if ((rdataset->attributes & DNS_RDATASETATTR_NEGATIVE) != 0) {
strlcat(buf, "negative response", sizeof(buf));
- strlcat(buf, (yaml ? "_" : ", "), sizeof(buf));
+ strlcat(buf, yaml ? "_" : ", ", sizeof(buf));
}
switch (rdataset->trust) {
printgreeting(argc, argv, *lookup);
*firstarg = false;
}
- ISC_LIST_APPEND(lookup_list, (*lookup), link);
+ ISC_LIST_APPEND(lookup_list, *lookup, link);
debug("looking up %s", (*lookup)->textname);
}
return value_from_next;
fatal("-S and -G cannot be used together");
}
- ret = dst_key_fromnamedfile(
- ctx->predecessor, ctx->directory,
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE),
- mctx, &prevkey);
+ ret = dst_key_fromnamedfile(ctx->predecessor, ctx->directory,
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
+ mctx, &prevkey);
if (ret != ISC_R_SUCCESS) {
fatal("Invalid keyfile %s: %s", ctx->predecessor,
isc_result_totext(ret));
dst_key_setbool(key, DST_BOOL_KSK, ksr->ksk);
dst_key_setbool(key, DST_BOOL_ZSK, !ksr->ksk);
dst_key_settime(key, DST_TIME_CREATED, ksr->now);
- dst_key_settime(key, DST_TIME_PUBLISH, (active - prepub));
+ dst_key_settime(key, DST_TIME_PUBLISH, active - prepub);
dst_key_settime(key, DST_TIME_ACTIVATE, active);
if (ksr->ksk) {
dns_keymgr_settime_syncpublish(key, kasp,
- (inception == ksr->start));
+ inception == ksr->start);
}
if (ksr->lifetime > 0) {
ksr->retiresafety + ksr->signdelay;
}
dst_key_settime(key, DST_TIME_INACTIVE, inactive);
- dst_key_settime(key, DST_TIME_DELETE, (inactive + remove));
+ dst_key_settime(key, DST_TIME_DELETE, inactive + remove);
*expiration = inactive;
} else {
*expiration = 0;
cd->dlz_allowzonexfr = (dlz_dlopen_allowzonexfr_t *)dl_load_symbol(
cd, "dlz_allowzonexfr", false);
cd->dlz_allnodes = (dlz_dlopen_allnodes_t *)dl_load_symbol(
- cd, "dlz_allnodes", (cd->dlz_allowzonexfr != NULL));
+ cd, "dlz_allnodes", cd->dlz_allowzonexfr != NULL);
cd->dlz_authority = (dlz_dlopen_authority_t *)dl_load_symbol(
cd, "dlz_authority", false);
cd->dlz_newversion = (dlz_dlopen_newversion_t *)dl_load_symbol(
cd, "dlz_newversion", false);
cd->dlz_closeversion = (dlz_dlopen_closeversion_t *)dl_load_symbol(
- cd, "dlz_closeversion", (cd->dlz_newversion != NULL));
+ cd, "dlz_closeversion", cd->dlz_newversion != NULL);
cd->dlz_configure = (dlz_dlopen_configure_t *)dl_load_symbol(
cd, "dlz_configure", false);
cd->dlz_ssumatch = (dlz_dlopen_ssumatch_t *)dl_load_symbol(
/*
* Resolver.
*/
- CHECK(get_view_querysource_dispatch(
- maps, AF_INET, &dispatch4,
- (ISC_LIST_PREV(view, link) == NULL)));
- CHECK(get_view_querysource_dispatch(
- maps, AF_INET6, &dispatch6,
- (ISC_LIST_PREV(view, link) == NULL)));
+ CHECK(get_view_querysource_dispatch(maps, AF_INET, &dispatch4,
+ ISC_LIST_PREV(view, link) == NULL));
+ CHECK(get_view_querysource_dispatch(maps, AF_INET6, &dispatch6,
+ ISC_LIST_PREV(view, link) == NULL));
if (dispatch4 == NULL && dispatch6 == NULL) {
UNEXPECTED_ERROR("unable to obtain either an IPv4 or"
" an IPv6 dispatch");
}
if (trsp->num_zones > old_zct) {
- result = realloc(result,
- ((trsp->num_zones + 1) *
- sizeof(*result)));
+ result = realloc(result, (trsp->num_zones +
+ 1) * sizeof(*result));
if (result == NULL) {
perror("realloc");
exit(EXIT_FAILURE);
}
memmove(&(trsp->rstack[1]), &(trsp->rstack[0]),
- (trsp->stack_idx * sizeof(trsp->rstack[0])));
+ trsp->stack_idx * sizeof(trsp->rstack[0]));
trsp->stack_idx++;
return true;
}
memmove(&(trsp->rstack[0]), &(trsp->rstack[1]),
- ((trsp->stack_idx - 1) * sizeof(trsp->rstack[0])));
