if ((rdataset->attributes & DNS_RDATASETATTR_NEGATIVE) != 0) {
strlcat(buf, "negative response", sizeof(buf));
- strlcat(buf, (yaml ? "_" : ", "), sizeof(buf));
+ strlcat(buf, yaml ? "_" : ", ", sizeof(buf));
}
switch (rdataset->trust) {
fatal("-S and -G cannot be used together");
}
- ret = dst_key_fromnamedfile(
- ctx->predecessor, ctx->directory,
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE),
- mctx, &prevkey);
+ ret = dst_key_fromnamedfile(ctx->predecessor, ctx->directory,
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
+ mctx, &prevkey);
if (ret != ISC_R_SUCCESS) {
fatal("Invalid keyfile %s: %s", ctx->predecessor,
isc_result_totext(ret));
dst_key_setbool(key, DST_BOOL_KSK, ksr->ksk);
dst_key_setbool(key, DST_BOOL_ZSK, !ksr->ksk);
dst_key_settime(key, DST_TIME_CREATED, ksr->now);
- dst_key_settime(key, DST_TIME_PUBLISH, (active - prepub));
+ dst_key_settime(key, DST_TIME_PUBLISH, active - prepub);
dst_key_settime(key, DST_TIME_ACTIVATE, active);
if (ksr->ksk) {
dns_keymgr_settime_syncpublish(key, kasp,
- (inception == ksr->start));
+ inception == ksr->start);
}
if (ksr->lifetime > 0) {
ksr->retiresafety + ksr->signdelay;
}
dst_key_settime(key, DST_TIME_INACTIVE, inactive);
- dst_key_settime(key, DST_TIME_DELETE, (inactive + remove));
+ dst_key_settime(key, DST_TIME_DELETE, inactive + remove);
*expiration = inactive;
} else {
*expiration = 0;
cd->dlz_allowzonexfr = (dlz_dlopen_allowzonexfr_t *)dl_load_symbol(
cd, "dlz_allowzonexfr", false);
cd->dlz_allnodes = (dlz_dlopen_allnodes_t *)dl_load_symbol(
- cd, "dlz_allnodes", (cd->dlz_allowzonexfr != NULL));
+ cd, "dlz_allnodes", cd->dlz_allowzonexfr != NULL);
cd->dlz_authority = (dlz_dlopen_authority_t *)dl_load_symbol(
cd, "dlz_authority", false);
cd->dlz_newversion = (dlz_dlopen_newversion_t *)dl_load_symbol(
cd, "dlz_newversion", false);
cd->dlz_closeversion = (dlz_dlopen_closeversion_t *)dl_load_symbol(
- cd, "dlz_closeversion", (cd->dlz_newversion != NULL));
+ cd, "dlz_closeversion", cd->dlz_newversion != NULL);
cd->dlz_configure = (dlz_dlopen_configure_t *)dl_load_symbol(
cd, "dlz_configure", false);
cd->dlz_ssumatch = (dlz_dlopen_ssumatch_t *)dl_load_symbol(
if ((adbname->flags & DNS_ADBFIND_STARTATZONE) != 0) {
options |= DNS_DBFIND_PENDINGOK;
}
- result = dns_view_find(
- adb->view, adbname->name, rdtype, now, options, true,
- ((adbname->flags & DNS_ADBFIND_STARTATZONE) != 0), NULL, NULL,
- fname, &rdataset, NULL);
+ result = dns_view_find(adb->view, adbname->name, rdtype, now, options,
+ true,
+ (adbname->flags & DNS_ADBFIND_STARTATZONE) != 0,
+ NULL, NULL, fname, &rdataset, NULL);
switch (result) {
case DNS_R_GLUE:
if (address->family == AF_INET) {
(void)snprintf(textname, sizeof(textname),
"%u.%u.%u.%u.in-addr.arpa.",
- ((unsigned int)bytes[3] & 0xffU),
- ((unsigned int)bytes[2] & 0xffU),
- ((unsigned int)bytes[1] & 0xffU),
- ((unsigned int)bytes[0] & 0xffU));
+ (unsigned int)bytes[3] & 0xffU,
+ (unsigned int)bytes[2] & 0xffU,
+ (unsigned int)bytes[1] & 0xffU,
+ (unsigned int)bytes[0] & 0xffU);
} else if (address->family == AF_INET6) {
size_t remaining;
dispentry_log(resp, ISC_LOG_DEBUG(92),
"got valid DNS message header, /QR %c, id %u",
- (((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0'), id);
+ ((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0', id);
/*
* Look at the message flags. If it's a query, ignore it.
