
||
...
...
@@ -839,7 +840,9 @@ main(int argc, char *argv[]) {
RUNTIME_CHECK
(
isc_mem_create
(
0
,
0
,
&
mctx
)
==
ISC_R_SUCCESS
);
RUNTIME_CHECK
(
isc_lex_create
(
mctx
,
256
,
&
lex
)
==
ISC_R_SUCCESS
);
/* Set up to lex DNS master file. */
/*
* Set up to lex DNS master file.
*/
specials
[
'('
]
=
1
;
specials
[
')'
]
=
1
;
...
...
@@ -862,7 +865,9 @@ main(int argc, char *argv[]) {
if
(
token
.
type
==
isc_tokentype_eof
)
break
;
/* get type */
/*
* Get type.
*/
if
(
token
.
type
==
isc_tokentype_number
)
{
type
=
token
.
value
.
as_ulong
;
isc_buffer_init
(
&
tbuf
,
outbuf
,
sizeof
(
outbuf
));
...
...
@@ -874,7 +879,8 @@ main(int argc, char *argv[]) {
&
token
.
value
.
as_textregion
);
if
(
result
!=
ISC_R_SUCCESS
)
{
fprintf
(
stdout
,
"dns_rdatatype_fromtext returned %s(%d)
\n
"
,
"dns_rdatatype_fromtext "
"returned %s(%d)
\n
"
,
dns_result_totext
(
result
),
result
);
fflush
(
stdout
);
need_eol
=
1
;
...
...
@@ -886,13 +892,14 @@ main(int argc, char *argv[]) {
}
else
continue
;
if
((
result
=
isc_lex_gettoken
(
lex
,
options
|
ISC_LEXOPT_NUMBER
,
&
token
))
!=
ISC_R_SUCCESS
)
break
;
result
=
isc_lex_gettoken
(
lex
,
options
|
ISC_LEXOPT_NUMBER
,
&
token
)
if
(
result
!=
ISC_R_SUCCESS
)
break
;
if
(
token
.
type
==
isc_tokentype_eol
)
continue
;
continue
;
if
(
token
.
type
==
isc_tokentype_eof
)
break
;
break
;
if
(
token
.
type
==
isc_tokentype_number
)
{
class
=
token
.
value
.
as_ulong
;
isc_buffer_init
(
&
tbuf
,
outbuf
,
sizeof
(
outbuf
));
...
...
@@ -903,8 +910,8 @@ main(int argc, char *argv[]) {
result
=
dns_rdataclass_fromtext
(
&
class
,
&
token
.
value
.
as_textregion
);
if
(
result
!=
ISC_R_SUCCESS
)
{
fprintf
(
stdout
,
"dns_rdataclass_fromtext
returned %s(%d)
\n
"
,
fprintf
(
stdout
,
"dns_rdataclass_fromtext "
"
returned %s(%d)
\n
"
,
dns_result_totext
(
result
),
result
);
fflush
(
stdout
);
need_eol
=
1
;
...
...
@@ -942,7 +949,9 @@ main(int argc, char *argv[]) {
}
}
/* Convert to wire and back? */
/*
* Convert to wire and back?
*/
if
(
wire
)
{
result
=
dns_compress_init
(
&
cctx
,
-
1
,
mctx
);
if
(
result
!=
ISC_R_SUCCESS
)
{
...
...
bin/tests/zone2_test.c
View file @
ed019cab
...
...
@@ -233,7 +233,8 @@ query(dns_view_t *view) {
continue
;
}
if
(
strcasecmp
(
buf
,
"journal"
)
==
0
)
{
dns_journal_print
(
view
->
mctx
,
"dv.isc.org.ixfr"
,
stdout
);
dns_journal_print
(
view
->
mctx
,
"dv.isc.org.ixfr"
,
stdout
);
reload
=
0
;
continue
;
}
...
...
@@ -257,7 +258,7 @@ query(dns_view_t *view) {
continue
;
}
result
=
dns_zone_load
(
zone
);
fprintf
(
stdout
,
"
%s
() returned %s
\n
"
,
"dns_zone_reload"
,
fprintf
(
stdout
,
"
dns_zone_reload
() returned %s
\n
"
,
dns_result_totext
(
result
));
reload
=
0
;
dns_zone_detach
(
&
zone
);
...
...
lib/dns/aclconf.c
View file @
ed019cab
...
...
@@ -166,7 +166,7 @@ dns_acl_fromconfig(dns_c_ipmatchlist_t *caml,
break
;
case
dns_c_ipmatch_localnets
:
de
->
type
=
dns_aclelementtype_localnets
;
de
->
type
=
dns_aclelementtype_localnets
;
break
;
case
dns_c_ipmatch_acl
:
de
->
type
=
dns_aclelementtype_nestedacl
;
...
...
lib/dns/include/dns/db.h
View file @
ed019cab
...
...