+ (trsp->stack_idx - 1) * sizeof(trsp->rstack[0]));
memmove(result, &(trsp->rstack[0].result), sizeof(*result));
trsp->stack_idx--;
if (trsp->stack_idx > 1) {
memmove(&(trsp->rstack[1]), &(trsp->rstack[2]),
- ((trsp->stack_idx - 2) * sizeof(trsp->rstack[0])));
+ (trsp->stack_idx - 2) * sizeof(trsp->rstack[0]));
}
trsp->stack_idx--;
qptr = query + strlen(query) - (cmplen - 2);
- if (strncmp(qptr, rptr, (cmplen - 2)) == 0) {
+ if (strncmp(qptr, rptr, cmplen - 2) == 0) {
*wildp = true;
return 0;
}
return false;
}
- if ((new->flags &NODE_FLAG_IPV6_ADDRESS) &&
+ if ((new->flags & NODE_FLAG_IPV6_ADDRESS) &&
!(old->flags & NODE_FLAG_IPV6_ADDRESS))
{
return true;
*errp = str_printf(
"invalid rpz IP address \"%s\"; "
"invalid prefix length of %u",
- (optname ? optname : astr), prefix);
+ optname ? optname : astr, prefix);
}
return -1;
*errp = str_printf(
"invalid rpz IP address \"%s\"; "
"invalid prefix length of %u",
- (optname ? optname : astr), prefix);
+ optname ? optname : astr, prefix);
}
return -1;
/* No match. Instead, append. */
(*pnresults)++;
- *results = realloc(*results, (*pnresults * sizeof(**results)));
+ *results = realloc(*results, *pnresults * sizeof(**results));
if (*results == NULL) {
perror("realloc");
return NULL;
node->nrrs++;
- node->rrs = realloc(node->rrs, (node->nrrs * sizeof(*(node->rrs))));
+ node->rrs = realloc(node->rrs, node->nrrs * sizeof(*(node->rrs)));
if (node->rrs == NULL) {
perror("realloc");
exit(EXIT_FAILURE);
}
if (sptr == str) {
- strncat(pbuf, sptr, (end - sptr));
+ strncat(pbuf, sptr, end - sptr);
break;
}
- strncat(pbuf, sptr + 1, (end - (sptr + 1)));
+ strncat(pbuf, sptr + 1, end - (sptr + 1));
strcat(pbuf, ".");
end = sptr--;
}
(*pnzones)++;
- *pzones = realloc(*pzones, (*pnzones * sizeof(**pzones)));
+ *pzones = realloc(*pzones, *pnzones * sizeof(**pzones));
if (*pzones == NULL) {
perror("realloc");
exit(EXIT_FAILURE);
/* A special case of PASSTHRU (with trailing characters) */
if (nend != NULL &&
(strlen(databuf) == (size_t)(nend - nodebuf)) &&
- !strncmp(databuf, nodebuf, (nend - nodebuf)))
+ !strncmp(databuf, nodebuf, nend - nodebuf))
{
policy = LIBRPZ_POLICY_PASSTHRU;
}
* any matching static-stub zone without looking into the cache to honor
* the configuration on which server we should send queries to.
*/
- result =
- dns_view_find(adb->view, adbname->name, rdtype, now,
- DNS_DBFIND_GLUEOK | DNS_DBFIND_ADDITIONALOK, true,
- ((adbname->flags & DNS_ADBFIND_STARTATZONE) != 0),
- NULL, NULL, fname, &rdataset, NULL);
+ result = dns_view_find(adb->view, adbname->name, rdtype, now,
+ DNS_DBFIND_GLUEOK | DNS_DBFIND_ADDITIONALOK,
+ true,
+ (adbname->flags & DNS_ADBFIND_STARTATZONE) != 0,
+ NULL, NULL, fname, &rdataset, NULL);
switch (result) {
case DNS_R_GLUE:
if (address->family == AF_INET) {
(void)snprintf(textname, sizeof(textname),
"%u.%u.%u.%u.in-addr.arpa.",
- ((unsigned int)bytes[3] & 0xffU),
- ((unsigned int)bytes[2] & 0xffU),
- ((unsigned int)bytes[1] & 0xffU),
- ((unsigned int)bytes[0] & 0xffU));
+ (unsigned int)bytes[3] & 0xffU,
+ (unsigned int)bytes[2] & 0xffU,
+ (unsigned int)bytes[1] & 0xffU,
+ (unsigned int)bytes[0] & 0xffU);
} else if (address->family == AF_INET6) {
size_t remaining;
dispentry_log(resp, ISC_LOG_DEBUG(92),
"got valid DNS message header, /QR %c, id %u",
- (((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0'), id);
+ ((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0', id);
/*
* Look at the message flags. If it's a query, ignore it.