dispatch_log(disp, ISC_LOG_DEBUG(92),
"got valid DNS message header, /QR %c, id %u",
- (((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0'), id);
+ ((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0', id);
/*
* Look at the message flags. If it's a query, ignore it and keep
/* Try to read the public key. */
result = keyfromfile(kasp, directory, dnskey,
- (DST_TYPE_PUBLIC | DST_TYPE_STATE), mctx,
+ DST_TYPE_PUBLIC | DST_TYPE_STATE, mctx,
&pubkey);
if (result == ISC_R_FILENOTFOUND || result == ISC_R_NOPERM) {
result = ISC_R_SUCCESS;
}
/* Now read the private key. */
- result = keyfromfile(
- kasp, directory, dnskey,
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE),
- mctx, &privkey);
+ result = keyfromfile(kasp, directory, dnskey,
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
+ mctx, &privkey);
/*
* If the key was revoked and the private file
dst_key_setflags(dnskey,
flags & ~DNS_KEYFLAG_REVOKE);
result = keyfromfile(kasp, directory, dnskey,
- (DST_TYPE_PUBLIC |
- DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC |
+ DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
mctx, &privkey);
if (result == ISC_R_SUCCESS &&
dst_key_pubcompare(dnskey, privkey, false))
result2 = dst_key_getfilename(
dst_key_name(dnskey), dst_key_id(dnskey),
dst_key_alg(dnskey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
NULL, mctx, &buf);
if (result2 != ISC_R_SUCCESS) {
char namebuf[DNS_NAME_FORMATSIZE];
ret = dst_key_getnum(key, DST_NUM_LIFETIME, &lifetime);
if (ret == ISC_R_SUCCESS && lifetime > 0) {
dst_key_settime(key, DST_TIME_SYNCDELETE,
- (syncpublish + lifetime));
+ syncpublish + lifetime);
}
}
syncpub);
if (klifetime > 0) {
dst_key_settime(key->key, DST_TIME_SYNCDELETE,
- (syncpub + klifetime));
+ syncpub + klifetime);
}
}
}
ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
if (ret != ISC_R_SUCCESS) {
ksk = ((dst_key_flags(key->key) & DNS_KEYFLAG_KSK) != 0);
- dst_key_setbool(key->key, DST_BOOL_KSK, (ksk || csk));
+ dst_key_setbool(key->key, DST_BOOL_KSK, ksk || csk);
}
ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
if (ret != ISC_R_SUCCESS) {
zsk = ((dst_key_flags(key->key) & DNS_KEYFLAG_KSK) == 0);
- dst_key_setbool(key->key, DST_BOOL_ZSK, (zsk || csk));
+ dst_key_setbool(key->key, DST_BOOL_ZSK, zsk || csk);
}
/* Get time metadata. */
"DNSKEY %s (%s) (policy %s) in %u "
"seconds",
keystr, keymgr_keyrole(active_key->key),
- dns_kasp_getname(kasp), (prepub - now));
+ dns_kasp_getname(kasp), prepub - now);
}
}
