size_t nsec_i;
ldns_rr *nsec;
ldns_rdf *result = NULL;
- qtype = qtype;
if (!qname || !nsec3s || ldns_rr_list_rr_count(nsec3s) < 1) {
return NULL;
ldns_status status;
int on_delegation_point;
- flags = flags;
-
if (!from) {
return NULL;
}
}
int
-ldns_dnssec_default_add_to_signatures(ldns_rr *sig, void *n)
+ldns_dnssec_default_add_to_signatures( ATTR_UNUSED(ldns_rr *sig)
+ , ATTR_UNUSED(void *n)
+ )
{
- sig = sig;
- n = n;
return LDNS_SIGNATURE_LEAVE_ADD_NEW;
}
int
-ldns_dnssec_default_leave_signatures(ldns_rr *sig, void *n)
+ldns_dnssec_default_leave_signatures( ATTR_UNUSED(ldns_rr *sig)
+ , ATTR_UNUSED(void *n)
+ )
{
- sig = sig;
- n = n;
return LDNS_SIGNATURE_LEAVE_NO_ADD;
}
int
-ldns_dnssec_default_delete_signatures(ldns_rr *sig, void *n)
+ldns_dnssec_default_delete_signatures( ATTR_UNUSED(ldns_rr *sig)
+ , ATTR_UNUSED(void *n)
+ )
{
- sig = sig;
- n = n;
return LDNS_SIGNATURE_REMOVE_NO_ADD;
}
int
-ldns_dnssec_default_replace_signatures(ldns_rr *sig, void *n)
+ldns_dnssec_default_replace_signatures( ATTR_UNUSED(ldns_rr *sig)
+ , ATTR_UNUSED(void *n)
+ )
{
- sig = sig;
- n = n;
return LDNS_SIGNATURE_REMOVE_ADD_NEW;
}
#endif /* HAVE_SSL */
ldns_dnssec_rrs *
-ldns_dnssec_remove_signatures(ldns_dnssec_rrs *signatures,
- ldns_key_list *key_list,
- int (*func)(ldns_rr *, void *),
- void *arg)
+ldns_dnssec_remove_signatures( ldns_dnssec_rrs *signatures
+ , ATTR_UNUSED(ldns_key_list *key_list)
+ , int (*func)(ldns_rr *, void *)
+ , void *arg
+ )
{
ldns_dnssec_rrs *base_rrs = signatures;
ldns_dnssec_rrs *cur_rr = base_rrs;
uint16_t keytag;
size_t i;
- key_list = key_list;
-
if (!cur_rr) {
switch(func(NULL, arg)) {
case LDNS_SIGNATURE_LEAVE_ADD_NEW:
}
ldns_status
-ldns_dnssec_zone_create_rrsigs_flg(ldns_dnssec_zone *zone,
- ldns_rr_list *new_rrs,
- ldns_key_list *key_list,
- int (*func)(ldns_rr *, void*),
- void *arg,
- int flags)
+ldns_dnssec_zone_create_rrsigs_flg( ATTR_UNUSED(ldns_dnssec_zone *zone)
+ , ATTR_UNUSED(ldns_rr_list *new_rrs)
+ , ATTR_UNUSED(ldns_key_list *key_list)
+ , int (*func)(ldns_rr *, void*)
+ , void *arg
+ , int flags
+ )
{
ldns_status result = LDNS_STATUS_OK;
int on_delegation_point = 0; /* handle partially occluded names */
ldns_rr_list *pubkey_list = ldns_rr_list_new();
- zone = zone;
- new_rrs = new_rrs;
- key_list = key_list;
for (i = 0; i<ldns_key_list_key_count(key_list); i++) {
- ldns_rr_list_push_rr(pubkey_list,
- ldns_key2rr(ldns_key_list_key(key_list, i)));
+ ldns_rr_list_push_rr( pubkey_list
+ , ldns_key2rr(ldns_key_list_key(
+ key_list, i))
+ );
}
/* TODO: callback to see is list should be signed */
/* TODO: remove 'old' signatures from signature list */
#ifdef HAVE_SSL
ldns_status
-ldns_dnssec_verify_denial_nsec3_match(ldns_rr *rr,
- ldns_rr_list *nsecs,
- ldns_rr_list *rrsigs,
- ldns_pkt_rcode packet_rcode,
- ldns_rr_type packet_qtype,
- bool packet_nodata,
- ldns_rr **match)
+ldns_dnssec_verify_denial_nsec3_match( ldns_rr *rr
+ , ldns_rr_list *nsecs
+ , ATTR_UNUSED(ldns_rr_list *rrsigs)
+ , ldns_pkt_rcode packet_rcode
+ , ldns_rr_type packet_qtype
+ , bool packet_nodata
+ , ldns_rr **match
+ )
{
ldns_rdf *closest_encloser;
ldns_rdf *wildcard;
size_t i;
ldns_status result = LDNS_STATUS_DNSSEC_NSEC_RR_NOT_COVERED;
- rrsigs = rrsigs;
-
if (match) {
*match = NULL;
}
}
DSA *
-ldns_key_new_frm_fp_dsa_l(FILE *f, int *line_nr)
+ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr))
{
int i;
char *d;
DSA *dsa;
uint8_t *buf;
- line_nr = line_nr;
-
d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
buf = LDNS_XMALLOC(uint8_t, LDNS_MAX_LINELEN);
dsa = DSA_new();
}
unsigned char *
-ldns_key_new_frm_fp_hmac_l(FILE *f, int *line_nr, size_t *hmac_size)
+ldns_key_new_frm_fp_hmac_l( FILE *f
+ , ATTR_UNUSED(int *line_nr)
+ , size_t *hmac_size
+ )
{
size_t i;
char *d;
unsigned char *buf;
- line_nr = line_nr;
-
d = LDNS_XMALLOC(char, LDNS_MAX_LINELEN);
buf = LDNS_XMALLOC(unsigned char, LDNS_MAX_LINELEN);
if(!d || !buf) {
}
void
-ldns_fskipc(FILE *fp, char c)
+ldns_fskipc(ATTR_UNUSED(FILE *fp), ATTR_UNUSED(char c))
{
- fp = fp;
- c = c;
}
}
ldns_status
-ldns_str2rdf_unknown(ldns_rdf **rd, const char *str)
+ldns_str2rdf_unknown( ATTR_UNUSED(ldns_rdf **rd)
+ , ATTR_UNUSED(const char *str)
+ )
{
/* this should be caught in an earlier time (general str2host for
rr's */
- rd = rd;
- str = str;
return LDNS_STATUS_NOT_IMPL;
}
ldns_status
-ldns_str2rdf_tsig(ldns_rdf **rd, const char *str)
+ldns_str2rdf_tsig( ATTR_UNUSED(ldns_rdf **rd)
+ , ATTR_UNUSED(const char *str)
+ )
{
/* there is no strign representation for TSIG rrs */
- rd = rd;
- str = str;
return LDNS_STATUS_NOT_IMPL;
}
ldns_status
-ldns_str2rdf_service(ldns_rdf **rd, const char *str)
+ldns_str2rdf_service( ATTR_UNUSED(ldns_rdf **rd)
+ , ATTR_UNUSED(const char *str)
+ )
{
/* is this used? is this actually WKS? or SRV? */
- rd = rd;
- str = str;
return LDNS_STATUS_NOT_IMPL;
}