dispatch_log(disp, ISC_LOG_DEBUG(92),
"got valid DNS message header, /QR %c, id %u",
- (((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0'), id);
+ ((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0', id);
/*
* Look at the message flags. If it's a query, ignore it and keep
/* Try to read the public key. */
result = keyfromfile(kasp, directory, dnskey,
- (DST_TYPE_PUBLIC | DST_TYPE_STATE), mctx,
+ DST_TYPE_PUBLIC | DST_TYPE_STATE, mctx,
&pubkey);
if (result == ISC_R_FILENOTFOUND || result == ISC_R_NOPERM) {
result = ISC_R_SUCCESS;
}
/* Now read the private key. */
- result = keyfromfile(
- kasp, directory, dnskey,
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE),
- mctx, &privkey);
+ result = keyfromfile(kasp, directory, dnskey,
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
+ mctx, &privkey);
/*
* If the key was revoked and the private file
dst_key_setflags(dnskey,
flags & ~DNS_KEYFLAG_REVOKE);
result = keyfromfile(kasp, directory, dnskey,
- (DST_TYPE_PUBLIC |
- DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC |
+ DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
mctx, &privkey);
if (result == ISC_R_SUCCESS &&
dst_key_pubcompare(dnskey, privkey, false))
result2 = dst_key_getfilename(
dst_key_name(dnskey), dst_key_id(dnskey),
dst_key_alg(dnskey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
NULL, mctx, &buf);
if (result2 != ISC_R_SUCCESS) {
char namebuf[DNS_NAME_FORMATSIZE];
* @param mutex: pointer to the lock for the client handle
* @param log_ctx: NULL or resolver's context log messages
*/
-typedef librpz_clist_t *(librpz_clist_create_t)(librpz_emsg_t *emsg,
+typedef librpz_clist_t *(librpz_clist_create_t)(librpz_emsg_t * emsg,
librpz_mutex_t *lock,
librpz_mutex_t *unlock,
librpz_mutex_t *mutex_destroy,
* @param use_expired: true to not ignore expired zones
* @return client handle or NULL if the handle could not be created
*/
-typedef librpz_client_t *(librpz_client_create_t)(librpz_emsg_t *emsg,
+typedef librpz_client_t *(librpz_client_create_t)(librpz_emsg_t * emsg,
librpz_clist_t *clist,
const char *cstr,
bool use_expired);
* @param client context
* @return malloc'ed string or NULL after error
*/
-typedef char *(librpz_db_info_t)(librpz_emsg_t *emsg, bool license, bool cfiles,
- bool listens, librpz_rsp_t *rsp);
+typedef char *(librpz_db_info_t)(librpz_emsg_t * emsg, bool license,
+ bool cfiles, bool listens, librpz_rsp_t *rsp);
LIBDEF_F(db_info)
/**
* @param rsp state from librpz_itr_start()
* @return malloc'ed string or NULL after error
*/
-typedef char *(librpz_mf_stats_t)(librpz_emsg_t *emsg, librpz_rsp_t *rsp);
+typedef char *(librpz_mf_stats_t)(librpz_emsg_t * emsg, librpz_rsp_t *rsp);
LIBDEF_F(mf_stats)
/**
* @param[in,out] rsp: state from librpz_itr_start()
* @return malloc'ed string or NULL after error
*/
-typedef char *(librpz_vers_stats_t)(librpz_emsg_t *emsg, librpz_rsp_t *rsp);
+typedef char *(librpz_vers_stats_t)(librpz_emsg_t * emsg, librpz_rsp_t *rsp);
LIBDEF_F(vers_stats)
/**
* @param[in,out] rsp state from librpz_rsp_start()
* @return malloc'ed string or NULL after error
*/
-typedef char *(librpz_itr_zone_t)(librpz_emsg_t *emsg, bool all_zones,
+typedef char *(librpz_itr_zone_t)(librpz_emsg_t * emsg, bool all_zones,
librpz_rsp_t *rsp);
LIBDEF_F(itr_zone)
LIBDEF_F(domain_pton2)
typedef union socku socku_t;
-typedef socku_t *(librpz_mk_inet_su_t)(socku_t *su, const struct in_addr *addrp,
- in_port_t port);
+typedef socku_t *(librpz_mk_inet_su_t)(socku_t * su,
+ const struct in_addr *addrp,
+ in_port_t port);
LIBDEF_F(mk_inet_su)
-typedef socku_t *(librpz_mk_inet6_su_t)(socku_t *su,
+typedef socku_t *(librpz_mk_inet6_su_t)(socku_t * su,
const struct in6_addr *addrp,
uint32_t scope_id, in_port_t port);
LIBDEF_F(mk_inet6_su)
ret = dst_key_getnum(key, DST_NUM_LIFETIME, &lifetime);
if (ret == ISC_R_SUCCESS && lifetime > 0) {
dst_key_settime(key, DST_TIME_SYNCDELETE,
- (syncpublish + lifetime));
+ syncpublish + lifetime);
}
}
syncpub);
if (klifetime > 0) {
dst_key_settime(key->key, DST_TIME_SYNCDELETE,
- (syncpub + klifetime));
+ syncpub + klifetime);
}
}
}
ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
if (ret != ISC_R_SUCCESS) {
ksk = ((dst_key_flags(key->key) & DNS_KEYFLAG_KSK) != 0);
- dst_key_setbool(key->key, DST_BOOL_KSK, (ksk || csk));
+ dst_key_setbool(key->key, DST_BOOL_KSK, ksk || csk);
}
ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
if (ret != ISC_R_SUCCESS) {
zsk = ((dst_key_flags(key->key) & DNS_KEYFLAG_KSK) == 0);
- dst_key_setbool(key->key, DST_BOOL_ZSK, (zsk || csk));
+ dst_key_setbool(key->key, DST_BOOL_ZSK, zsk || csk);
}
/* Get time metadata. */
"DNSKEY %s (%s) (policy %s) in %u "
"seconds",
keystr, keymgr_keyrole(active_key->key),
- dns_kasp_getname(kasp), (prepub - now));
+ dns_kasp_getname(kasp), prepub - now);
}
}
if (prepub == 0 || prepub > now) {
{
bool found_match = false;
- keymgr_key_init(dkey, kasp, now, (numkeys == 1));
+ keymgr_key_init(dkey, kasp, now, numkeys == 1);
for (kkey = ISC_LIST_HEAD(dns_kasp_keys(kasp)); kkey != NULL;
kkey = ISC_LIST_NEXT(kkey, link))
"scheduled on "));
retire_time = keymgr_prepublication_time(
dkey, kasp,
- (retire_time - active_time),
- now);
+ retire_time - active_time, now);
} else {
RETERR(isc_buffer_printf(
buf, " Key will retire on "));
} else if (cnt % 8 == 0) {
printf(" |");
}
- printf(" %02x %c", *p, (isprint(*p) ? *p : ' '));
+ printf(" %02x %c", *p, isprint(*p) ? *p : ' ');
p++;
cnt++;
*optout = ((nsec3.flags &
DNS_NSEC3FLAG_OPTOUT) != 0);
(*logit)(arg, ISC_LOG_DEBUG(3),
- (*optout ? "NSEC3 indicates optout"
- : "NSEC3 indicates secure "
- "range"));
+ *optout ? "NSEC3 indicates optout"
+ : "NSEC3 indicates secure "
+ "range");
}
answer = ISC_R_SUCCESS;
}
*/
static bool
need_headerupdate(dns_slabheader_t *header, isc_stdtime_t now) {
- if (DNS_SLABHEADER_GETATTR(header, (DNS_SLABHEADERATTR_NONEXISTENT |
- DNS_SLABHEADERATTR_ANCIENT |
- DNS_SLABHEADERATTR_ZEROTTL)) != 0)
+ if (DNS_SLABHEADER_GETATTR(header,
+ DNS_SLABHEADERATTR_NONEXISTENT |
+ DNS_SLABHEADERATTR_ANCIENT |
+ DNS_SLABHEADERATTR_ZEROTTL) != 0)
{
return false;
}
*/
static bool
need_headerupdate(dns_slabheader_t *header, isc_stdtime_t now) {
- if (DNS_SLABHEADER_GETATTR(header, (DNS_SLABHEADERATTR_NONEXISTENT |
- DNS_SLABHEADERATTR_ANCIENT |
- DNS_SLABHEADERATTR_ZEROTTL)) != 0)
+ if (DNS_SLABHEADER_GETATTR(header,
+ DNS_SLABHEADERATTR_NONEXISTENT |
+ DNS_SLABHEADERATTR_ANCIENT |
+ DNS_SLABHEADERATTR_ZEROTTL) != 0)
{
return false;
}
s = alpn->base;
}
}
- if (svcb_ishttp(s, (alpn->base - s))) {
+ if (svcb_ishttp(s, alpn->base - s)) {
return true;
}
}
static isc_result_t
totext_opt(ARGS_TOTEXT) {
isc_region_t r;
- isc_region_t or ;
+ isc_region_t or;
uint16_t option;
uint16_t length;
char buf[sizeof("64000 64000")];
* If we accept expired RRsets keep them for no more than 120 seconds.
*/
if (acceptexpired &&
- (isc_serial_le(rrsig->timeexpire, ((now + 120) & 0xffffffff)) ||
+ (isc_serial_le(rrsig->timeexpire, (now + 120) & 0xffffffff) ||
isc_serial_le(rrsig->timeexpire, now)))
{
ttl = 120;
*/
tcurrent += (tcount * 4);
- offsettable = isc_mem_cget(mctx, (ocount + oncount),
+ offsettable = isc_mem_cget(mctx, ocount + oncount,
sizeof(unsigned int));
#endif /* if DNS_RDATASET_FIXED */
#if DNS_RDATASET_FIXED
fillin_offsets(offsetbase, offsettable, ocount + oncount);
- isc_mem_cput(mctx, offsettable, (ocount + oncount),
- sizeof(unsigned int));
+ isc_mem_cput(mctx, offsettable, ocount + oncount, sizeof(unsigned int));
#endif /* if DNS_RDATASET_FIXED */
INSIST(tcurrent == tstart + tlength);
dns_slabheader_copycase(dns_slabheader_t *dest, dns_slabheader_t *src) {
if (CASESET(src)) {
uint_least16_t attr = DNS_SLABHEADER_GETATTR(
- src, (DNS_SLABHEADERATTR_CASESET |
- DNS_SLABHEADERATTR_CASEFULLYLOWER));
+ src, DNS_SLABHEADERATTR_CASESET |
+ DNS_SLABHEADERATTR_CASEFULLYLOWER);
DNS_SLABHEADER_SETATTR(dest, attr);
memmove(dest->upper, src->upper, sizeof(src->upper));
}
atomic_init(&h->attributes, 0);
atomic_init(&h->last_refresh_fail_ts, 0);
- STATIC_ASSERT((sizeof(h->attributes) == 2),
+ STATIC_ASSERT(sizeof(h->attributes) == 2,
"The .attributes field of dns_slabheader_t needs to be "
"16-bit int type exactly.");
}
/*
* Clear cache bits.