if (prepub == 0 || prepub > now) {
ISC_LIST_FOREACH (*keyring, dkey, link) {
bool found_match = false;
- keymgr_key_init(dkey, kasp, now, (numkeys == 1));
+ keymgr_key_init(dkey, kasp, now, numkeys == 1);
ISC_LIST_FOREACH (dns_kasp_keys(kasp), kkey, link) {
if (dns_kasp_key_match(kkey, dkey)) {
"scheduled on "));
retire_time = keymgr_prepublication_time(
dkey, kasp,
- (retire_time - active_time),
- now);
+ retire_time - active_time, now);
} else {
RETERR(isc_buffer_printf(
buf, " Key will retire on "));
} else if (cnt % 8 == 0) {
printf(" |");
}
- printf(" %02x %c", *p, (isprint(*p) ? *p : ' '));
+ printf(" %02x %c", *p, isprint(*p) ? *p : ' ');
p++;
cnt++;
} else if (result == ISC_R_SUCCESS) {
isc_log_write(category, module, level,
"%s%s%s%s%s\n%.*s", description,
- (from != NULL ? " from " : ""), frombuf,
- (to != NULL ? " to " : ""), tobuf,
+ from != NULL ? " from " : "", frombuf,
+ to != NULL ? " to " : "", tobuf,
(int)isc_buffer_usedlength(&buffer), buf);
}
} while (result == ISC_R_NOSPACE);
*optout = ((nsec3.flags &
DNS_NSEC3FLAG_OPTOUT) != 0);
(*logit)(arg, ISC_LOG_DEBUG(3),
- (*optout ? "NSEC3 indicates optout"
- : "NSEC3 indicates secure "
- "range"));
+ *optout ? "NSEC3 indicates optout"
+ : "NSEC3 indicates secure "
+ "range");
}
answer = ISC_R_SUCCESS;
}
s = alpn->base;
}
}
- if (svcb_ishttp(s, (alpn->base - s))) {
+ if (svcb_ishttp(s, alpn->base - s)) {
return true;
}
}
static isc_result_t
totext_opt(ARGS_TOTEXT) {
isc_region_t r;
- isc_region_t or ;
+ isc_region_t or;
uint16_t option;
uint16_t length;
char buf[sizeof("64000 64000")];
* If we accept expired RRsets keep them for no more than 120 seconds.
*/
if (acceptexpired &&
- (isc_serial_le(rrsig->timeexpire, ((now + 120) & 0xffffffff)) ||
+ (isc_serial_le(rrsig->timeexpire, (now + 120) & 0xffffffff) ||
isc_serial_le(rrsig->timeexpire, now)))
{
ttl = 120;
dns_slabheader_copycase(dns_slabheader_t *dest, dns_slabheader_t *src) {
if (CASESET(src)) {
uint_least16_t attr = DNS_SLABHEADER_GETATTR(
- src, (DNS_SLABHEADERATTR_CASESET |
- DNS_SLABHEADERATTR_CASEFULLYLOWER));
+ src, DNS_SLABHEADERATTR_CASESET |
+ DNS_SLABHEADERATTR_CASEFULLYLOWER);
DNS_SLABHEADER_SETATTR(dest, attr);
memmove(dest->upper, src->upper, sizeof(src->upper));
}
/*
* Clear cache bits.
*/
- FCTX_ATTR_CLR(fctx, (FCTX_ATTR_WANTNCACHE | FCTX_ATTR_WANTCACHE));
+ FCTX_ATTR_CLR(fctx, FCTX_ATTR_WANTNCACHE | FCTX_ATTR_WANTCACHE);
/*
* Did we get any answers?
* Create rdtype statistics for the first 255 RRtypes,
* plus one additional for other RRtypes.
