lock-verify$(EXEEXT) memstats$(EXEEXT) perf$(EXEEXT) \
petal$(EXEEXT) pktview$(EXEEXT) streamtcp$(EXEEXT) \
$(DNSTAP_SOCKET_TESTBIN) dohclient$(EXEEXT) \
- testbound$(EXEEXT) unittest$(EXEEXT)
+ testbound$(EXEEXT) unittest$(EXEEXT) readzone$(EXEEXT)
tests: all $(TEST_BIN)
check: test
int count;
char ip_str[INET_ADDRSTRLEN+1];
char *next_ip_str;
- uint32_t *ip_wire_dst = NULL;
size_t i;
for (i = 0, count = 1; val[i]; i++) {
val = next_ip_str + 1;
}
- ip_wire_dst++;
count--;
}
if (count) /* verify that we parsed all values */
int count;
char ip_str[INET6_ADDRSTRLEN+1];
char *next_ip_str;
- uint32_t *ip_wire_dst = NULL;
size_t i;
for (i = 0, count = 1; val[i]; i++) {
memcpy(ip_str, val, next_ip_str - val);
ip_str[next_ip_str - val] = 0;
if (inet_pton(AF_INET6, ip_str, rd + *rd_len) != 1) {
- val = ip_str; /* to use in error reporting below */
break;
}
*rd_len += LDNS_IP6ADDRLEN;
val = next_ip_str + 1;
}
- ip_wire_dst++;
count--;
}
if (count) /* verify that we parsed all values */
{
size_t i, count, val_len;
char* next_key;
- uint16_t* key_dst = NULL;
val_len = strlen(val);
val_len -= next_key - val + 1;
val = next_key + 1; /* skip the comma */
- key_dst += 1;
}
/* In draft-ietf-dnsop-svcb-https-06 Section 7:
return LDNS_WIREPARSE_ERR_SVCB_ALPN_KEY_TOO_LARGE;
}
while (val_len) {
- size_t dst_len;
-
str_len = (next_str = sldns_str2wire_svcbparam_parse_next_unescaped_comma(val))
? (size_t)(next_str - val) : val_len;