*/
- FCTX_ATTR_CLR(fctx, (FCTX_ATTR_WANTNCACHE | FCTX_ATTR_WANTCACHE));
+ FCTX_ATTR_CLR(fctx, FCTX_ATTR_WANTNCACHE | FCTX_ATTR_WANTCACHE);
/*
* Did we get any answers?
}
bsize = sizeof(dns_rrl_block_t) +
- ISC_CHECKED_MUL((newsize - 1), sizeof(dns_rrl_entry_t));
+ ISC_CHECKED_MUL(newsize - 1, sizeof(dns_rrl_entry_t));
b = isc_mem_cget(rrl->mctx, 1, bsize);
b->size = bsize;
isc_mem_put(rrl->mctx, old_hash,
sizeof(*old_hash) +
- ISC_CHECKED_MUL((old_hash->length - 1),
+ ISC_CHECKED_MUL(old_hash->length - 1,
sizeof(old_hash->bins[0])));
rrl->old_hash = NULL;
}
new_bins = hash_divisor(new_bins);
hsize = sizeof(dns_rrl_hash_t) +
- ISC_CHECKED_MUL((new_bins - 1), sizeof(hash->bins[0]));
+ ISC_CHECKED_MUL(new_bins - 1, sizeof(hash->bins[0]));
hash = isc_mem_cget(rrl->mctx, 1, hsize);
hash->length = new_bins;
rrl->hash_gen ^= 1;
h = rrl->hash;
if (h != NULL) {
isc_mem_put(rrl->mctx, h,
- sizeof(*h) + ISC_CHECKED_MUL((h->length - 1),
+ sizeof(*h) + ISC_CHECKED_MUL(h->length - 1,
sizeof(h->bins[0])));
}
h = rrl->old_hash;
if (h != NULL) {
isc_mem_put(rrl->mctx, h,
- sizeof(*h) + ISC_CHECKED_MUL((h->length - 1),
+ sizeof(*h) + ISC_CHECKED_MUL(h->length - 1,
sizeof(h->bins[0])));
}
* Create rdtype statistics for the first 255 RRtypes,
* plus one additional for other RRtypes.
*/
- create_stats(mctx, dns_statstype_rdtype, (RDTYPECOUNTER_MAXTYPE + 1),
+ create_stats(mctx, dns_statstype_rdtype, RDTYPECOUNTER_MAXTYPE + 1,
statsp);
}
dns_rdatasetstats_create(isc_mem_t *mctx, dns_stats_t **statsp) {
REQUIRE(statsp != NULL && *statsp == NULL);
- create_stats(mctx, dns_statstype_rdataset, (RDTYPECOUNTER_MAXVAL + 1),
+ create_stats(mctx, dns_statstype_rdataset, RDTYPECOUNTER_MAXVAL + 1,
statsp);
}
uint32_t counter = isc_stats_get_counter(stats->counters, idx);
if (counter == kval) {
/* Match */
- isc_stats_increment(stats->counters, (idx + operation));
+ isc_stats_increment(stats->counters, idx + operation);
return;
}
}
uint32_t counter = isc_stats_get_counter(stats->counters, idx);
if (counter == 0) {
isc_stats_set(stats->counters, kval, idx);
- isc_stats_increment(stats->counters, (idx + operation));
+ isc_stats_increment(stats->counters, idx + operation);
return;
}
}
/* No room, grow stats storage. */
isc_stats_resize(&stats->counters,
- (num_keys * dnssecsign_block_size * 2));
+ num_keys * dnssecsign_block_size * 2);
/* Reset counters for new key (new index, nidx). */
int nidx = num_keys * dnssecsign_block_size;
isc_stats_set(stats->counters, kval, nidx);
- isc_stats_set(stats->counters, 0, (nidx + dns_dnssecsignstats_sign));
- isc_stats_set(stats->counters, 0, (nidx + dns_dnssecsignstats_refresh));
+ isc_stats_set(stats->counters, 0, nidx + dns_dnssecsignstats_sign);
+ isc_stats_set(stats->counters, 0, nidx + dns_dnssecsignstats_refresh);
/* And increment the counter for the given operation. */
- isc_stats_increment(stats->counters, (nidx + operation));
+ isc_stats_increment(stats->counters, nidx + operation);
}
void
/* Match */
isc_stats_set(stats->counters, 0, idx);
isc_stats_set(stats->counters, 0,
- (idx + dns_dnssecsignstats_sign));
+ idx + dns_dnssecsignstats_sign);
isc_stats_set(stats->counters, 0,
- (idx + dns_dnssecsignstats_refresh));
+ idx + dns_dnssecsignstats_refresh);
return;
}
}
continue;
}
- val = isc_stats_get_counter(stats, (idx + operation));
+ val = isc_stats_get_counter(stats, idx + operation);
if ((options & ISC_STATSDUMP_VERBOSE) == 0 && val == 0) {
continue;
}
x = 0;
if (weeks != 0) {