*/
- create_stats(mctx, dns_statstype_rdtype, (RDTYPECOUNTER_MAXTYPE + 1),
+ create_stats(mctx, dns_statstype_rdtype, RDTYPECOUNTER_MAXTYPE + 1,
statsp);
}
dns_rdatasetstats_create(isc_mem_t *mctx, dns_stats_t **statsp) {
REQUIRE(statsp != NULL && *statsp == NULL);
- create_stats(mctx, dns_statstype_rdataset, (RDTYPECOUNTER_MAXVAL + 1),
+ create_stats(mctx, dns_statstype_rdataset, RDTYPECOUNTER_MAXVAL + 1,
statsp);
}
uint32_t counter = isc_stats_get_counter(stats->counters, idx);
if (counter == kval) {
/* Match */
- isc_stats_increment(stats->counters, (idx + operation));
+ isc_stats_increment(stats->counters, idx + operation);
return;
}
}
uint32_t counter = isc_stats_get_counter(stats->counters, idx);
if (counter == 0) {
isc_stats_set(stats->counters, kval, idx);
- isc_stats_increment(stats->counters, (idx + operation));
+ isc_stats_increment(stats->counters, idx + operation);
return;
}
}
/* No room, grow stats storage. */
isc_stats_resize(&stats->counters,
- (num_keys * dnssecsign_block_size * 2));
+ num_keys * dnssecsign_block_size * 2);
/* Reset counters for new key (new index, nidx). */
int nidx = num_keys * dnssecsign_block_size;
isc_stats_set(stats->counters, kval, nidx);
- isc_stats_set(stats->counters, 0, (nidx + dns_dnssecsignstats_sign));
- isc_stats_set(stats->counters, 0, (nidx + dns_dnssecsignstats_refresh));
+ isc_stats_set(stats->counters, 0, nidx + dns_dnssecsignstats_sign);
+ isc_stats_set(stats->counters, 0, nidx + dns_dnssecsignstats_refresh);
/* And increment the counter for the given operation. */
- isc_stats_increment(stats->counters, (nidx + operation));
+ isc_stats_increment(stats->counters, nidx + operation);
}
void
/* Match */
isc_stats_set(stats->counters, 0, idx);
isc_stats_set(stats->counters, 0,
- (idx + dns_dnssecsignstats_sign));
+ idx + dns_dnssecsignstats_sign);
isc_stats_set(stats->counters, 0,
- (idx + dns_dnssecsignstats_refresh));
+ idx + dns_dnssecsignstats_refresh);
return;
}
}
continue;
}
- val = isc_stats_get_counter(stats, (idx + operation));
+ val = isc_stats_get_counter(stats, idx + operation);
if ((options & ISC_STATSDUMP_VERBOSE) == 0 && val == 0) {
continue;
}
x = 0;
if (weeks != 0) {
- RETERR(ttlfmt(weeks, "week", verbose, (x > 0), target));
+ RETERR(ttlfmt(weeks, "week", verbose, x > 0, target));
x++;
}
if (days != 0) {
- RETERR(ttlfmt(days, "day", verbose, (x > 0), target));
+ RETERR(ttlfmt(days, "day", verbose, x > 0, target));
x++;
}
if (hours != 0) {
- RETERR(ttlfmt(hours, "hour", verbose, (x > 0), target));
+ RETERR(ttlfmt(hours, "hour", verbose, x > 0, target));
x++;
}
if (mins != 0) {
- RETERR(ttlfmt(mins, "minute", verbose, (x > 0), target));
+ RETERR(ttlfmt(mins, "minute", verbose, x > 0, target));
x++;
}
if (secs != 0 || (weeks == 0 && days == 0 && hours == 0 && mins == 0)) {
- RETERR(ttlfmt(secs, "second", verbose, (x > 0), target));