@@ -197,8 +197,8 @@ dns_db_create(isc_mem_t *mctx, char *db_type, dns_name_t *origin,
*
* Notes:
* All names in the database must be subdomains of 'origin' and in class
* 'rdclass'. The database makes its own copy of the origin, so the
caller
* may do whatever they like with 'origin' and its storage once the
* 'rdclass'. The database makes its own copy of the origin, so the
*
caller
may do whatever they like with 'origin' and its storage once the
* call returns.
*
* If 'cache' is ISC_TRUE, then cache semantics will be used, otherwise
...
...
lib/dns/include/dns/dnssec.h
View file @
ed019cab
...
...
@@ -107,9 +107,10 @@ dns_dnssec_verify(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key,
*/
isc_result_t
dns_dnssec_findzonekeys
(
dns_db_t
*
db
,
dns_dbversion_t
*
ver
,
dns_dbnode_t
*
node
,
dns_name_t
*
name
,
isc_mem_t
*
mctx
,
unsigned
int
maxkeys
,
dst_key_t
**
keys
,
unsigned
int
*
nkeys
);
dns_dnssec_findzonekeys
(
dns_db_t
*
db
,
dns_dbversion_t
*
ver
,
dns_dbnode_t
*
node
,
dns_name_t
*
name
,
isc_mem_t
*
mctx
,
unsigned
int
maxkeys
,
dst_key_t
**
keys
,
unsigned
int
*
nkeys
);
/*
* Finds a set of zone keys.
* XXX temporary - this should be handled in dns_zone_t.
...
...
lib/dns/include/dns/keyvalues.h
View file @
ed019cab
...
...
@@ -42,7 +42,7 @@
#define DNS_KEYFLAG_RESERVED9 0x0040
/* reserved - must be zero */
#define DNS_KEYFLAG_RESERVED10 0x0020
/* reserved - must be zero */
#define DNS_KEYFLAG_RESERVED11 0x0010
/* reserved - must be zero */
#define DNS_KEYFLAG_SIGNATORYMASK
0x000F
/* key can sign RR's of same name */
#define DNS_KEYFLAG_SIGNATORYMASK
0x000F
/* key can sign RR's of same name */
#define DNS_KEYFLAG_RESERVEDMASK (DNS_KEYFLAG_RESERVED2 | \
DNS_KEYFLAG_RESERVED4 | \
...
...
lib/dns/include/dns/tsig.h
View file @
ed019cab
...
...
@@ -114,7 +114,8 @@ dns_tsigkey_free(dns_tsigkey_t **key);
void
dns_tsigkey_setdeleted
(
dns_tsigkey_t
*
key
);
/*
* Marks this key as deleted. It will be deleted when no references exist.
* Marks this key as deleted. It will be deleted when no references
* exist.
*
* Requires:
* 'key' is a valid TSIG key
...
...
@@ -134,7 +135,8 @@ dns_tsig_sign(dns_message_t *msg);
* ISC_R_SUCCESS
* ISC_R_NOMEMORY
* ISC_R_NOSPACE
* DNS_R_EXPECTEDTSIG - this is a response & msg->querytsig is NULL
* DNS_R_EXPECTEDTSIG
* - this is a response & msg->querytsig is NULL
*/
isc_result_t
...
...
lib/dns/journal.c
View file @
ed019cab
...
...
@@ -1023,7 +1023,7 @@ journal_file_create(isc_mem_t *mctx, const char *filename) {
result
=
isc_stdio_close
(
fp
);
if
(
result
!=
ISC_R_SUCCESS
)
{
isc_log_write
(
JOURNAL_COMMON_LOGARGS
,
ISC_LOG_ERROR
,
isc_log_write
(
JOURNAL_COMMON_LOGARGS
,
ISC_LOG_ERROR
,
"%s: close: %s"
,
filename
,
isc_result_totext
(
result
));
(
void
)
isc_file_remove
(
filename
);
...
...
@@ -1247,7 +1247,7 @@ journal_next(dns_journal_t *j, journal_pos_t *pos) {
* Check for offset wraparound.
*/
if
(
pos
->
offset
+
xhdr
.
size
<
pos
->
offset
)
{
isc_log_write
(
JOURNAL_COMMON_LOGARGS
,
ISC_LOG_ERROR
,
isc_log_write
(
JOURNAL_COMMON_LOGARGS
,
ISC_LOG_ERROR
,
"%s: offset too large"
,
j
->
filename
);
return
(
ISC_R_UNEXPECTED
);
...
...
@@ -1747,7 +1747,7 @@ roll_forward(dns_journal_t *j, dns_db_t *db) {
if
(
n_soa
==
3
)
n_soa
=
1
;
if
(
n_soa
==
0
)
{
isc_log_write
(
JOURNAL_COMMON_LOGARGS
,
ISC_LOG_ERROR
,
isc_log_write
(
JOURNAL_COMMON_LOGARGS
,
ISC_LOG_ERROR
,
"%s: journal file corrupt: missing "
"initial SOA"
,
j
->
filename
);
FAIL
(
ISC_R_UNEXPECTED
);
...