- RETERR(ttlfmt(weeks, "week", verbose, (x > 0), target));
+ RETERR(ttlfmt(weeks, "week", verbose, x > 0, target));
x++;
}
if (days != 0) {
- RETERR(ttlfmt(days, "day", verbose, (x > 0), target));
+ RETERR(ttlfmt(days, "day", verbose, x > 0, target));
x++;
}
if (hours != 0) {
- RETERR(ttlfmt(hours, "hour", verbose, (x > 0), target));
+ RETERR(ttlfmt(hours, "hour", verbose, x > 0, target));
x++;
}
if (mins != 0) {
- RETERR(ttlfmt(mins, "minute", verbose, (x > 0), target));
+ RETERR(ttlfmt(mins, "minute", verbose, x > 0, target));
x++;
}
if (secs != 0 || (weeks == 0 && days == 0 && hours == 0 && mins == 0)) {
- RETERR(ttlfmt(secs, "second", verbose, (x > 0), target));
+ RETERR(ttlfmt(secs, "second", verbose, x > 0, target));
x++;
}
INSIST(x > 0);
REQUIRE(argv != NULL && *argv == NULL);
LOCK_ZONE(zone);
- size = ISC_CHECKED_MUL((zone->db_argc + 1), sizeof(char *));
+ size = ISC_CHECKED_MUL(zone->db_argc + 1, sizeof(char *));
for (i = 0; i < zone->db_argc; i++) {
size += strlen(zone->db_argv[i]) + 1;
}
tmp = mem;
tmp2 = mem;
base = mem;
- tmp2 += ISC_CHECKED_MUL((zone->db_argc + 1), sizeof(char *));
+ tmp2 += ISC_CHECKED_MUL(zone->db_argc + 1, sizeof(char *));
for (i = 0; i < zone->db_argc; i++) {
*tmp++ = tmp2;
strlcpy(tmp2, zone->db_argv[i], size - (tmp2 - base));
/* Add to keytables. */
trusted++;
- trust_key(zone, name, &dnskey, (keydata.addhd == 0));
+ trust_key(zone, name, &dnskey, keydata.addhd == 0);
}
if (trusted == 0 && pending != 0) {
failure:
dns_diff_clear(&diff);
if (ver != NULL) {
- dns_db_closeversion(db, &ver, (result == ISC_R_SUCCESS));
+ dns_db_closeversion(db, &ver, result == ISC_R_SUCCESS);
}
INSIST(ver == NULL);
result = dst_key_fromfile(
dst_key_name(pubkey), dst_key_id(pubkey),
dst_key_alg(pubkey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE | DST_TYPE_STATE,
directory, mctx, &foundkey);
} else {
for (dns_kasp_key_t *kkey = ISC_LIST_HEAD(dns_kasp_keys(kasp));
result = dst_key_fromfile(
dst_key_name(pubkey), dst_key_id(pubkey),
dst_key_alg(pubkey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
directory, mctx, &foundkey);
if (result == ISC_R_SUCCESS) {
break;
result2 = dst_key_getfilename(
dst_key_name(pubkey), dst_key_id(pubkey),
dst_key_alg(pubkey),
- (DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
- DST_TYPE_STATE),
+ DST_TYPE_PUBLIC | DST_TYPE_PRIVATE |
+ DST_TYPE_STATE,
NULL, mctx, &buf);
if (result2 != ISC_R_SUCCESS) {
char namebuf[DNS_NAME_FORMATSIZE];
if (!dns_rdatatype_iskeymaterial(type)) {
bool warn = false, deleted = false;
- if (delsig_ok(&rrsig, keys, nkeys, (kasp != NULL),
- &warn))
+ if (delsig_ok(&rrsig, keys, nkeys, kasp != NULL, &warn))
{
result = update_one_rr(db, ver, zonediff->diff,
DNS_DIFFOP_DELRESIGN,
}
isc_log_write(dns_lctx, category, DNS_LOGMODULE_ZONE, level,
- "%s%s%s%s: %s", (prefix != NULL ? prefix : ""),
- (prefix != NULL ? ": " : ""), zstr, zone->strnamerd,
+ "%s%s%s%s: %s", prefix != NULL ? prefix : "",
+ prefix != NULL ? ": " : "", zstr, zone->strnamerd,
message);
}
addrbuf, isc_result_totext(result));
notify->flags |= DNS_NOTIFY_TCP;
dns_request_destroy(¬ify->request);
- notify_send_queue(notify, (notify->flags & DNS_NOTIFY_STARTUP));
+ notify_send_queue(notify, notify->flags & DNS_NOTIFY_STARTUP);
return;
} else if (result == ISC_R_TIMEDOUT) {
notify_log(notify->zone, ISC_LOG_WARNING,
case dns_dialuptype_no:
break;
case dns_dialuptype_yes:
- DNS_ZONE_SETFLAG(zone, (DNS_ZONEFLG_DIALNOTIFY |
- DNS_ZONEFLG_DIALREFRESH |
- DNS_ZONEFLG_NOREFRESH));