+ RETERR(ttlfmt(secs, "second", verbose, x > 0, target));
x++;
}
INSIST(x > 0);
REQUIRE(argv != NULL && *argv == NULL);
LOCK_ZONE(zone);
- size = ISC_CHECKED_MUL((zone->db_argc + 1), sizeof(char *));
+ size = ISC_CHECKED_MUL(zone->db_argc + 1, sizeof(char *));
for (i = 0; i < zone->db_argc; i++) {
size += strlen(zone->db_argv[i]) + 1;
}
tmp = mem;
tmp2 = mem;
base = mem;
- tmp2 += ISC_CHECKED_MUL((zone->db_argc + 1), sizeof(char *));
+ tmp2 += ISC_CHECKED_MUL(zone->db_argc + 1, sizeof(char *));
for (i = 0; i < zone->db_argc; i++) {
*tmp++ = tmp2;
strlcpy(tmp2, zone->db_argv[i], size - (tmp2 - base));
for (size_t i = 0; i < tags; i++) {
size_t tokenlen = 0;
- CHECK(putmem(&b, p, (positions[i] - p)));
+ CHECK(putmem(&b, p, positions[i] - p));
p = positions[i];
INSIST(p != NULL);
/* Add to keytables. */
trusted++;
- trust_key(zone, name, &dnskey, (keydata.addhd == 0));
+ trust_key(zone, name, &dnskey, keydata.addhd == 0);
}
if (trusted == 0 && pending != 0) {
failure:
dns_diff_clear(&diff);
if (ver != NULL) {
- dns_db_closeversion(db, &ver, (result == ISC_R_SUCCESS));
+ dns_db_closeversion(db, &ver, result == ISC_R_SUCCESS);
}
INSIST(ver == NULL);
result = dst_key_fromfile(
dst_key_name(pubkey), dst_key_id(pubkey),
dst_key_alg(pubkey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE,
directory, mctx, &foundkey);
} else {
ISC_LIST_FOREACH (dns_kasp_keys(kasp), kkey, link) {
result = dst_key_fromfile(
dst_key_name(pubkey), dst_key_id(pubkey),
dst_key_alg(pubkey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
directory, mctx, &foundkey);
if (result == ISC_R_SUCCESS) {
break;
result2 = dst_key_getfilename(
dst_key_name(pubkey), dst_key_id(pubkey),
dst_key_alg(pubkey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
NULL, mctx, &buf);
if (result2 != ISC_R_SUCCESS) {
char namebuf[DNS_NAME_FORMATSIZE];
if (!dns_rdatatype_iskeymaterial(type)) {
bool warn = false, deleted = false;
- if (delsig_ok(&rrsig, keys, nkeys, (kasp != NULL),
- &warn))
+ if (delsig_ok(&rrsig, keys, nkeys, kasp != NULL, &warn))
{
result = update_one_rr(db, ver, zonediff->diff,
DNS_DIFFOP_DELRESIGN,
}
isc_log_write(category, DNS_LOGMODULE_ZONE, level, "%s%s%s%s: %s",
- (prefix != NULL ? prefix : ""),
- (prefix != NULL ? ": " : ""), zstr, zone->strnamerd,
- message);
+ prefix != NULL ? prefix : "", prefix != NULL ? ": " : "",
+ zstr, zone->strnamerd, message);
}
static void
addrbuf, isc_result_totext(result));
notify->flags |= DNS_NOTIFY_TCP;
dns_request_destroy(¬ify->request);
- notify_send_queue(notify, (notify->flags & DNS_NOTIFY_STARTUP));
+ notify_send_queue(notify, notify->flags & DNS_NOTIFY_STARTUP);
return;
} else if (result == ISC_R_TIMEDOUT) {
notify_log(notify->zone, ISC_LOG_WARNING,
CHECK(dns_diff_apply(&diff, db, ver));
CHECK(clean_nsec3param(zone, db, ver, &diff));
CHECK(add_signing_records(db, zone->privatetype, ver,
- &diff, (newalg || fullsign)));
