{
return addCDNSKEY(p, r, d_sd);
}
-bool PacketHandler::addCDNSKEY(DNSPacket& p, std::unique_ptr<DNSPacket>& r, SOAData &sd)
+bool PacketHandler::addCDNSKEY(DNSPacket& p, std::unique_ptr<DNSPacket>& r, SOAData &sd) // NOLINT(readability-identifier-length)
{
string publishCDNSKEY;
d_dk.getPublishCDNSKEY(sd.zonename,publishCDNSKEY);
r->addRecord(std::move(rr));
}
-void PacketHandler::emitNSEC3(DNSPacket& p, std::unique_ptr<DNSPacket>& r, const NSEC3PARAMRecordContent& ns3prc, const DNSName& name, const string& namehash, const string& nexthash, int mode)
+void PacketHandler::emitNSEC3(DNSPacket& p, std::unique_ptr<DNSPacket>& r, const NSEC3PARAMRecordContent& ns3prc, const DNSName& name, const string& namehash, const string& nexthash, int mode) // NOLINT(readability-identifier-length)
{
NSEC3RecordContent n3rc;
n3rc.d_algorithm = ns3prc.d_algorithm;
}
}
-bool PacketHandler::tryAuthSignal(DNSPacket& p, std::unique_ptr<DNSPacket>& r, DNSName &target) {
+bool PacketHandler::tryAuthSignal(DNSPacket& p, std::unique_ptr<DNSPacket>& r, DNSName &target) // NOLINT(readability-identifier-length)
+{
DLOG(g_log<<Logger::Warning<<"Let's try authenticated DNSSEC bootstrapping (RFC 9615) ..."<<endl);
if(d_sd.zonename.operator const DNSName&().countLabels() == 0 || d_sd.zonename.operator const DNSName&().getRawLabel(0) != "_signal" || !d_dk.isSignalingZone(d_sd.zonename)) {
return false;
if(p.qtype.getCode() == QType::CDS) {
d_dk.getPublishCDS(zone, val);
autoPublish &= !val.empty();
- if(autoPublish)
+ if(autoPublish) {
haveOne = addCDS(p, r, zone_sd);
+ }
} else if(p.qtype.getCode() == QType::CDNSKEY) {
d_dk.getPublishCDNSKEY(zone, val);
autoPublish &= !val.empty();
- if(autoPublish)
+ if(autoPublish) {
haveOne = addCDNSKEY(p, r, zone_sd);
+ }
}
if(!autoPublish) {
- DNSZoneRecord rr;
+ DNSZoneRecord rec;
B.lookup(p.qtype.getCode(), DNSName(zone), zone_sd.domain_id, &p);
- while(B.get(rr)) {
- rr.dr.d_name = p.qdomain;
- r->addRecord(std::move(rr));
+ while(B.get(rec)) {
+ rec.dr.d_name = p.qdomain;
+ r->addRecord(std::move(rec));
haveOne=true;
}
}
- if(!haveOne)
+ if(!haveOne) {
makeNOError(p, r, target, DNSName(), 6); // other type might exist
+ }
return true;
}
bool getNSEC3Hashes(bool narrow, const std::string& hashed, bool decrement, DNSName& unhashed, std::string& before, std::string& after, int mode=0);
void addNSEC3(DNSPacket& p, std::unique_ptr<DNSPacket>& r, const DNSName &target, const DNSName &wildcard, const NSEC3PARAMRecordContent& nsec3param, bool narrow, int mode);
void emitNSEC(std::unique_ptr<DNSPacket>& r, const DNSName& name, const DNSName& next, int mode);
- void emitNSEC3(DNSPacket& p, std::unique_ptr<DNSPacket>& r, const NSEC3PARAMRecordContent &ns3rc, const DNSName& unhashed, const string& begin, const string& end, int mode);
+ void emitNSEC3(DNSPacket& p, std::unique_ptr<DNSPacket>& r, const NSEC3PARAMRecordContent &ns3prc, const DNSName& name, const string& namehash, const string& nexthash, int mode);
int processUpdate(DNSPacket& p);
int forwardPacket(const string &msgPrefix, const DNSPacket& p, const DomainInfo& di);
uint performUpdate(const string &msgPrefix, const DNSRecord *rr, DomainInfo *di, bool isPresigned, bool* narrow, bool* haveNSEC3, NSEC3PARAMRecordContent *ns3pr, bool *updatedSerial);