+ DNS_ZONE_SETFLAG(zone, DNS_ZONEFLG_DIALNOTIFY |
+ DNS_ZONEFLG_DIALREFRESH |
+ DNS_ZONEFLG_NOREFRESH);
break;
case dns_dialuptype_notify:
DNS_ZONE_SETFLAG(zone, DNS_ZONEFLG_DIALNOTIFY);
CHECK(dns_diff_apply(&diff, db, ver));
CHECK(clean_nsec3param(zone, db, ver, &diff));
CHECK(add_signing_records(db, zone->privatetype, ver,
- &diff, (newalg || fullsign)));
+ &diff, newalg || fullsign));
CHECK(update_soa_serial(zone, db, ver, &diff, mctx,
zone->updatemethod));
CHECK(add_chains(zone, db, ver, &diff));
isc_buffer_init(&b, kd->data, sizeof(kd->data));
isc_buffer_putuint8(&b, alg);
isc_buffer_putuint8(&b, (keyid & 0xff00) >> 8);
- isc_buffer_putuint8(&b, (keyid & 0xff));
+ isc_buffer_putuint8(&b, keyid & 0xff);
isc_buffer_putuint8(&b, 0);
isc_buffer_putuint8(&b, 1);
}
"setserial: desired serial (%u) "
"out of range (%u-%u)",
desired, oldserial + 1,
- (oldserial + 0x7fffffff));
+ oldserial + 0x7fffffff);
}
goto failure;
}
}
send_req = proxyudp_get_send_req(sock->worker->mctx, sock, handle,
- (sock->client ? region : NULL), cb,
+ sock->client ? region : NULL, cb,
cbarg);
if (sock->client) {
isc_region_t send_data = { 0 };
}
append_type_and_length(outbuf, (uint8_t)tlv_type,
- ((uint16_t)tlv_data->length), true);
+ (uint16_t)tlv_data->length, true);
if (tlv_data->length > 0) {
isc_result_t result = isc_proxy2_header_append(outbuf,
return ISC_R_RANGE;
}
- append_type_and_length(outbuf, (uint8_t)type, ((uint16_t)data->length),
+ append_type_and_length(outbuf, (uint8_t)type, (uint16_t)data->length,
false);
if (data->length > 0) {
}
/* I know the better way, but for now. */
for (j = 0; j < 8; j++) {
- if (BIT_TEST(r, (0x80 >> j))) {
+ if (BIT_TEST(r, 0x80 >> j)) {
break;
}
}
[ISCCC_R_MAXDEPTH] = "ISCCC_R_MAXDEPTH",
};
-STATIC_ASSERT((DNS_R_SERVFAIL - DNS_R_NOERROR == 2),
+STATIC_ASSERT(DNS_R_SERVFAIL - DNS_R_NOERROR == 2,
"DNS_R_NOERROR has wrong value");
-STATIC_ASSERT((DNS_R_BADVERS - DNS_R_NOERROR == 16),
+STATIC_ASSERT(DNS_R_BADVERS - DNS_R_NOERROR == 16,
"DNS_R_BADVERS has wrong value");
-STATIC_ASSERT((ISC_R_NRESULTS < INT32_MAX), "result.h enum too big");
+STATIC_ASSERT(ISC_R_NRESULTS < INT32_MAX, "result.h enum too big");
const char *
isc_result_totext(isc_result_t result) {
if (default_kasp != NULL && dns_kasp_nsec3(default_kasp)) {
dns_kasp_setnsec3param(
kasp, dns_kasp_nsec3iter(default_kasp),
- (dns_kasp_nsec3flags(default_kasp) == 0x01),
+ dns_kasp_nsec3flags(default_kasp) == 0x01,
dns_kasp_nsec3saltlen(default_kasp));
} else {
dns_kasp_setnsec3(kasp, false);
isc_lex_create(pctx->mctx, 1024, &pctx->lexer);
isc_lex_setspecials(pctx->lexer, specials);
- isc_lex_setcomments(pctx->lexer,
- (ISC_LEXCOMMENT_C | ISC_LEXCOMMENT_CPLUSPLUS |
- ISC_LEXCOMMENT_SHELL));
+ isc_lex_setcomments(pctx->lexer, ISC_LEXCOMMENT_C |
+ ISC_LEXCOMMENT_CPLUSPLUS |
+ ISC_LEXCOMMENT_SHELL);
CHECK(cfg_create_list(pctx, &cfg_type_filelist, &pctx->open_files));
CHECK(cfg_create_list(pctx, &cfg_type_filelist, &pctx->closed_files));
if (alwaysvalid) {
now = when;
}
- if (isc_serial_gt(when, (now + 300)) /* In the future. */ ||
- isc_serial_lt(when, (now - 3600)) /* In the past. */)
+ if (isc_serial_gt(when, now + 300) /* In the future. */ ||
+ isc_serial_lt(when, now - 3600) /* In the past. */)
{
client->attributes |= NS_CLIENTATTR_BADCOOKIE;
ns_stats_increment(client->manager->sctx->nsstats,
#ifdef USE_DNSRPS
if (st->popt.dnsrps_enabled && st->m.policy != DNS_RPZ_POLICY_ERROR &&
!dnsrps_set_p(&emsg, client, st, qtype, &rdataset,