+ &diff, newalg || fullsign));
CHECK(update_soa_serial(zone, db, ver, &diff, mctx,
zone->updatemethod));
CHECK(add_chains(zone, db, ver, &diff));
"setserial: desired serial (%u) "
"out of range (%u-%u)",
desired, oldserial + 1,
- (oldserial + 0x7fffffff));
+ oldserial + 0x7fffffff);
}
goto failure;
}
}
send_req = proxyudp_get_send_req(sock->worker->mctx, sock, handle,
- (sock->client ? region : NULL), cb,
+ sock->client ? region : NULL, cb,
cbarg);
if (sock->client) {
isc_region_t send_data = { 0 };
}
append_type_and_length(outbuf, (uint8_t)tlv_type,
- ((uint16_t)tlv_data->length), true);
+ (uint16_t)tlv_data->length, true);
if (tlv_data->length > 0) {
isc_result_t result = isc_proxy2_header_append(outbuf,
return ISC_R_RANGE;
}
- append_type_and_length(outbuf, (uint8_t)type, ((uint16_t)data->length),
+ append_type_and_length(outbuf, (uint8_t)type, (uint16_t)data->length,
false);
if (data->length > 0) {
}
/* I know the better way, but for now. */
for (j = 0; j < 8; j++) {
- if (BIT_TEST(r, (0x80 >> j))) {
+ if (BIT_TEST(r, 0x80 >> j)) {
break;
}
}
[ISCCC_R_MAXDEPTH] = "ISCCC_R_MAXDEPTH",
};
-STATIC_ASSERT((DNS_R_SERVFAIL - DNS_R_NOERROR == 2),
+STATIC_ASSERT(DNS_R_SERVFAIL - DNS_R_NOERROR == 2,
"DNS_R_NOERROR has wrong value");
-STATIC_ASSERT((DNS_R_BADVERS - DNS_R_NOERROR == 16),
+STATIC_ASSERT(DNS_R_BADVERS - DNS_R_NOERROR == 16,
"DNS_R_BADVERS has wrong value");
-STATIC_ASSERT((ISC_R_NRESULTS < INT32_MAX), "result.h enum too big");
+STATIC_ASSERT(ISC_R_NRESULTS < INT32_MAX, "result.h enum too big");
const char *
isc_result_totext(isc_result_t result) {
if (default_kasp != NULL && dns_kasp_nsec3(default_kasp)) {
dns_kasp_setnsec3param(
kasp, dns_kasp_nsec3iter(default_kasp),
- (dns_kasp_nsec3flags(default_kasp) == 0x01),
+ dns_kasp_nsec3flags(default_kasp) == 0x01,
dns_kasp_nsec3saltlen(default_kasp));
} else {
dns_kasp_setnsec3(kasp, false);
isc_lex_create(pctx->mctx, 1024, &pctx->lexer);
isc_lex_setspecials(pctx->lexer, specials);
- isc_lex_setcomments(pctx->lexer,
- (ISC_LEXCOMMENT_C | ISC_LEXCOMMENT_CPLUSPLUS |
- ISC_LEXCOMMENT_SHELL));
+ isc_lex_setcomments(pctx->lexer, ISC_LEXCOMMENT_C |
+ ISC_LEXCOMMENT_CPLUSPLUS |
+ ISC_LEXCOMMENT_SHELL);
CHECK(cfg_create_list(pctx, &cfg_type_filelist, &pctx->open_files));
CHECK(cfg_create_list(pctx, &cfg_type_filelist, &pctx->closed_files));
if (alwaysvalid) {
now = when;
}
- if (isc_serial_gt(when, (now + 300)) /* In the future. */ ||
- isc_serial_lt(when, (now - 3600)) /* In the past. */)
+ if (isc_serial_gt(when, now + 300) /* In the future. */ ||
+ isc_serial_lt(when, now - 3600) /* In the past. */)
{
client->attributes |= NS_CLIENTATTR_BADCOOKIE;
ns_stats_increment(client->manager->sctx->nsstats,
nloops = zipf ? bctx->nloops : bctx->readers + bctx->mutate;
for (uint32_t t = 0; t < nloops; t++) {
struct thread_args *tp = &thread[t];
