Standardize result variable naming by using 'result' in most places.
dst_algorithm_t alg;
bool oldstyle = false;
int ch;
- isc_result_t ret;
+ isc_result_t result;
isc_textregion_t r;
char filename[255];
isc_buffer_t buf;
break;
case 'K':
directory = isc_commandline_argument;
- ret = try_dir(directory);
- if (ret != ISC_R_SUCCESS) {
+ result = try_dir(directory);
+ if (result != ISC_R_SUCCESS) {
fatal("cannot open directory %s: %s", directory,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
break;
case 'k':
isc_buffer_init(&buf, argv[isc_commandline_index],
strlen(argv[isc_commandline_index]));
isc_buffer_add(&buf, strlen(argv[isc_commandline_index]));
- ret = dns_name_fromtext(name, &buf, dns_rootname, 0);
- if (ret != ISC_R_SUCCESS) {
+ result = dns_name_fromtext(name, &buf, dns_rootname, 0);
+ if (result != ISC_R_SUCCESS) {
fatal("invalid key name %s: %s",
argv[isc_commandline_index],
- isc_result_totext(ret));
+ isc_result_totext(result));
}
if (strchr(label, ':') == NULL) {
r.base = algname;
r.length = strlen(algname);
- ret = dst_algorithm_fromtext(&alg, &r);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_algorithm_fromtext(&alg, &r);
+ if (result != ISC_R_SUCCESS) {
fatal("unknown algorithm %s", algname);
}
fatal("-S and -G cannot be used together");
}
- ret = dst_key_fromnamedfile(predecessor, directory,
- DST_TYPE_PUBLIC | DST_TYPE_PRIVATE,
- isc_g_mctx, &prevkey);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_fromnamedfile(predecessor, directory,
+ DST_TYPE_PUBLIC |
+ DST_TYPE_PRIVATE,
+ isc_g_mctx, &prevkey);
+ if (result != ISC_R_SUCCESS) {
fatal("Invalid keyfile %s: %s", predecessor,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
if (!dst_key_isprivate(prevkey)) {
fatal("%s is not a private key", predecessor);
keystr, major, minor);
}
- ret = dst_key_gettime(prevkey, DST_TIME_ACTIVATE, &when);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(prevkey, DST_TIME_ACTIVATE, &when);
+ if (result != ISC_R_SUCCESS) {
fatal("Key %s has no activation date.\n\t"
"You must use dnssec-settime -A to set one "
"before generating a successor.",
keystr);
}
- ret = dst_key_gettime(prevkey, DST_TIME_INACTIVE, &activate);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(prevkey, DST_TIME_INACTIVE, &activate);
+ if (result != ISC_R_SUCCESS) {
fatal("Key %s has no inactivation date.\n\t"
"You must use dnssec-settime -I to set one "
"before generating a successor.",
keystr);
}
- ret = dst_key_gettime(prevkey, DST_TIME_DELETE, &when);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(prevkey, DST_TIME_DELETE, &when);
+ if (result != ISC_R_SUCCESS) {
fprintf(stderr,
"%s: WARNING: Key %s has no removal "
"date;\n\t it will remain in the zone "
isc_buffer_init(&buf, filename, sizeof(filename) - 1);
/* associate the key */
- ret = dst_key_fromlabel(name, alg, flags, DNS_KEYPROTO_DNSSEC, rdclass,
- label, NULL, isc_g_mctx, &key);
+ result = dst_key_fromlabel(name, alg, flags, DNS_KEYPROTO_DNSSEC,
+ rdclass, label, NULL, isc_g_mctx, &key);
- if (ret != ISC_R_SUCCESS) {
+ if (result != ISC_R_SUCCESS) {
char namestr[DNS_NAME_FORMATSIZE];
char algstr[DNS_SECALG_FORMATSIZE];
dns_name_format(name, namestr, sizeof(namestr));
dns_secalg_format(alg, algstr, sizeof(algstr));
fatal("failed to get key %s/%s: %s", namestr, algstr,
- isc_result_totext(ret));
+ isc_result_totext(result));
UNREACHABLE();
exit(EXIT_FAILURE);
}
&exact))
{
isc_buffer_clear(&buf);
- ret = dst_key_buildfilename(key, 0, directory, &buf);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_buildfilename(key, 0, directory, &buf);
+ if (result != ISC_R_SUCCESS) {
fatal("dst_key_buildfilename returned: %s\n",
- isc_result_totext(ret));
+ isc_result_totext(result));
}
if (exact) {
fatal("%s: %s already exists\n",
isc_commandline_progname, filename);
}
- ret = dst_key_tofile(key, options, directory);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_tofile(key, options, directory);
+ if (result != ISC_R_SUCCESS) {
char keystr[DST_KEY_FORMATSIZE];
dst_key_format(key, keystr, sizeof(keystr));
fatal("failed to write key %s: %s\n", keystr,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
isc_buffer_clear(&buf);
- ret = dst_key_buildfilename(key, 0, NULL, &buf);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_buildfilename(key, 0, NULL, &buf);
+ if (result != ISC_R_SUCCESS) {
fatal("dst_key_buildfilename returned: %s\n",
- isc_result_totext(ret));
+ isc_result_totext(result));
}
printf("%s\n", filename);
dst_key_free(&key);
isc_buffer_t buf;
dns_name_t *name;
dns_fixedname_t fname;
- isc_result_t ret;
+ isc_result_t result;
dst_key_t *key = NULL;
dst_key_t *prevkey = NULL;
isc_buffer_init(&buf, argv[isc_commandline_index],
strlen(argv[isc_commandline_index]));
isc_buffer_add(&buf, strlen(argv[isc_commandline_index]));
- ret = dns_name_fromtext(name, &buf, dns_rootname, 0);
- if (ret != ISC_R_SUCCESS) {
+ result = dns_name_fromtext(name, &buf, dns_rootname, 0);
+ if (result != ISC_R_SUCCESS) {
fatal("invalid key name %s: %s",
argv[isc_commandline_index],
- isc_result_totext(ret));
+ isc_result_totext(result));
}
if (!dst_algorithm_supported(ctx->alg)) {
fatal("-S and -G cannot be used together");
}
- ret = dst_key_fromnamedfile(ctx->predecessor, ctx->directory,
- DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE,
- isc_g_mctx, &prevkey);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_fromnamedfile(
+ ctx->predecessor, ctx->directory,
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE,
+ isc_g_mctx, &prevkey);
+ if (result != ISC_R_SUCCESS) {
fatal("Invalid keyfile %s: %s", ctx->predecessor,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
if (!dst_key_isprivate(prevkey)) {
fatal("%s is not a private key", ctx->predecessor);
keystr, major, minor);
}
- ret = dst_key_gettime(prevkey, DST_TIME_ACTIVATE, &when);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(prevkey, DST_TIME_ACTIVATE, &when);
+ if (result != ISC_R_SUCCESS) {
fatal("Key %s has no activation date.\n\t"
"You must use dnssec-settime -A to set one "
"before generating a successor.",
keystr);
}
- ret = dst_key_gettime(prevkey, DST_TIME_INACTIVE,
- &ctx->activate);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(prevkey, DST_TIME_INACTIVE,
+ &ctx->activate);
+ if (result != ISC_R_SUCCESS) {
fatal("Key %s has no inactivation date.\n\t"
"You must use dnssec-settime -I to set one "
"before generating a successor.",
keystr);
}
- ret = dst_key_gettime(prevkey, DST_TIME_DELETE, &when);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(prevkey, DST_TIME_DELETE, &when);
+ if (result != ISC_R_SUCCESS) {
fprintf(stderr,
"%s: WARNING: Key %s has no removal "
"date;\n\t it will remain in the zone "
}
if (ctx->keystore != NULL && ctx->policy != NULL) {
- ret = dns_keystore_keygen(
+ result = dns_keystore_keygen(
ctx->keystore, name, ctx->policy, ctx->rdclass,
isc_g_mctx, ctx->alg, ctx->size, flags, &key);
} else if (!ctx->quiet && show_progress) {
- ret = dst_key_generate(name, ctx->alg, ctx->size, 0,
- flags, DNS_KEYPROTO_DNSSEC,
- ctx->rdclass, NULL, isc_g_mctx,
- &key, &progress);
+ result = dst_key_generate(name, ctx->alg, ctx->size, 0,
+ flags, DNS_KEYPROTO_DNSSEC,
+ ctx->rdclass, NULL,
+ isc_g_mctx, &key, &progress);
} else {
- ret = dst_key_generate(name, ctx->alg, ctx->size, 0,
- flags, DNS_KEYPROTO_DNSSEC,
- ctx->rdclass, NULL, isc_g_mctx,
- &key, NULL);
+ result = dst_key_generate(name, ctx->alg, ctx->size, 0,
+ flags, DNS_KEYPROTO_DNSSEC,
+ ctx->rdclass, NULL,
+ isc_g_mctx, &key, NULL);
}
if (!ctx->quiet && show_progress) {
fflush(stderr);
}
- if (ret != ISC_R_SUCCESS) {
+ if (result != ISC_R_SUCCESS) {
char namestr[DNS_NAME_FORMATSIZE];
dns_name_format(name, namestr, sizeof(namestr));
fatal("failed to generate key %s/%s: %s\n", namestr,
- algstr, isc_result_totext(ret));
+ algstr, isc_result_totext(result));
}
/*
if (verbose > 0) {
isc_buffer_clear(&buf);
- ret = dst_key_buildfilename(
+ result = dst_key_buildfilename(
key, 0, ctx->directory, &buf);
- if (ret == ISC_R_SUCCESS) {
+ if (result == ISC_R_SUCCESS) {
fprintf(stderr,
"%s: %s already exists, or "
"might collide with another "
dst_key_setnum(prevkey, DST_NUM_SUCCESSOR, dst_key_id(key));
dst_key_setnum(key, DST_NUM_PREDECESSOR, dst_key_id(prevkey));
- ret = dst_key_tofile(prevkey, ctx->options, ctx->directory);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_tofile(prevkey, ctx->options, ctx->directory);
+ if (result != ISC_R_SUCCESS) {
char keystr[DST_KEY_FORMATSIZE];
dst_key_format(prevkey, keystr, sizeof(keystr));
fatal("failed to update predecessor %s: %s\n", keystr,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
}
- ret = dst_key_tofile(key, ctx->options, ctx->directory);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_tofile(key, ctx->options, ctx->directory);
+ if (result != ISC_R_SUCCESS) {
char keystr[DST_KEY_FORMATSIZE];
dst_key_format(key, keystr, sizeof(keystr));
fatal("failed to write key %s: %s\n", keystr,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
isc_buffer_clear(&buf);
- ret = dst_key_buildfilename(key, 0, NULL, &buf);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_buildfilename(key, 0, NULL, &buf);
+ if (result != ISC_R_SUCCESS) {
fatal("dst_key_buildfilename returned: %s\n",
- isc_result_totext(ret));
+ isc_result_totext(result));
}
printf("%s\n", filename);
check_keystore_options(keygen_ctx_t *ctx) {
ctx->directory = dns_keystore_directory(ctx->keystore, NULL);
if (ctx->directory != NULL) {
- isc_result_t ret = try_dir(ctx->directory);
- if (ret != ISC_R_SUCCESS) {
+ isc_result_t result = try_dir(ctx->directory);
+ if (result != ISC_R_SUCCESS) {
fatal("cannot open directory %s: %s", ctx->directory,
- isc_result_totext(ret));
+ isc_result_totext(result));
}
}
}
char *algname = NULL, *freeit = NULL;
char *classname = NULL;
char *endp;
- isc_result_t ret;
+ isc_result_t result;
isc_textregion_t r;
unsigned char c;
int ch;
break;
case 'K':
ctx.directory = isc_commandline_argument;
- ret = try_dir(ctx.directory);
- if (ret != ISC_R_SUCCESS) {
+ result = try_dir(ctx.directory);
+ if (result != ISC_R_SUCCESS) {
fatal("cannot open directory %s: %s",
- ctx.directory, isc_result_totext(ret));
+ ctx.directory, isc_result_totext(result));
}
break;
case 'k':
}
r.base = algname;
r.length = strlen(algname);
- ret = dst_algorithm_fromtext(&ctx.alg, &r);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_algorithm_fromtext(&ctx.alg, &r);
+ if (result != ISC_R_SUCCESS) {
fatal("unknown algorithm %s", algname);
}
if (!dst_algorithm_supported(ctx.alg)) {
*/
bool have_pre_sig = false;
uint32_t pre;
- isc_result_t ret = dst_key_getnum(
- key->key, DST_NUM_PREDECESSOR, &pre);
- if (ret == ISC_R_SUCCESS) {
+ result = dst_key_getnum(key->key, DST_NUM_PREDECESSOR,
+ &pre);
+ if (result == ISC_R_SUCCESS) {
/*
* This key has a predecessor, look for the
* corresponding key in the keylist. The
{
continue;
}
- ret = dst_key_getnum(curr->key,
- DST_NUM_SUCCESSOR,
- &suc);
- if (ret != ISC_R_SUCCESS ||
+ result = dst_key_getnum(
+ curr->key, DST_NUM_SUCCESSOR,
+ &suc);
+ if (result != ISC_R_SUCCESS ||
dst_key_id(key->key) != suc)
{
continue;
static isc_result_t
rdataset_to_sortedarray(dns_rdataset_t *set, isc_mem_t *mctx,
dns_rdata_t **rdata, int *nrdata) {
- isc_result_t ret;
+ isc_result_t result;
int i = 0, n;
dns_rdata_t *data;
dns_rdataset_t rdataset;
dns_rdataset_init(&rdataset);
dns_rdataset_clone(set, &rdataset);
- ret = dns_rdataset_first(&rdataset);
- if (ret != ISC_R_SUCCESS) {
+ result = dns_rdataset_first(&rdataset);
+ if (result != ISC_R_SUCCESS) {
dns_rdataset_disassociate(&rdataset);
isc_mem_cput(mctx, data, n, sizeof(dns_rdata_t));
- return ret;
+ return result;
}
/*
isc_buffer_t sigbuf, envbuf;
isc_region_t r;
dst_context_t *ctx = NULL;
- isc_result_t ret;
+ isc_result_t result;
isc_buffer_t *databuf = NULL;
char data[256 + 8];
unsigned int sigsize;
isc_buffer_allocate(mctx, &databuf, sigsize + 256 + 18);
dns_rdata_init(&tmpsigrdata);
- ret = dns_rdata_fromstruct(&tmpsigrdata, sig.common.rdclass,
- sig.common.rdtype, &sig, databuf);
- if (ret != ISC_R_SUCCESS) {
+ result = dns_rdata_fromstruct(&tmpsigrdata, sig.common.rdclass,
+ sig.common.rdtype, &sig, databuf);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_databuf;
}
- ret = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, true, &ctx);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, true,
+ &ctx);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_databuf;
}
/*
* Digest the SIG rdata.
*/
- ret = digest_sig(ctx, false, &tmpsigrdata, &sig);
- if (ret != ISC_R_SUCCESS) {
+ result = digest_sig(ctx, false, &tmpsigrdata, &sig);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_context;
}
isc_buffer_putuint16(&envbuf, set->rdclass);
isc_buffer_putuint32(&envbuf, set->ttl);
- ret = rdataset_to_sortedarray(set, mctx, &rdatas, &nrdatas);
- if (ret != ISC_R_SUCCESS) {
+ result = rdataset_to_sortedarray(set, mctx, &rdatas, &nrdatas);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_context;
}
isc_buffer_usedregion(&envbuf, &r);
/*
* Digest the envelope.
*/
- ret = dst_context_adddata(ctx, &r);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_adddata(ctx, &r);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
isc_buffer_init(&lenbuf, &len, sizeof(len));
isc_buffer_putuint16(&lenbuf, (uint16_t)rdatas[i].length);
isc_buffer_usedregion(&lenbuf, &lenr);
- ret = dst_context_adddata(ctx, &lenr);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_adddata(ctx, &lenr);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
/*
* Digest the rdata.
*/
- ret = dns_rdata_digest(&rdatas[i], digest_callback, ctx);
- if (ret != ISC_R_SUCCESS) {
+ result = dns_rdata_digest(&rdatas[i], digest_callback, ctx);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
}
isc_buffer_init(&sigbuf, sig.signature, sig.siglen);
- ret = dst_context_sign(ctx, &sigbuf);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_sign(ctx, &sigbuf);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
isc_buffer_usedregion(&sigbuf, &r);
if (r.length != sig.siglen) {
- ret = ISC_R_NOSPACE;
+ result = ISC_R_NOSPACE;
goto cleanup_array;
}
- ret = dns_rdata_fromstruct(sigrdata, sig.common.rdclass,
- sig.common.rdtype, &sig, buffer);
+ result = dns_rdata_fromstruct(sigrdata, sig.common.rdclass,
+ sig.common.rdtype, &sig, buffer);
cleanup_array:
isc_mem_cput(mctx, rdatas, nrdatas, sizeof(dns_rdata_t));
isc_buffer_free(&databuf);
isc_mem_put(mctx, sig.signature, sig.siglen);
- return ret;
+ return result;
}
isc_result_t
dns_rdata_t *rdatas;
int nrdatas, i;
isc_stdtime_t now;
- isc_result_t ret;
+ isc_result_t result;
unsigned char data[300];
dst_context_t *ctx = NULL;
int labels = 0;
}
again:
- ret = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, false,
- &ctx);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_create(key, mctx, DNS_LOGCATEGORY_DNSSEC, false,
+ &ctx);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_struct;
}
/*
* Digest the SIG rdata (not including the signature).
*/
- ret = digest_sig(ctx, downcase, sigrdata, &sig);
- if (ret != ISC_R_SUCCESS) {
+ result = digest_sig(ctx, downcase, sigrdata, &sig);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_context;
}
isc_buffer_putuint16(&envbuf, set->rdclass);
isc_buffer_putuint32(&envbuf, sig.originalttl);
- ret = rdataset_to_sortedarray(set, mctx, &rdatas, &nrdatas);
- if (ret != ISC_R_SUCCESS) {
+ result = rdataset_to_sortedarray(set, mctx, &rdatas, &nrdatas);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_context;
}
/*
* Digest the envelope.
*/
- ret = dst_context_adddata(ctx, &r);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_adddata(ctx, &r);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
/*
* Digest the rdata.
*/
- ret = dst_context_adddata(ctx, &lenr);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_context_adddata(ctx, &lenr);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
- ret = dns_rdata_digest(&rdatas[i], digest_callback, ctx);
- if (ret != ISC_R_SUCCESS) {
+ result = dns_rdata_digest(&rdatas[i], digest_callback, ctx);
+ if (result != ISC_R_SUCCESS) {
goto cleanup_array;
}
}
r.base = sig.signature;
r.length = sig.siglen;
- ret = dst_context_verify(ctx, &r);
- if (ret == ISC_R_SUCCESS && downcase) {
+ result = dst_context_verify(ctx, &r);
+ if (result == ISC_R_SUCCESS && downcase) {
char namebuf[DNS_NAME_FORMATSIZE];
dns_name_format(&sig.signer, namebuf, sizeof(namebuf));
isc_log_write(DNS_LOGCATEGORY_DNSSEC, DNS_LOGMODULE_DNSSEC,
"signer '%s'",
namebuf);
inc_stat(dns_dnssecstats_downcase);
- } else if (ret == ISC_R_SUCCESS) {
+ } else if (result == ISC_R_SUCCESS) {
inc_stat(dns_dnssecstats_asis);
}
isc_mem_cput(mctx, rdatas, nrdatas, sizeof(dns_rdata_t));
cleanup_context:
dst_context_destroy(&ctx);
- if (ret == DST_R_VERIFYFAILURE && !downcase) {
+ if (result == DST_R_VERIFYFAILURE && !downcase) {
downcase = true;
goto again;
}
cleanup_struct:
dns_rdata_freestruct(&sig);
- if (ret == DST_R_VERIFYFAILURE) {
- ret = DNS_R_SIGINVALID;
+ if (result == DST_R_VERIFYFAILURE) {
+ result = DNS_R_SIGINVALID;
}
- if (ret != ISC_R_SUCCESS) {
+ if (result != ISC_R_SUCCESS) {
inc_stat(dns_dnssecstats_fail);
}
- if (ret == ISC_R_SUCCESS && labels - sig.labels > 0) {
+ if (result == ISC_R_SUCCESS && labels - sig.labels > 0) {
if (wild != NULL) {
RUNTIME_CHECK(dns_name_concatenate(
dns_wildcardname,
wild) == ISC_R_SUCCESS);
}
inc_stat(dns_dnssecstats_wildcard);
- ret = DNS_R_FROMWILDCARD;
+ result = DNS_R_FROMWILDCARD;
}
- return ret;
+ return result;
}
bool
bool hint_publish, hint_zsign, hint_ksign, hint_revoke, hint_remove;
int major, minor;
bool ksk = false, zsk = false;
- isc_result_t ret;
/* Is this an old-style key? */
result = dst_key_getprivateformat(key, &major, &minor);
RUNTIME_CHECK(result == ISC_R_SUCCESS);
/* Is this a KSK? */
- ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
+ if (result != ISC_R_SUCCESS) {
ksk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) != 0);
}
- ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
+ if (result != ISC_R_SUCCESS) {
zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0);
}
static isc_result_t
hmac_generate(const isc_md_type_t *type, dst_key_t *key) {
isc_buffer_t b;
- isc_result_t ret;
+ isc_result_t result;
unsigned int bytes, len;
unsigned char data[ISC_MAX_MD_SIZE] = { 0 };
isc_buffer_init(&b, data, bytes);
isc_buffer_add(&b, bytes);
- ret = hmac_fromdns(type, key, &b);
+ result = hmac_fromdns(type, key, &b);
isc_safe_memwipe(data, sizeof(data));
- return ret;
+ return result;
}
static bool
bool
dns_kasp_key_match(dns_kasp_key_t *key, dns_dnsseckey_t *dkey) {
- isc_result_t ret;
+ isc_result_t result;
bool role = false;
REQUIRE(key != NULL);
return false;
}
/* Matching role? */
- ret = dst_key_getbool(dkey->key, DST_BOOL_KSK, &role);
- if (ret != ISC_R_SUCCESS || role != dns_kasp_key_ksk(key)) {
+ result = dst_key_getbool(dkey->key, DST_BOOL_KSK, &role);
+ if (result != ISC_R_SUCCESS || role != dns_kasp_key_ksk(key)) {
return false;
}
- ret = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &role);
- if (ret != ISC_R_SUCCESS || role != dns_kasp_key_zsk(key)) {
+ result = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &role);
+ if (result != ISC_R_SUCCESS || role != dns_kasp_key_zsk(key)) {
return false;
}
/* Valid key tag range? */
static const char *
keymgr_keyrole(dst_key_t *key) {
bool ksk = false, zsk = false;
- isc_result_t ret;
- ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
- if (ret != ISC_R_SUCCESS) {
+ isc_result_t result;
+ result = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
+ if (result != ISC_R_SUCCESS) {
return "UNKNOWN";
}
- ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
+ if (result != ISC_R_SUCCESS) {
return "UNKNOWN";
}
if (ksk && zsk) {
keymgr_settime_remove(dns_dnsseckey_t *key, dns_kasp_t *kasp) {
isc_stdtime_t retire = 0, remove = 0, ksk_remove = 0, zsk_remove = 0;
bool zsk = false, ksk = false;
- isc_result_t ret;
+ isc_result_t result;
REQUIRE(key != NULL);
REQUIRE(key->key != NULL);
- ret = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
+ if (result != ISC_R_SUCCESS) {
return;
}
- ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
- if (ret == ISC_R_SUCCESS && zsk) {
+ result = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
+ if (result == ISC_R_SUCCESS && zsk) {
dns_ttl_t ttlsig = dns_kasp_zonemaxttl(kasp, true);
/* ZSK: Iret = Dsgn + Dprp + TTLsig */
zsk_remove =
retire + ttlsig + dns_kasp_zonepropagationdelay(kasp) +
dns_kasp_retiresafety(kasp) + dns_kasp_signdelay(kasp);
}
- ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
- if (ret == ISC_R_SUCCESS && ksk) {
+ result = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
+ if (result == ISC_R_SUCCESS && ksk) {
/* KSK: Iret = DprpP + TTLds */
ksk_remove = retire + dns_kasp_dsttl(kasp) +
dns_kasp_parentpropagationdelay(kasp) +
dns_keymgr_settime_syncpublish(dst_key_t *key, dns_kasp_t *kasp, bool first) {
isc_stdtime_t published, syncpublish;
bool ksk = false;
- isc_result_t ret;
+ isc_result_t result;
REQUIRE(key != NULL);
- ret = dst_key_gettime(key, DST_TIME_PUBLISH, &published);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key, DST_TIME_PUBLISH, &published);
+ if (result != ISC_R_SUCCESS) {
return;
}
- ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
- if (ret != ISC_R_SUCCESS || !ksk) {
+ result = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
+ if (result != ISC_R_SUCCESS || !ksk) {
return;
}
dst_key_settime(key, DST_TIME_SYNCPUBLISH, syncpublish);
uint32_t lifetime = 0;
- ret = dst_key_getnum(key, DST_NUM_LIFETIME, &lifetime);
- if (ret == ISC_R_SUCCESS && lifetime > 0) {
+ result = dst_key_getnum(key, DST_NUM_LIFETIME, &lifetime);
+ if (result == ISC_R_SUCCESS && lifetime > 0) {
dst_key_settime(key, DST_TIME_SYNCDELETE,
syncpublish + lifetime);
}
static isc_stdtime_t
keymgr_prepublication_time(dns_dnsseckey_t *key, dns_kasp_t *kasp,
uint32_t lifetime, isc_stdtime_t now) {
- isc_result_t ret;
+ isc_result_t result;
isc_stdtime_t active, retire, pub, prepub;
bool zsk = false, ksk = false;
* An active key must have publish and activate timing
* metadata.
*/
- ret = dst_key_gettime(key->key, DST_TIME_ACTIVATE, &active);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_ACTIVATE, &active);
+ if (result != ISC_R_SUCCESS) {
/* Super weird, but if it happens, set it to now. */
dst_key_settime(key->key, DST_TIME_ACTIVATE, now);
active = now;
}
- ret = dst_key_gettime(key->key, DST_TIME_PUBLISH, &pub);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_PUBLISH, &pub);
+ if (result != ISC_R_SUCCESS) {
/* Super weird, but if it happens, set it to now. */
dst_key_settime(key->key, DST_TIME_PUBLISH, now);
pub = now;
* the key lifetime is required.
*/
uint32_t klifetime = 0;
- ret = dst_key_getnum(key->key, DST_NUM_LIFETIME, &klifetime);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getnum(key->key, DST_NUM_LIFETIME, &klifetime);
+ if (result != ISC_R_SUCCESS) {
dst_key_setnum(key->key, DST_NUM_LIFETIME, lifetime);
klifetime = lifetime;
}
*/
prepub = dst_key_getttl(key->key) + dns_kasp_publishsafety(kasp) +
dns_kasp_zonepropagationdelay(kasp);
- ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
- if (ret == ISC_R_SUCCESS && ksk) {
+ result = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
+ if (result == ISC_R_SUCCESS && ksk) {
isc_stdtime_t syncpub;
/*
* Set PublishCDS if not set.
*/
- ret = dst_key_gettime(key->key, DST_TIME_SYNCPUBLISH, &syncpub);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_SYNCPUBLISH,
+ &syncpub);
+ if (result != ISC_R_SUCCESS) {
uint32_t tag;
isc_stdtime_t syncpub1, syncpub2;
syncpub1 = pub + prepub;
syncpub2 = 0;
- ret = dst_key_getnum(key->key, DST_NUM_PREDECESSOR,
- &tag);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getnum(key->key, DST_NUM_PREDECESSOR,
+ &tag);
+ if (result != ISC_R_SUCCESS) {
/*
* No predecessor, wait for zone to be
* completely signed.
*/
(void)dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
- ret = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
+ if (result != ISC_R_SUCCESS) {
if (klifetime == 0) {
/*
* No inactive time and no lifetime,
keymgr_key_retire(dns_dnsseckey_t *key, dns_kasp_t *kasp, uint8_t opts,
isc_stdtime_t now) {
char keystr[DST_KEY_FORMATSIZE];
- isc_result_t ret;
+ isc_result_t result;
isc_stdtime_t retire;
dst_key_state_t s;
bool ksk = false, zsk = false;
dst_key_format(key->key, keystr, sizeof(keystr));
- ret = dst_key_getstate(key->key, DST_KEY_GOAL, &s);
- INSIST(ret == ISC_R_SUCCESS);
+ result = dst_key_getstate(key->key, DST_KEY_GOAL, &s);
+ INSIST(result == ISC_R_SUCCESS);
if (dns_kasp_manualmode(kasp) &&
(opts & DNS_KEYMGRATTR_FORCESTEP) == 0 && s != HIDDEN)
* This key may not have key states set yet. Pretend as if they are
* in the OMNIPRESENT state.
*/
- ret = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
- if (ret != ISC_R_SUCCESS || (retire > now)) {
+ result = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
+ if (result != ISC_R_SUCCESS || (retire > now)) {
dst_key_settime(key->key, DST_TIME_INACTIVE, now);
}
keymgr_settime_remove(key, kasp);
dst_key_settime(key->key, DST_TIME_DNSKEY, now);
}
- ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
- if (ret == ISC_R_SUCCESS && ksk) {
+ result = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
+ if (result == ISC_R_SUCCESS && ksk) {
if (dst_key_getstate(key->key, DST_KEY_KRRSIG, &s) !=
ISC_R_SUCCESS)
{
dst_key_settime(key->key, DST_TIME_DS, now);
}
}
- ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
- if (ret == ISC_R_SUCCESS && zsk) {
+ result = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
+ if (result == ISC_R_SUCCESS && zsk) {
if (dst_key_getstate(key->key, DST_KEY_ZRRSIG, &s) !=
ISC_R_SUCCESS)
{
keymgr_transition_time(dns_dnsseckey_t *key, int type,
dst_key_state_t next_state, dns_kasp_t *kasp,
isc_stdtime_t now, isc_stdtime_t *when) {
- isc_result_t ret;
+ isc_result_t result;
isc_stdtime_t lastchange, dstime, sigtime, nexttime = now;
dns_ttl_t ttlsig = dns_kasp_zonemaxttl(kasp, true);
uint32_t dsstate, sigstate, signdelay = 0;
return;
}
- ret = dst_key_gettime(key->key, keystatetimes[type], &lastchange);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, keystatetimes[type], &lastchange);
+ if (result != ISC_R_SUCCESS) {
/* No last change, for safety purposes let's set it to now. */
dst_key_settime(key->key, keystatetimes[type], now);
lastchange = now;
/* Was there a full sign? */
sigstate = (next_state == HIDDEN) ? DST_TIME_SIGDELETE
: DST_TIME_SIGPUBLISH;
- ret = dst_key_gettime(key->key, sigstate, &sigtime);
- if (ret == ISC_R_SUCCESS && sigtime <= now) {
+ result = dst_key_gettime(key->key, sigstate, &sigtime);
+ if (result == ISC_R_SUCCESS && sigtime <= now) {
signdelay = 0;
} else {
sigtime = lastchange;
* there is an actual predecessor or successor key.
*/
uint32_t tag;
- ret = dst_key_getnum(key->key, DST_NUM_PREDECESSOR,
- &tag);
- if (ret != ISC_R_SUCCESS) {
- ret = dst_key_getnum(key->key,
- DST_NUM_SUCCESSOR, &tag);
+ result = dst_key_getnum(key->key, DST_NUM_PREDECESSOR,
+ &tag);
+ if (result != ISC_R_SUCCESS) {
+ result = dst_key_getnum(
+ key->key, DST_NUM_SUCCESSOR, &tag);
}
- if (ret == ISC_R_SUCCESS) {
+ if (result == ISC_R_SUCCESS) {
nexttime += signdelay +
dns_kasp_retiresafety(kasp);
}
* parent. */
dsstate = next_state == HIDDEN ? DST_TIME_DSDELETE
: DST_TIME_DSPUBLISH;
- ret = dst_key_gettime(key->key, dsstate, &dstime);
- if (ret != ISC_R_SUCCESS || dstime > now) {
+ result = dst_key_gettime(key->key, dsstate, &dstime);
+ if (result != ISC_R_SUCCESS || dstime > now) {
/* Not yet, try again in an hour. */
nexttime = now + 3600;
} else {
* actual predecessor or successor key.
*/
uint32_t tag;
- ret = dst_key_getnum(key->key,
- DST_NUM_PREDECESSOR, &tag);
- if (ret != ISC_R_SUCCESS) {
- ret = dst_key_getnum(key->key,
- DST_NUM_SUCCESSOR,
- &tag);
+ result = dst_key_getnum(
+ key->key, DST_NUM_PREDECESSOR, &tag);
+ if (result != ISC_R_SUCCESS) {
+ result = dst_key_getnum(
+ key->key, DST_NUM_SUCCESSOR,
+ &tag);
}
- if (ret == ISC_R_SUCCESS) {
+ if (result == ISC_R_SUCCESS) {
nexttime += dns_kasp_retiresafety(kasp);
}
}
/* For all records related to this key. */
for (int i = 0; i < NUM_KEYSTATES; i++) {
- isc_result_t ret;
isc_stdtime_t when;
dst_key_state_t state, next_state;
- ret = dst_key_getstate(dkey->key, i, &state);
- if (ret == ISC_R_NOTFOUND) {
+ if (dst_key_getstate(dkey->key, i, &state) ==
+ ISC_R_NOTFOUND)
+ {
/*
* This record type is not applicable for this
* key, continue to the next record type.
dns_keymgr_key_init(dns_dnsseckey_t *key, dns_kasp_t *kasp, isc_stdtime_t now,
bool csk) {
bool ksk, zsk;
- isc_result_t ret;
+ isc_result_t result;
isc_stdtime_t active = 0, pub = 0, syncpub = 0, retire = 0, remove = 0;
dst_key_state_t dnskey_state = HIDDEN;
dst_key_state_t ds_state = HIDDEN;
REQUIRE(key->key != NULL);
/* Initialize role. */
- ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
+ if (result != ISC_R_SUCCESS) {
ksk = ((dst_key_flags(key->key) & DNS_KEYFLAG_KSK) != 0);
dst_key_setbool(key->key, DST_BOOL_KSK, ksk || csk);
}
- ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
+ if (result != ISC_R_SUCCESS) {
zsk = ((dst_key_flags(key->key) & DNS_KEYFLAG_KSK) == 0);
dst_key_setbool(key->key, DST_BOOL_ZSK, zsk || csk);
}
/* Get time metadata. */
- ret = dst_key_gettime(key->key, DST_TIME_ACTIVATE, &active);
- if (active <= now && ret == ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_ACTIVATE, &active);
+ if (active <= now && result == ISC_R_SUCCESS) {
dns_ttl_t ttlsig = dns_kasp_zonemaxttl(kasp, true);
ttlsig += dns_kasp_zonepropagationdelay(kasp);
if ((active + ttlsig) <= now) {
}
goal_state = OMNIPRESENT;
}
- ret = dst_key_gettime(key->key, DST_TIME_PUBLISH, &pub);
- if (pub <= now && ret == ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_PUBLISH, &pub);
+ if (pub <= now && result == ISC_R_SUCCESS) {
dns_ttl_t key_ttl = dst_key_getttl(key->key);
key_ttl += dns_kasp_zonepropagationdelay(kasp);
if ((pub + key_ttl) <= now) {
}
goal_state = OMNIPRESENT;
}
- ret = dst_key_gettime(key->key, DST_TIME_SYNCPUBLISH, &syncpub);
- if (syncpub <= now && ret == ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_SYNCPUBLISH, &syncpub);
+ if (syncpub <= now && result == ISC_R_SUCCESS) {
dns_ttl_t ds_ttl = dns_kasp_dsttl(kasp);
ds_ttl += dns_kasp_parentpropagationdelay(kasp);
if ((syncpub + ds_ttl) <= now) {
}
goal_state = OMNIPRESENT;
}
- ret = dst_key_gettime(key->key, DST_TIME_INACTIVE, &retire);
- if (retire <= now && ret == ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_INACTIVE, &result);
+ if (result <= now && result == ISC_R_SUCCESS) {
dns_ttl_t ttlsig = dns_kasp_zonemaxttl(kasp, true);
ttlsig += dns_kasp_zonepropagationdelay(kasp);
if ((retire + ttlsig) <= now) {
ds_state = UNRETENTIVE;
goal_state = HIDDEN;
}
- ret = dst_key_gettime(key->key, DST_TIME_DELETE, &remove);
- if (remove <= now && ret == ISC_R_SUCCESS) {
+ result = dst_key_gettime(key->key, DST_TIME_DELETE, &remove);
+ if (remove <= now && result == ISC_R_SUCCESS) {
dns_ttl_t key_ttl = dst_key_getttl(key->key);
key_ttl += dns_kasp_zonepropagationdelay(kasp);
if ((remove + key_ttl) <= now) {
static void
keymgr_purge_keyfile(dst_key_t *key, int type) {
- isc_result_t ret;
+ isc_result_t result;
isc_buffer_t fileb;
char filename[NAME_MAX];
* Make the filename.
*/
isc_buffer_init(&fileb, filename, sizeof(filename));
- ret = dst_key_buildfilename(key, type, dst_key_directory(key), &fileb);
- if (ret != ISC_R_SUCCESS) {
+ result = dst_key_buildfilename(key, type, dst_key_directory(key),
+ &fileb);
+ if (result != ISC_R_SUCCESS) {
char keystr[DST_KEY_FORMATSIZE];
dst_key_format(key, keystr, sizeof(keystr));
isc_log_write(DNS_LOGCATEGORY_DNSSEC, DNS_LOGMODULE_DNSSEC,
"keymgr: failed to purge DNSKEY %s (%s): cannot "
"build filename (%s)",
keystr, keymgr_keyrole(key),
- isc_result_totext(ret));
+ isc_result_totext(result));
return;
}
static void
keymgr_zrrsig(dns_dnsseckeylist_t *keyring, isc_stdtime_t now) {
ISC_LIST_FOREACH(*keyring, dkey, link) {
- isc_result_t ret;
+ isc_result_t result;
bool zsk = false;
+ dst_key_state_t state;
- ret = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &zsk);
- if (ret == ISC_R_SUCCESS && zsk) {
- dst_key_state_t state;
- isc_result_t result = dst_key_getstate(
- dkey->key, DST_KEY_ZRRSIG, &state);
- if (result == ISC_R_SUCCESS) {
- if (state == RUMOURED) {
- dst_key_settime(dkey->key,
- DST_TIME_SIGPUBLISH,
- now);
- } else if (state == UNRETENTIVE) {
- dst_key_settime(dkey->key,
- DST_TIME_SIGDELETE,
- now);
- }
+ result = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &zsk);
+ if (result != ISC_R_SUCCESS || !zsk) {
+ continue;
+ }
+
+ result = dst_key_getstate(dkey->key, DST_KEY_ZRRSIG, &state);
+ if (result == ISC_R_SUCCESS) {
+ if (state == RUMOURED) {
+ dst_key_settime(dkey->key, DST_TIME_SIGPUBLISH,
+ now);
+ } else if (state == UNRETENTIVE) {
+ dst_key_settime(dkey->key, DST_TIME_SIGDELETE,
+ now);
}
}
}
REQUIRE(keyring != NULL);
ISC_LIST_FOREACH(*keyring, dkey, link) {
- isc_result_t ret;
bool ksk = false;
- ret = dst_key_getbool(dkey->key, DST_BOOL_KSK, &ksk);
- if (ret == ISC_R_SUCCESS && ksk) {
+ result = dst_key_getbool(dkey->key, DST_BOOL_KSK, &ksk);
+ if (result == ISC_R_SUCCESS && ksk) {
if (check_id && dst_key_id(dkey->key) != id) {
continue;
}
unsigned int options) {
isc_region_t r;
dns_decompress_t dctx;
- isc_result_t ret;
+ isc_result_t result;
uint16_t tmpflags;
isc_buffer_t origsource;
bool seen_problem;
return early_check_ret;
}
- ret = getquestions(source, msg, dctx, options);
+ result = getquestions(source, msg, dctx, options);
- if (ret == ISC_R_UNEXPECTEDEND && ignore_tc) {
+ if (result == ISC_R_UNEXPECTEDEND && ignore_tc) {
goto truncated;
}
- if (ret == DNS_R_RECOVERABLE) {
+ if (result == DNS_R_RECOVERABLE) {
seen_problem = true;
- ret = ISC_R_SUCCESS;
+ result = ISC_R_SUCCESS;
}
- if (ret != ISC_R_SUCCESS) {
- return ret;
+ if (result != ISC_R_SUCCESS) {
+ return result;
}
msg->question_ok = 1;
- ret = getsection(source, msg, dctx, DNS_SECTION_ANSWER, options);
- if (ret == ISC_R_UNEXPECTEDEND && ignore_tc) {
+ result = getsection(source, msg, dctx, DNS_SECTION_ANSWER, options);
+ if (result == ISC_R_UNEXPECTEDEND && ignore_tc) {
goto truncated;
}
- if (ret == DNS_R_RECOVERABLE) {
+ if (result == DNS_R_RECOVERABLE) {
seen_problem = true;
- ret = ISC_R_SUCCESS;
+ result = ISC_R_SUCCESS;
}
- if (ret != ISC_R_SUCCESS) {
- return ret;
+ if (result != ISC_R_SUCCESS) {
+ return result;
}
- ret = getsection(source, msg, dctx, DNS_SECTION_AUTHORITY, options);
- if (ret == ISC_R_UNEXPECTEDEND && ignore_tc) {
+ result = getsection(source, msg, dctx, DNS_SECTION_AUTHORITY, options);
+ if (result == ISC_R_UNEXPECTEDEND && ignore_tc) {
goto truncated;
}
- if (ret == DNS_R_RECOVERABLE) {
+ if (result == DNS_R_RECOVERABLE) {
seen_problem = true;
- ret = ISC_R_SUCCESS;
+ result = ISC_R_SUCCESS;
}
- if (ret != ISC_R_SUCCESS) {
- return ret;
+ if (result != ISC_R_SUCCESS) {
+ return result;
}
- ret = getsection(source, msg, dctx, DNS_SECTION_ADDITIONAL, options);
- if (ret == ISC_R_UNEXPECTEDEND && ignore_tc) {
+ result = getsection(source, msg, dctx, DNS_SECTION_ADDITIONAL, options);
+ if (result == ISC_R_UNEXPECTEDEND && ignore_tc) {
goto truncated;
}
- if (ret == DNS_R_RECOVERABLE) {
+ if (result == DNS_R_RECOVERABLE) {
seen_problem = true;
- ret = ISC_R_SUCCESS;
+ result = ISC_R_SUCCESS;
}
- if (ret != ISC_R_SUCCESS) {
- return ret;
+ if (result != ISC_R_SUCCESS) {
+ return result;
}
isc_buffer_remainingregion(source, &r);
truncated:
- if (ret == ISC_R_UNEXPECTEDEND && ignore_tc) {
+ if (result == ISC_R_UNEXPECTEDEND && ignore_tc) {
return DNS_R_RECOVERABLE;
}
if (seen_problem) {
qctx_freedata(qctx);
if (dns_view_staleanswerenabled(qctx->client->inner.view)) {
- isc_result_t ret;
- ret = query_getdb(qctx->client, qctx->client->query.qname,
- qctx->client->query.qtype, qctx->options,
- &qctx->zone, &qctx->db, &qctx->version,
- &qctx->is_zone);
- if (ret != ISC_R_SUCCESS) {
+ if (query_getdb(qctx->client, qctx->client->query.qname,
+ qctx->client->query.qtype, qctx->options,
+ &qctx->zone, &qctx->db, &qctx->version,
+ &qctx->is_zone) != ISC_R_SUCCESS)
+ {
/*
* Failed to get the database, unexpected, but let us
* at least abandon serve-stale.
/* RSA verify */
ISC_RUN_TEST_IMPL(isc_rsa_verify) {
- isc_result_t ret;
+ isc_result_t result;
dns_fixedname_t fname;
isc_buffer_t buf;
dns_name_t *name;
name = dns_fixedname_initname(&fname);
isc_buffer_constinit(&buf, "rsa.", 4);
isc_buffer_add(&buf, 4);
- ret = dns_name_fromtext(name, &buf, NULL, 0);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dns_name_fromtext(name, &buf, NULL, 0);
+ assert_int_equal(result, ISC_R_SUCCESS);
- ret = dst_key_fromfile(name, 29238, DST_ALG_RSASHA256, DST_TYPE_PUBLIC,
- TESTS_DIR, isc_g_mctx, &key);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_key_fromfile(name, 29238, DST_ALG_RSASHA256,
+ DST_TYPE_PUBLIC, TESTS_DIR, isc_g_mctx, &key);
+ assert_int_equal(result, ISC_R_SUCCESS);
/* RSASHA1 - May not be supported by the OS */
if (dst_algorithm_supported(DST_ALG_RSASHA1)) {
key->key_alg = DST_ALG_RSASHA1;
- ret = dst_context_create(key, isc_g_mctx,
- DNS_LOGCATEGORY_DNSSEC, false, &ctx);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_create(
+ key, isc_g_mctx, DNS_LOGCATEGORY_DNSSEC, false, &ctx);
+ assert_int_equal(result, ISC_R_SUCCESS);
r.base = d;
r.length = 10;
- ret = dst_context_adddata(ctx, &r);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_adddata(ctx, &r);
+ assert_int_equal(result, ISC_R_SUCCESS);
r.base = sigsha1;
r.length = 256;
- ret = dst_context_verify(ctx, &r);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_verify(ctx, &r);
+ assert_int_equal(result, ISC_R_SUCCESS);
dst_context_destroy(&ctx);
}
key->key_alg = DST_ALG_RSASHA256;
- ret = dst_context_create(key, isc_g_mctx, DNS_LOGCATEGORY_DNSSEC, false,
- &ctx);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_create(key, isc_g_mctx, DNS_LOGCATEGORY_DNSSEC,
+ false, &ctx);
+ assert_int_equal(result, ISC_R_SUCCESS);
r.base = d;
r.length = 10;
- ret = dst_context_adddata(ctx, &r);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_adddata(ctx, &r);
+ assert_int_equal(result, ISC_R_SUCCESS);
r.base = sigsha256;
r.length = 256;
- ret = dst_context_verify(ctx, &r);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_verify(ctx, &r);
+ assert_int_equal(result, ISC_R_SUCCESS);
dst_context_destroy(&ctx);
key->key_alg = DST_ALG_RSASHA512;
- ret = dst_context_create(key, isc_g_mctx, DNS_LOGCATEGORY_DNSSEC, false,
- &ctx);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_create(key, isc_g_mctx, DNS_LOGCATEGORY_DNSSEC,
+ false, &ctx);
+ assert_int_equal(result, ISC_R_SUCCESS);
r.base = d;
r.length = 10;
- ret = dst_context_adddata(ctx, &r);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_adddata(ctx, &r);
+ assert_int_equal(result, ISC_R_SUCCESS);
r.base = sigsha512;
r.length = 256;
- ret = dst_context_verify(ctx, &r);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dst_context_verify(ctx, &r);
+ assert_int_equal(result, ISC_R_SUCCESS);
dst_context_destroy(&ctx);
isc_buffer_t target;
isc_region_t r;
- isc_result_t ret;
+ isc_result_t result;
char buf[4096];
isc_buffer_init(&target, buf, sizeof(buf));
- ret = dns_rdataset_totext(&rrset, dname, false, false, &target);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dns_rdataset_totext(&rrset, dname, false, false, &target);
+ assert_int_equal(result, ISC_R_SUCCESS);
isc_buffer_usedregion(&target, &r);
fprintf(fp, "%.*s", (int)r.length, (char *)r.base);
dns_rdataset_t *rrset, char *target_mem, dns_rdata_t *rrsig) {
dns_dnsseckey_t *ksk = ISC_LIST_HEAD(keys);
isc_stdtime_t clockskew = inception - OFFSET;
- isc_result_t ret;
+ isc_result_t result;
isc_buffer_t target;
isc_buffer_init(&target, target_mem, 1024);
- ret = dns_dnssec_sign(dname, rrset, ksk->key, &clockskew, &expiration,
- isc_g_mctx, &target, rrsig);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dns_dnssec_sign(dname, rrset, ksk->key, &clockskew,
+ &expiration, isc_g_mctx, &target, rrsig);
+ assert_int_equal(result, ISC_R_SUCCESS);
print_rdata(fp, rrsig);
}
isc_buffer_t source, target;
isc_lex_t *lex = NULL;
isc_lexspecials_t specials = { 0 };
- isc_result_t ret;
+ isc_result_t result;
/* Set up source to hold the input string. */
isc_buffer_init(&target, target_mem, 1024);
specials['"'] = 1;
isc_lex_setspecials(lex, specials);
isc_lex_setcomments(lex, ISC_LEXCOMMENT_DNSMASTERFILE);
- ret = isc_lex_openbuffer(lex, &source);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = isc_lex_openbuffer(lex, &source);
+ assert_int_equal(result, ISC_R_SUCCESS);
- ret = dns_rdata_fromtext(rdata, dns_rdataclass_in, rdtype, lex, dname,
- 0, isc_g_mctx, &target, NULL);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dns_rdata_fromtext(rdata, dns_rdataclass_in, rdtype, lex,
+ dname, 0, isc_g_mctx, &target, NULL);
+ assert_int_equal(result, ISC_R_SUCCESS);
print_rdata(fp, rdata);
dns_rdataset_t *cdsset = NULL;
isc_buffer_t b, timebuf;
isc_region_t r;
- isc_result_t ret;
+ isc_result_t result;
/* Write header to file. */
test_bundles[bnum].btime = btime;
isc_buffer_init(&timebuf, timestr, sizeof(timestr));
isc_stdtime_tostring(btime, timestr, sizeof(timestr));
isc_buffer_init(&b, utc, sizeof(utc));
- ret = dns_time32_totext(btime, &b);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = dns_time32_totext(btime, &b);
+ assert_int_equal(result, ISC_R_SUCCESS);
isc_buffer_usedregion(&b, &r);
fprintf(fp, ";; SignedKeyResponse 1.0 %.*s (%s)\n", (int)r.length,
static void
check_rrsig(dns_skrbundle_t *bundle, skr__testbundle_t *tb,
- dns_rdatatype_t rrtype, isc_result_t ret) {
+ dns_rdatatype_t rrtype, isc_result_t result) {
isc_result_t r;
dns_dnsseckey_t *key = ISC_LIST_HEAD(keys);
dns_rdata_t sigrdata = DNS_RDATA_INIT;
r = dns_skrbundle_getsig(bundle, key->key, rrtype, &sigrdata);
- assert_int_equal(r, ret);
+ assert_int_equal(r, result);
if (r == ISC_R_SUCCESS) {
int cmp = 1;
static void
create_skr_file(void) {
- isc_result_t ret;
+ isc_result_t result;
isc_stdtime_t start_time;
size_t tempfilelen;
char *tempfile = NULL;
/* Set up output file */
tempfilelen = strlen(TESTS_DIR "/testdata/skr/") + 20;
tempfile = isc_mem_get(isc_g_mctx, tempfilelen);
- ret = isc_file_mktemplate(testskr, tempfile, tempfilelen);
- assert_int_equal(ret, ISC_R_SUCCESS);
- ret = isc_file_openunique(tempfile, &outfp);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = isc_file_mktemplate(testskr, tempfile, tempfilelen);
+ assert_int_equal(result, ISC_R_SUCCESS);
+ result = isc_file_openunique(tempfile, &outfp);
+ assert_int_equal(result, ISC_R_SUCCESS);
start_time = isc_stdtime_now();
for (int i = 0; i < 42; i++) {
fprintf(outfp, ";; SignedKeyResponse 1.0 generated by test-dev\n");
- ret = isc_stdio_close(outfp);
- assert_int_equal(ret, ISC_R_SUCCESS);
- ret = isc_file_rename(tempfile, testskr);
- assert_int_equal(ret, ISC_R_SUCCESS);
+ result = isc_stdio_close(outfp);
+ assert_int_equal(result, ISC_R_SUCCESS);
+ result = isc_file_rename(tempfile, testskr);
+ assert_int_equal(result, ISC_R_SUCCESS);
isc_file_remove(tempfile);
isc_mem_put(isc_g_mctx, tempfile, tempfilelen);