goto invalid_option;
}
- return true;
+ return (true);
invalid_option:
- return false;
+ return (false);
}
/*%
dns_dbtype_zone, dns_rdataclass_in, 0, NULL,
&db);
if (result != ISC_R_SUCCESS) {
- return 0;
+ return (0);
}
result = dns_db_beginload(db, &callbacks);
#define CHECK(x) \
if ((x) != ISC_R_SUCCESS) { \
- return 0; \
+ return (0); \
}
ISC_LANG_ENDDECLS
ret = LLVMFuzzerInitialize(&argc, &argv);
if (ret != 0) {
fprintf(stderr, "LLVMFuzzerInitialize failure: %d\n", ret);
- return 1;
+ return (1);
}
if (argv[1] != NULL && strcmp(argv[1], "-d") == 0) {
LLVMFuzzerInitialize(&argc, &argv);
if (ret != 0) {
fprintf(stderr, "LLVMFuzzerInitialize failure: %d\n", ret);
- return 1;
+ return (1);
}
#ifdef __AFL_LOOP
unsigned int prefix_len = name->offsets[label];
unsigned int coff = isc_buffer_usedlength(buffer) + prefix_len;
if (coff >= 0x4000 || cctx->count > cctx->mask * 3 / 4) {
- return false;
+ return (false);
}
for (;;) {
unsigned int slot = slot_index(cctx, hash, probe);
cctx->set[slot].hash = hash;
cctx->set[slot].coff = coff;
cctx->count++;
- return true;
+ return (true);
}
/* he steals from the rich and gives to the poor */
if (probe > probe_distance(cctx, slot)) {
REQUIRE(kasp != NULL);
REQUIRE(kasp->frozen);
- return kasp->nsec3;
+ return (kasp->nsec3);
}
void
REQUIRE(kasp != NULL);
REQUIRE(kasp->frozen);
- return kasp->offlineksk;
+ return (kasp->offlineksk);
}
void
REQUIRE(kasp != NULL);
REQUIRE(kasp->frozen);
- return kasp->cdnskey;
+ return (kasp->cdnskey);
}
void
}
/* key type + current time */
isc_time_formatshorttimestamp(&now, timebuf, sizeof(timebuf));
- return isc_buffer_printf(buf, "-%s-%s", ksk ? "ksk" : "zsk", timebuf);
+ return (isc_buffer_printf(buf, "-%s-%s", ksk ? "ksk" : "zsk", timebuf));
}
isc_result_t
REQUIRE(DNS_NAME_VALID(name));
- return name->attributes.absolute;
+ return (name->attributes.absolute);
}
#define hyphenchar(c) ((c) == 0x2d)
params[2] = OSSL_PARAM_construct_end();
if (EVP_PKEY_CTX_set_params(pctx, params) != 1) {
- return dst__openssl_toresult2("EVP_PKEY_CTX_set_params",
- DST_R_OPENSSLFAILURE);
+ return (dst__openssl_toresult2("EVP_PKEY_CTX_set_params",
+ DST_R_OPENSSLFAILURE));
}
- return ISC_R_SUCCESS;
+ return (ISC_R_SUCCESS);
}
#endif /* OPENSSL_VERSION_NUMBER >= 0x30200000L */
.key_size = DNS_KEY_ED25519SIZE,
.sig_size = DNS_SIG_ED25519SIZE,
};
- return &ed25519_alginfo;
+ return (&ed25519_alginfo);
}
#if HAVE_OPENSSL_ED448
if (key_alg == DST_ALG_ED448) {
.key_size = DNS_KEY_ED448SIZE,
.sig_size = DNS_SIG_ED448SIZE,
};
- return &ed448_alginfo;
+ return (&ed448_alginfo);
}
#endif /* HAVE_OPENSSL_ED448 */
- return NULL;
+ return (NULL);
}
static isc_result_t
len = r.length;
ret = raw_key_to_ossl(alginfo, 0, r.base, &len, &pkey);
if (ret != ISC_R_SUCCESS) {
- return ret;
+ return (ret);
}
isc_buffer_forward(data, len);
}
UNREACHABLE();
- return false;
+ return (false);
}
void
REQUIRE(transport->type == DNS_TRANSPORT_TLS ||
transport->type == DNS_TRANSPORT_HTTP);
- return transport->tls.always_verify_remote;
+ return (transport->tls.always_verify_remote);
}
isc_result_t
request_type(dns_xfrin_t *xfr) {
switch (xfr->reqtype) {
case dns_rdatatype_soa:
- return "SOA";
+ return ("SOA");
case dns_rdatatype_axfr:
- return "AXFR";
+ return ("AXFR");
case dns_rdatatype_ixfr:
- return "IXFR";
+ return ("IXFR");
default:
ISC_UNREACHABLE();
}
count, dst_key_id(key));
if (count != num) {
- return false;
+ return (false);
}
} else {
(void)dst_key_getnum(key, DST_NUM_DSDELCOUNT, &count);
count, dst_key_id(key));
if (count != num) {
- return false;
+ return (false);
}
}
dns_zone_log(zone, ISC_LOG_WARNING,
"checkds: checkds for key %u failed: %s",
dst_key_id(key), isc_result_totext(result));
- return false;
+ return (false);
}
- return true;
+ return (true);
}
static isc_result_t
atomic_init(&eps->in_use, false);
eps->magic = HTTP_ENDPOINTS_MAGIC;
- return eps;
+ return (eps);
}
void
#define IS_PRINTABLE_ASCII(c) ((unsigned char)(c) - 040u < 0137u)
-#define CHECK_EOF() \
- if (buf == buf_end) { \
- *ret = -2; \
- return NULL; \
+#define CHECK_EOF() \
+ if (buf == buf_end) { \
+ *ret = -2; \
+ return (NULL); \
}
#define EXPECT_CHAR_NO_CHECK(ch) \
if (*buf++ != ch) { \
*ret = -1; \
- return NULL; \
+ return (NULL); \
}
#define EXPECT_CHAR(ch) \
*buf == '\177') \
{ \
*ret = -1; \
- return NULL; \
+ return (NULL); \
} \
} \
++buf; \
(void)ranges;
(void)ranges_size;
#endif
- return buf;
+ return (buf);
}
static const char *
++buf;
} else {
*ret = -1;
- return NULL;
+ return (NULL);
}
*token = token_start;
- return buf;
+ return (buf);
}
static const char *
ret_cnt = 0;
}
if (ret_cnt == 2) {
- return buf;
+ return (buf);
}
}
*ret = -2;
- return NULL;
+ return (NULL);
}
#define PARSE_INT(valp_, mul_) \
if (*buf < '0' || '9' < *buf) { \
buf++; \
*ret = -1; \
- return NULL; \
+ return (NULL); \
} \
*(valp_) = (mul_) * (*buf++ - '0');
break;
} else if (!token_char_map[(unsigned char)*buf]) {
*ret = -1;
- return NULL;
+ return (NULL);
}
++buf;
CHECK_EOF();
}
*token = buf_start;
*token_len = buf - buf_start;
- return buf;
+ return (buf);
}
/* returned pointer is always within [buf, buf_end), or null */
/* we want at least [HTTP/1.<two chars>] to try to parse */
if (buf_end - buf < 9) {
*ret = -2;
- return NULL;
+ return (NULL);
}
EXPECT_CHAR_NO_CHECK('H');
EXPECT_CHAR_NO_CHECK('T');
EXPECT_CHAR_NO_CHECK('1');
EXPECT_CHAR_NO_CHECK('.');
PARSE_INT(minor_version, 1);
- return buf;
+ return (buf);
}
static const char *
}
if (*num_headers == max_headers) {
*ret = -1;
- return NULL;
+ return (NULL);
}
if (!(*num_headers != 0 && (*buf == ' ' || *buf == '\t'))) {
/* parsing name, but do not discard SP before colon, see
&headers[*num_headers].name_len,
':', ret)) == NULL)
{
- return NULL;
+ return (NULL);
}
if (headers[*num_headers].name_len == 0) {
*ret = -1;
- return NULL;
+ return (NULL);
}
++buf;
for (;; ++buf) {
if ((buf = get_token_to_eol(buf, buf_end, &value, &value_len,
ret)) == NULL)
{
- return NULL;
+ return (NULL);
}
/* remove trailing SPs and HTABs */
const char *value_end = value + value_len;
headers[*num_headers].value = value;
headers[*num_headers].value_len = value_end - value;