- elapsed = ISC_MAX(elapsed, (tp->stop - tp->start));
+ elapsed = ISC_MAX(elapsed, tp->stop - tp->start);
bool mut = t < bctx->mutate;
stats[mut].worked += tp->worked;
result = isc_file_getsizefd(fileno(fp), &size);
assert_int_equal(result, ISC_R_SUCCESS);
- data = isc_mem_get(mctx, (size + 1));
+ data = isc_mem_get(mctx, size + 1);
assert_non_null(data);
len = (size_t)size;
result = isc_file_getsizefd(fileno(fp), &size);
assert_int_equal(result, ISC_R_SUCCESS);
- data = isc_mem_get(mctx, (size + 1));
+ data = isc_mem_get(mctx, size + 1);
assert_non_null(data);
p = data;
testcases[i].name2, h2);
}
- assert_int_equal((h1 == h2), testcases[i].expect);
+ assert_int_equal(h1 == h2, testcases[i].expect);
/* Now case-sensitive */
h1 = dns_name_hash(n1);
testcases[i].name2, h2);
}
- assert_int_equal((h1 == h2), testcases[i].expect);
+ assert_int_equal(h1 == h2, testcases[i].expect);
}
}
ISC_LIST_APPEND(dnskeylist->rdata, &test_bundles[bnum].ksk, link);
dns_rdatalist_tordataset(dnskeylist, dnskeyset);
dns_rdata_init(&test_bundles[bnum].dnskey_rrsig);
- sign_rrset(fp, btime, (btime + LIFETIME), dnskeyset,
+ sign_rrset(fp, btime, btime + LIFETIME, dnskeyset,
test_bundles[bnum].rrsig1buf,
&test_bundles[bnum].dnskey_rrsig);
ISC_LIST_FOREACH (dnskeylist->rdata, rd, link) {
ISC_LIST_APPEND(cdnskeylist->rdata, &test_bundles[bnum].cdnskey, link);
dns_rdatalist_tordataset(cdnskeylist, cdnskeyset);
dns_rdata_init(&test_bundles[bnum].cdnskey_rrsig);
- sign_rrset(fp, btime, (btime + LIFETIME), cdnskeyset,
+ sign_rrset(fp, btime, btime + LIFETIME, cdnskeyset,
test_bundles[bnum].rrsig2buf,
&test_bundles[bnum].cdnskey_rrsig);
ISC_LIST_FOREACH (cdnskeylist->rdata, rd, link) {
ISC_LIST_APPEND(cdslist->rdata, &test_bundles[bnum].cds, link);
dns_rdatalist_tordataset(cdslist, cdsset);
dns_rdata_init(&test_bundles[bnum].cds_rrsig);
- sign_rrset(fp, btime, (btime + LIFETIME), cdsset,
+ sign_rrset(fp, btime, btime + LIFETIME, cdsset,
test_bundles[bnum].rrsig3buf, &test_bundles[bnum].cds_rrsig);
ISC_LIST_FOREACH (cdslist->rdata, rd, link) {
ISC_LIST_UNLINK(cdslist->rdata, rd, link);
assert_return_code(res, ISC_R_SUCCESS);
- assert_memory_equal(hexdigest, result, (result ? strlen(result) : 0));
+ assert_memory_equal(hexdigest, result, result ? strlen(result) : 0);
assert_int_equal(isc_hmac_reset(hmac_st), ISC_R_SUCCESS);
}
assert_return_code(res, ISC_R_SUCCESS);
- assert_memory_equal(hexdigest, result, (result ? strlen(result) : 0));
+ assert_memory_equal(hexdigest, result, result ? strlen(result) : 0);
assert_int_equal(isc_md_reset(md), ISC_R_SUCCESS);
}
do_cconnects_shutdown(loopmgr);
} else if (do_send) {
isc_async_current(stream_recv_send_connect,
- (cbarg == NULL
- ? get_stream_connect_function()
- : (stream_connect_function)cbarg));
+ cbarg == NULL
+ ? get_stream_connect_function()
+ : (stream_connect_function)cbarg);
}
isc_refcount_increment0(&active_creads);