- (qresult_type != qresult_type_recurse)))
+ qresult_type != qresult_type_recurse))
{
rpz_log_fail(client, DNS_RPZ_ERROR_LEVEL, NULL,
DNS_RPZ_TYPE_BAD, emsg.c, DNS_R_SERVFAIL);
nloops = zipf ? bctx->nloops : bctx->readers + bctx->mutate;
for (uint32_t t = 0; t < nloops; t++) {
struct thread_args *tp = &thread[t];
- elapsed = ISC_MAX(elapsed, (tp->stop - tp->start));
+ elapsed = ISC_MAX(elapsed, tp->stop - tp->start);
bool mut = t < bctx->mutate;
stats[mut].worked += tp->worked;
result = isc_file_getsizefd(fileno(fp), &size);
assert_int_equal(result, ISC_R_SUCCESS);
- data = isc_mem_get(mctx, (size + 1));
+ data = isc_mem_get(mctx, size + 1);
assert_non_null(data);
len = (size_t)size;
result = isc_file_getsizefd(fileno(fp), &size);
assert_int_equal(result, ISC_R_SUCCESS);
- data = isc_mem_get(mctx, (size + 1));
+ data = isc_mem_get(mctx, size + 1);
assert_non_null(data);
p = data;
testcases[i].name2, h2);
}
- assert_int_equal((h1 == h2), testcases[i].expect);
+ assert_int_equal(h1 == h2, testcases[i].expect);
/* Now case-sensitive */
h1 = dns_name_hash(n1);
testcases[i].name2, h2);
}
- assert_int_equal((h1 == h2), testcases[i].expect);
+ assert_int_equal(h1 == h2, testcases[i].expect);
}
}
ISC_LIST_APPEND(dnskeylist->rdata, &test_bundles[bnum].ksk, link);
dns_rdatalist_tordataset(dnskeylist, dnskeyset);
dns_rdata_init(&test_bundles[bnum].dnskey_rrsig);
- sign_rrset(fp, btime, (btime + LIFETIME), dnskeyset,
+ sign_rrset(fp, btime, btime + LIFETIME, dnskeyset,
test_bundles[bnum].rrsig1buf,
&test_bundles[bnum].dnskey_rrsig);
for (dns_rdata_t *rd = ISC_LIST_HEAD(dnskeylist->rdata); rd != NULL;
ISC_LIST_APPEND(cdnskeylist->rdata, &test_bundles[bnum].cdnskey, link);
dns_rdatalist_tordataset(cdnskeylist, cdnskeyset);
dns_rdata_init(&test_bundles[bnum].cdnskey_rrsig);
- sign_rrset(fp, btime, (btime + LIFETIME), cdnskeyset,
+ sign_rrset(fp, btime, btime + LIFETIME, cdnskeyset,
test_bundles[bnum].rrsig2buf,
&test_bundles[bnum].cdnskey_rrsig);
for (dns_rdata_t *rd = ISC_LIST_HEAD(cdnskeylist->rdata); rd != NULL;
ISC_LIST_APPEND(cdslist->rdata, &test_bundles[bnum].cds, link);
dns_rdatalist_tordataset(cdslist, cdsset);
dns_rdata_init(&test_bundles[bnum].cds_rrsig);
- sign_rrset(fp, btime, (btime + LIFETIME), cdsset,
+ sign_rrset(fp, btime, btime + LIFETIME, cdsset,
test_bundles[bnum].rrsig3buf, &test_bundles[bnum].cds_rrsig);
for (dns_rdata_t *rd = ISC_LIST_HEAD(cdslist->rdata); rd != NULL;
rd = ISC_LIST_HEAD(cdslist->rdata))
char hex[16 + 1];
snprintf(hex, sizeof(hex), "%016" PRIX64, crc);
- assert_memory_equal(hex, result, (result ? strlen(result) : 0));
+ assert_memory_equal(hex, result, result ? strlen(result) : 0);
}
/* 64-bit cyclic redundancy check */
assert_return_code(res, ISC_R_SUCCESS);
- assert_memory_equal(hexdigest, result, (result ? strlen(result) : 0));
+ assert_memory_equal(hexdigest, result, result ? strlen(result) : 0);
assert_int_equal(isc_hmac_reset(hmac_st), ISC_R_SUCCESS);
}
assert_return_code(res, ISC_R_SUCCESS);
- assert_memory_equal(hexdigest, result, (result ? strlen(result) : 0));
+ assert_memory_equal(hexdigest, result, result ? strlen(result) : 0);
assert_int_equal(isc_md_reset(md), ISC_R_SUCCESS);
}
do_cconnects_shutdown(loopmgr);
} else if (do_send) {
isc_async_current(stream_recv_send_connect,
- (cbarg == NULL
- ? get_stream_connect_function()
- : (stream_connect_function)cbarg));
+ cbarg == NULL
+ ? get_stream_connect_function()
+ : (stream_connect_function)cbarg);
}
isc_refcount_increment0(&active_creads);