...
lib/dns/message.c
View file @
ed019cab
...
...
@@ -509,7 +509,8 @@ msgreset(dns_message_t *msg, isc_boolean_t everything) {
if
(
msg
->
tsig
!=
NULL
)
{
dns_rdata_freestruct
(
msg
->
tsig
);
isc_mem_put
(
msg
->
mctx
,
msg
->
tsig
,
sizeof
(
dns_rdata_any_tsig_t
));
isc_mem_put
(
msg
->
mctx
,
msg
->
tsig
,
sizeof
(
dns_rdata_any_tsig_t
));
msg
->
tsig
=
NULL
;
}
...
...
lib/dns/rdata.c
View file @
ed019cab
...
...
@@ -15,7 +15,7 @@
* SOFTWARE.
*/
/* $Id: rdata.c,v 1.9
4
2000/05/24 0
2:45:08
tale Exp $ */
/* $Id: rdata.c,v 1.9
5
2000/05/24 0
5:09:12
tale Exp $ */
#include <config.h>
#include <ctype.h>
...
...
@@ -746,7 +746,8 @@ dns_rdataclass_fromtext(dns_rdataclass_t *classp, isc_textregion_t *source) {
/*
* Note: attrs is set and then used in the bit test with RESERVED
* because testing "(flags & RESERVED) != 0" generates
* warnings on IRIX about how the test always has the same value * because it is all constants.
* warnings on IRIX about how the test always has the same value
* because it is all constants.
*/
#define COMPARE(string, flags, type) \
if (((sizeof(string) - 1) == source->length) \
...
...
lib/dns/rdata/generic/cname_5.c
View file @
ed019cab
...
...
@@ -15,14 +15,15 @@
* SOFTWARE.
*/
/* $Id: cname_5.c,v 1.3
0
2000/05/2
2 12:37:31 marka
Exp $ */
/* $Id: cname_5.c,v 1.3
1
2000/05/2
4 05:09:26 tale
Exp $ */
/* reviewed: Wed Mar 15 16:48:45 PST 2000 by brister */
#ifndef RDATA_GENERIC_CNAME_5_C
#define RDATA_GENERIC_CNAME_5_C
#define RRTYPE_CNAME_ATTRIBUTES (DNS_RDATATYPEATTR_EXCLUSIVE | DNS_RDATATYPEATTR_SINGLETON)
#define RRTYPE_CNAME_ATTRIBUTES \
(DNS_RDATATYPEATTR_EXCLUSIVE | DNS_RDATATYPEATTR_SINGLETON)
static
inline
isc_result_t
fromtext_cname
(
dns_rdataclass_t
rdclass
,
dns_rdatatype_t
type
,
...
...
lib/dns/rdata/generic/gpos_27.c
View file @
ed019cab
...
...
@@ -15,7 +15,7 @@
* SOFTWARE.
*/
/* $Id: gpos_27.c,v 1.2
0
2000/05/2
2 12:37:33 marka
Exp $ */
/* $Id: gpos_27.c,v 1.2
1
2000/05/2
4 05:09:27 tale
Exp $ */
/* reviewed: Wed Mar 15 16:48:45 PST 2000 by brister */
...
...
@@ -161,7 +161,8 @@ tostruct_gpos(dns_rdata_t *rdata, void *target, isc_mem_t *mctx)
gpos
->
lat_len
=
uint8_fromregion
(
&
region
);
isc_region_consume
(
&
region
,
1
);
if
(
gpos
->
lat_len
>
0
)
{
gpos
->
latitude
=
mem_maybedup
(
mctx
,
region
.
base
,
gpos
->
lat_len
);
gpos
->
latitude
=
mem_maybedup
(
mctx
,
region
.
base
,
gpos
->
lat_len
);
if
(
gpos
->
latitude
==
NULL
)
goto
cleanup_longitude
;
isc_region_consume
(
&
region
,
gpos
->
lat_len
);
...
...
@@ -171,7 +172,8 @@ tostruct_gpos(dns_rdata_t *rdata, void *target, isc_mem_t *mctx)
gpos
->
alt_len
=
uint8_fromregion
(
&
region
);
isc_region_consume
(
&
region
,
1
);
if
(
gpos
->
lat_len
>
0
)
{
gpos
->
altitude
=
mem_maybedup
(
mctx
,
region
.
base
,
gpos
->
alt_len
);
gpos
->
altitude
=
mem_maybedup
(
mctx
,
region
.
base
,
gpos
->
alt_len
);
if
(
gpos
->
altitude
==
NULL
)
goto
cleanup_latitude
;
}
else
...
...
Prev
1
2
3
Next
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment