ldns_rr_list *trusted_keys,
ldns_pkt *pkt_o,
uint16_t qflags,
- ldns_rr_list *prev_key_list,
+ ldns_rr_list * ATTR_UNUSED(prev_key_list),
int verbosity)
{
ldns_rr_list *rrset = NULL;
ldns_pkt *pkt;
ldns_pkt *qpkt;
char *serv;
- char *name;
+ const char *name;
char *name2;
char *progname;
char *query_file = NULL;
}
void
-print_rr_list_abbr(FILE *fp, ldns_rr_list *rrlist, char *usr)
+print_rr_list_abbr(FILE *fp, ldns_rr_list *rrlist, const char *usr)
{
size_t i;
ldns_rr_type tp;
/**
* print some rdfs of a rr in a rr_list
*/
-void print_rr_list_abbr(FILE *fp, ldns_rr_list *sig, char *usr);
+void print_rr_list_abbr(FILE *fp, ldns_rr_list *sig, const char *usr);
/**
* Alloc some memory, with error checking
#define OP_CHG '~'
static void
-usage(int argc, char **argv)
+usage(int ATTR_UNUSED(argc), char **argv)
{
printf("Usage: %s [-v] [-i] [-d] [-c] [-s] <zonefile1> <zonefile2>\n",
argv[0]);
int
main(int argc, char **argv) {
char *filename, *rrstr, *ownerstr;
- char *classtypestr1 = "IN NS ns1.example.com.";
- char *classtypestr2 = "IN NS ns2.example.com.";
+ const char *classtypestr1 = "IN NS ns1.example.com.";
+ const char *classtypestr2 = "IN NS ns2.example.com.";
const size_t classtypelen = strlen(classtypestr1);
/* Simply because this was developed by SIDN and we don't use xn-- for .nl :-) */
const char *punystr = "xn--fake-rr";
int do_hexdump = 1;
uint8_t *wire = NULL;
size_t wiresize = 0;
- char *port = "53";
+ const char *port = "53";
srandom(time(NULL) ^ getpid());
soa_version = (uint32_t)atoi(optarg);
break;
case 'y':
- tsig_cred.algorithm = "hmac-md5.sig-alg.reg.int.";
+ tsig_cred.algorithm = (char*)"hmac-md5.sig-alg.reg.int.";
tsig_cred.keyname = optarg;
tsig_cred.keydata = strchr(optarg, ':');
*tsig_cred.keydata = '\0';
ldns_rr_list *ns_ip;
uint8_t i, j;
ldns_rr_type t;
- char * type_name;
+ const char * type_name;
struct tm incep, expir;
char incep_buf[26];
char expir_buf[26];
}
void
-usage_openssl(FILE *fp, const char *prog) {
+usage_openssl(FILE *fp, const char* ATTR_UNUSED(prog)) {
fprintf(fp, "Special commands for openssl engines:\n");
fprintf(fp, "-c <file>\tOpenSSL config file\n");
}
}
static ldns_rr *
-find_key_in_file(const char *keyfile_name_base, ldns_key *key, uint32_t zone_ttl)
+find_key_in_file(const char *keyfile_name_base, ldns_key* ATTR_UNUSED(key),
+ uint32_t zone_ttl)
{
char *keyfile_name;
FILE *keyfile;
/** create a query to test */
static ldns_buffer*
-make_query(char* nm, int tp)
+make_query(const char* nm, int tp)
{
/* with EDNS DO and CDFLAG */
ldns_buffer* b = ldns_buffer_new(512);
/** try 3 times to get an EDNS reply from the server, exponential backoff */
static int
-get_packet(struct sockaddr_storage* addr, socklen_t len, char* nm, int tp,
- uint8_t **wire, size_t* wlen)
+get_packet(struct sockaddr_storage* addr, socklen_t len, const char* nm,
+ int tp, uint8_t **wire, size_t* wlen)
{
struct timeval t;
ldns_buffer* qbin;
exit(EXIT_FAILURE);
}
-void verbose(int lvl, const char* msg, ...)
+void verbose(int ATTR_UNUSED(lvl), const char* msg, ...)
{
va_list args;
va_start(args, msg);
static ldns_status
verify_dnssec_name(ldns_rdf *zone_name,
- ldns_dnssec_zone *zone,
+ ldns_dnssec_zone* ATTR_UNUSED(zone),
ldns_rbtree_t *zone_nodes,
ldns_rbnode_t *cur_node,
ldns_rr_list *keys,