}
- return buf;
+ return (buf);
}
static const char *
if ((buf = parse_token(buf, buf_end, method, method_len, ' ', ret)) ==
NULL)
{
- return NULL;
+ return (NULL);
}
do {
++buf;
} while (*buf == ' ');
if (*method_len == 0 || *path_len == 0) {
*ret = -1;
- return NULL;
+ return (NULL);
}
if ((buf = parse_http_version(buf, buf_end, minor_version, ret)) ==
NULL)
{
- return NULL;
+ return (NULL);
}
if (*buf == '\015') {
++buf;
++buf;
} else {
*ret = -1;
- return NULL;
+ return (NULL);
}
- return parse_headers(buf, buf_end, headers, num_headers, max_headers,
- ret);
+ return (parse_headers(buf, buf_end, headers, num_headers, max_headers,
+ ret));
}
int
/* if last_len != 0, check if the request is complete (a fast
countermeasure againt slowloris */
if (last_len != 0 && is_complete(buf, buf_end, last_len, &r) == NULL) {
- return r;
+ return (r);
}
if ((buf = parse_request(buf, buf_end, method, method_len, path,
path_len, minor_version, headers, num_headers,
max_headers, &r)) == NULL)
{
- return r;
+ return (r);
}
return (int)(buf - buf_start);
if ((buf = parse_http_version(buf, buf_end, minor_version, ret)) ==
NULL)
{
- return NULL;
+ return (NULL);
}
/* skip space */
if (*buf != ' ') {
*ret = -1;
- return NULL;
+ return (NULL);
}
do {
++buf;
* char> to try to parse */
if (buf_end - buf < 4) {
*ret = -2;
- return NULL;
+ return (NULL);
}
PARSE_INT_3(status);
/* get message including preceding space */
if ((buf = get_token_to_eol(buf, buf_end, msg, msg_len, ret)) == NULL) {
- return NULL;
+ return (NULL);
}
if (*msg_len == 0) {
/* ok */
} else {
/* garbage found after status code */
*ret = -1;
- return NULL;
+ return (NULL);
}
- return parse_headers(buf, buf_end, headers, num_headers, max_headers,
- ret);
+ return (parse_headers(buf, buf_end, headers, num_headers, max_headers,
+ ret));
}
int
/* if last_len != 0, check if the response is complete (a fast
countermeasure against slowloris */
if (last_len != 0 && is_complete(buf, buf_end, last_len, &r) == NULL) {
- return r;
+ return (r);
}
if ((buf = parse_response(buf, buf_end, minor_version, status, msg,
msg_len, headers, num_headers, max_headers,
&r)) == NULL)
{
- return r;
+ return (r);
}
return (int)(buf - buf_start);
/* if last_len != 0, check if the response is complete (a fast
countermeasure against slowloris */
if (last_len != 0 && is_complete(buf, buf_end, last_len, &r) == NULL) {
- return r;
+ return (r);
}
if ((buf = parse_headers(buf, buf_end, headers, num_headers,
max_headers, &r)) == NULL)
{
- return r;
+ return (r);
}
return (int)(buf - buf_start);
static int
decode_hex(int ch) {
if ('0' <= ch && ch <= '9') {
- return ch - '0';
+ return (ch - '0');
} else if ('A' <= ch && ch <= 'F') {
- return ch - 'A' + 0xa;
+ return (ch - 'A' + 0xa);
} else if ('a' <= ch && ch <= 'f') {
- return ch - 'a' + 0xa;
+ return (ch - 'a' + 0xa);
} else {
- return -1;
+ return (-1);
}
}
case CHUNKED_IN_CHUNK_SIZE:
for (;; ++src) {
int v;
- if (src == bufsz)
+ if (src == bufsz) {
goto Exit;
+ }
if ((v = decode_hex(buf[src])) == -1) {
if (decoder->_hex_count == 0) {
ret = -1;
/* RFC 7230 A.2 "Line folding in chunk extensions is
* disallowed" */
for (;; ++src) {
- if (src == bufsz)
+ if (src == bufsz) {
goto Exit;
- if (buf[src] == '\012')
+ }
+ if (buf[src] == '\012') {
break;
+ }
}
++src;
if (decoder->bytes_left_in_chunk == 0) {
case CHUNKED_IN_CHUNK_DATA: {
size_t avail = bufsz - src;
if (avail < decoder->bytes_left_in_chunk) {
- if (dst != src)
+ if (dst != src) {
memmove(buf + dst, buf + src, avail);
+ }
src += avail;
dst += avail;
decoder->bytes_left_in_chunk -= avail;
goto Exit;
}
- if (dst != src)
+ if (dst != src) {
memmove(buf + dst, buf + src,
decoder->bytes_left_in_chunk);
+ }
src += decoder->bytes_left_in_chunk;
dst += decoder->bytes_left_in_chunk;
decoder->bytes_left_in_chunk = 0;
/* fallthru */
case CHUNKED_IN_CHUNK_CRLF:
for (;; ++src) {
- if (src == bufsz)
+ if (src == bufsz) {
goto Exit;
- if (buf[src] != '\015')
+ }
+ if (buf[src] != '\015') {
break;
+ }
}
if (buf[src] != '\012') {
ret = -1;
break;
case CHUNKED_IN_TRAILERS_LINE_HEAD:
for (;; ++src) {
- if (src == bufsz)
+ if (src == bufsz) {
goto Exit;
- if (buf[src] != '\015')
+ }
+ if (buf[src] != '\015') {
break;
+ }
}
- if (buf[src++] == '\012')
+ if (buf[src++] == '\012') {
goto Complete;
+ }
decoder->_state = CHUNKED_IN_TRAILERS_LINE_MIDDLE;
/* fallthru */
case CHUNKED_IN_TRAILERS_LINE_MIDDLE:
for (;; ++src) {
- if (src == bufsz)
+ if (src == bufsz) {
goto Exit;
- if (buf[src] == '\012')
+ }
+ if (buf[src] == '\012') {
break;
+ }
}
++src;
decoder->_state = CHUNKED_IN_TRAILERS_LINE_HEAD;
Complete:
ret = bufsz - src;
Exit:
- if (dst != src)
+ if (dst != src) {
memmove(buf + dst, buf + src, bufsz - src);
+ }
*_bufsz = dst;
- return ret;
+ return (ret);
}
int
phr_decode_chunked_is_in_data(struct phr_chunked_decoder *decoder) {
- return decoder->_state == CHUNKED_IN_CHUNK_DATA;
+ return (decoder->_state == CHUNKED_IN_CHUNK_DATA);
}
#undef CHECK_EOF
len = strlen(find);
do {
do {
- if (slen-- < 1 || (sc = *s++) == '\0')
+ if (slen-- < 1 || (sc = *s++) == '\0') {
return (NULL);
+ }
} while (sc != c);
- if (len > slen)
+ if (len > slen) {
return (NULL);
+ }
} while (strncmp(s, find, len) != 0);
s--;
}
uint32_t len = 0;
if (isc_buffer_peekuint32(ccmsg->buffer, &len) != ISC_R_SUCCESS) {
- return ISC_R_NOMORE;
+ return (ISC_R_NOMORE);
}
if (len == 0) {
- return ISC_R_UNEXPECTEDEND;
+ return (ISC_R_UNEXPECTEDEND);
}
if (len > ccmsg->maxsize) {
- return ISC_R_RANGE;
+ return (ISC_R_RANGE);
}
if (isc_buffer_remaininglength(ccmsg->buffer) < sizeof(uint32_t) + len)
{
- return ISC_R_NOMORE;
+ return (ISC_R_NOMORE);
}
/* Skip the size we just peeked */
isc_buffer_forward(ccmsg->buffer, sizeof(uint32_t));
ccmsg->size = len;
- return ISC_R_SUCCESS;
+ return (ISC_R_SUCCESS);
}
static void
uint32_t
cfg_obj_asduration(const cfg_obj_t *obj) {
REQUIRE(obj != NULL && obj->type->rep == &cfg_rep_duration);
- return isccfg_duration_toseconds(&(obj->value.duration));
+ return (isccfg_duration_toseconds(&(obj->value.duration)));
}
static isc_result_t
* When DoQ support this had to be removed to get correct DoQ entries.
*/
if (!TCP_CLIENT(client)) {
- return DNS_TRANSPORT_UDP;
+ return (DNS_TRANSPORT_UDP);
}
INSIST(client->handle != NULL);
case isc_nm_udplistener:
case isc_nm_proxyudpsocket:
case isc_nm_proxyudplistener:
- return DNS_TRANSPORT_UDP;
+ return (DNS_TRANSPORT_UDP);
case isc_nm_tlssocket:
case isc_nm_tlslistener:
- return DNS_TRANSPORT_TLS;
+ return (DNS_TRANSPORT_TLS);
case isc_nm_httpsocket:
case isc_nm_httplistener:
- return DNS_TRANSPORT_HTTP;
+ return (DNS_TRANSPORT_HTTP);
case isc_nm_streamdnslistener:
case isc_nm_streamdnssocket:
case isc_nm_proxystreamlistener:
case isc_nm_proxystreamsocket:
/* If it isn't DoT, it is DNS-over-TCP */
if (isc_nm_has_encryption(client->handle)) {
- return DNS_TRANSPORT_TLS;
+ return (DNS_TRANSPORT_TLS);
}
FALLTHROUGH;
case isc_nm_tcpsocket:
case isc_nm_tcplistener:
- return DNS_TRANSPORT_TCP;
+ return (DNS_TRANSPORT_TCP);
case isc_nm_maxsocket:
case isc_nm_nonesocket:
UNREACHABLE();
}
- return DNS_TRANSPORT_UDP;
+ return (DNS_TRANSPORT_UDP);
}
void
const ns_listen_tls_params_t *tls_params,
isc_tlsctx_cache_t *tlsctx_cache, isc_nm_proxy_type_t proxy,
ns_listenelt_t **target) {
- return listenelt_create(mctx, port, acl, family, false, tls, tls_params,
- tlsctx_cache, proxy, target);
+ return (listenelt_create(mctx, port, acl, family, false, tls,
+ tls_params, tlsctx_cache, proxy, target));
}
isc_result_t
isc_buffer_t b;
int level = ISC_LOG_INFO;
- if (!isc_log_wouldlog(level))
+ if (!isc_log_wouldlog(level)) {
return;
+ }
dns_name_format(client->query.origqname, namebuf, sizeof(namebuf));
dns_rdataclass_format(client->message->rdclass, classbuf,
cmp_tolower1(void *va, void *vb, unsigned int size) {
for (uint8_t *a = va, *b = vb; size-- > 0; a++, b++) {
if (TOLOWER(*a) != TOLOWER(*b)) {
- return false;
+ return (false);
}
}
- return true;
+ return (true);
}
static bool oldskool_result;
double ratio = sample <= 1 ? pow(sample, -s)
: pow(sample, -s) / pow(invB, -s);
if (ratio > (double)isc_random32() / UINT32_MAX) {
- return sample - 1;
+ return (sample - 1);
}
}
}
static isc_result_t
check_options(irs_resconf_t *resconf) {
if (irs_resconf_getattempts(resconf) != 3) {
- return ISC_R_BADNUMBER; /* default value only */
+ return (ISC_R_BADNUMBER); /* default value only */
}
if (irs_resconf_getndots(resconf) != 2) {
- return ISC_R_BADNUMBER;
+ return (ISC_R_BADNUMBER);
}
if (irs_resconf_gettimeout(resconf) != 1) {
- return ISC_R_BADNUMBER;
+ return (ISC_R_BADNUMBER);
}
return (ISC_R_SUCCESS);