Thanks Emil Natan
* bugfix #617: Retry WKS service and protocol names lower case.
Thanks Siali Yan
+ * Spelling errors in binaries and man pages
+ Thanks Andreas Schulze
1.7.0 2016-12-20
* Fix lookup of relative names in ldns_resolver_search.
ldns_rdf_set_size, ldns_rdf_set_type, ldns_rdf_set_data | ldns_rdf - set rdf attributes
ldns_rdf_size, ldns_rdf_get_type, ldns_rdf_data, ldns_rdf_compare | ldns_rdf - get rdf attributes
ldns_rdf_new, ldns_rdf_clone, ldns_rdf_new_frm_data, ldns_rdf_new_frm_str, ldns_rdf_new_frm_fp, ldns_rdf_free, ldns_rdf_deep_free, ldns_rdf_print | ldns_rdf - ldns_rdf creation, destruction and printing
-ldns_native2rdf_int8, ldns_native2rdf_int16, ldns_native2rdf_int32, ldns_native2rdf_int16_data, ldns_rdf2native_int8, ldns_rdf2native_int16, ldns_rdf2native_int32, ldns_rdf2native_sockaddr_storage, ldns_rdf2native_time_t | ldns_rdf - rdf numeric converion functions
+ldns_native2rdf_int8, ldns_native2rdf_int16, ldns_native2rdf_int32, ldns_native2rdf_int16_data, ldns_rdf2native_int8, ldns_rdf2native_int16, ldns_rdf2native_int32, ldns_rdf2native_sockaddr_storage, ldns_rdf2native_time_t | ldns_rdf - rdf numeric conversion functions
ldns_rdf_address_reverse | ldns_rdf - reverse an address rdf
ldns_octet | ldns_rdf - removes escaped from the input
# why is this in rdata.h?
.SH DESCRIPTION
\fBdrill\fR is a tool to designed to get all sorts of information out of the
-DNS. It is specificly designed to be used with DNSSEC.
+DNS. It is specifically designed to be used with DNSSEC.
.PP
The name \fBdrill\fR is a pun on \fBdig\fR. With \fBdrill\fR you should be able
get even more information than with \fBdig\fR.
* error.c
*
* error reporting routines
- * basicly wrappers around printf
+ * basically wrappers around printf
*
* (c) 2005 NLnet Labs
*
{ LDNS_STATUS_NETWORK_ERR, "Could not send or receive, because of network error" },
{ LDNS_STATUS_ADDRESS_ERR, "Could not start AXFR, because of address error" },
{ LDNS_STATUS_FILE_ERR, "Could not open the files" },
- { LDNS_STATUS_UNKNOWN_INET, "Uknown address family" },
+ { LDNS_STATUS_UNKNOWN_INET, "Unknown address family" },
{ LDNS_STATUS_NOT_IMPL, "This function is not implemented (yet), please notify the developers - or not..." },
{ LDNS_STATUS_NULL, "Supplied value pointer null" },
{ LDNS_STATUS_CRYPTO_UNKNOWN_ALGO, "Unknown cryptographic algorithm" },
.SH DESCRIPTION
\fBldns-compare-zones\fR reads two DNS zone files and prints number of differences.
.nf
-Output is formated to:
+Output is formatted to:
+NUM_INS \-NUM_DEL ~NUM_CHG
.fi
* types "Service certificate constraint" are replaced with
* "Domain-issued certificate".
*
- * This to check what would happen if PKIX validation was successfull always.
+ * This to check what would happen if PKIX validation was successful always.
*/
static ldns_rr_list*
dane_no_pkix_transform(const ldns_rr_list* tlas)
.IR TRACEFILE
.SH DESCRIPTION
-\fBdpa\fR is used to analyze dns packets in trace files. It has 3 main options: count, filter, and count uniques (i.e. count all different occurences).
+\fBdpa\fR is used to analyze dns packets in trace files. It has 3 main options: count, filter, and count uniques (i.e. count all different occurrences).
.SH OPTIONS
.TP
.TP
\fB-u\fR \fImatchnamelist\fR
-Count every occurence of every value of the matchname (for instance, count all packetsizes, see EXAMPLES in ldns-dpa(1) ).
+Count every occurrence of every value of the matchname (for instance, count all packetsizes, see EXAMPLES in ldns-dpa(1) ).
.TP
\fB-ua\fR
fprintf(output, "\t-u <matchnamelist>:\tCount all occurrences of matchname\n");
fprintf(output, "\t-ua:\t\tShow average value of every -u matchname\n");
fprintf(output, "\t-uac:\t\tShow average count of every -u matchname\n");
- fprintf(output, "\t-um <number>:\tOnly show -u results that occured more than number times\n");
+ fprintf(output, "\t-um <number>:\tOnly show -u results that occurred more than number times\n");
fprintf(output, "\t-v <level>:\tbe more verbose\n");
fprintf(output, "\t-notip <file>:\tDump pcap packets that were not recognized as\n\t\t\tIP packets to file\n");
fprintf(output, "\t-baddns <file>:\tDump mangled dns packets to file\n");
.TP
\fB-S\fR \fI[[+|0]number | YYYYMMDDxx | unixtime ]\fR
Set serial number to the given \fInumber\fR, or when preceded by a sign,
-offset the exisiting number with it. When giving the literal strings
+offset the existing number with it. When giving the literal strings
\fIYYYYMMDDxx\fR or \fIunixtime\fR, the serial number is tried to be reset
in datecounter or in unixtime format respectively. Though is the updated serial
number is smaller than the original one, the original one is simply
fprintf(f, " -n NUMBER\tsplit after this many RRs\n");
fprintf(f, " -o ORIGIN\tuse this as initial origin, for zones starting with @\n");
fprintf(f, " -z\t\tsort the zone prior to splitting. The current ldns zone\n");
- fprintf(f, " \t\timplementation makes this unuseable for large zones.\n");
+ fprintf(f, " \t\timplementation makes this unusable for large zones.\n");
fprintf(f, " -v\t\tshow version number and exit\n");
}
*
* \param[out] tlsa_owner The created dname.
* \param[in] name The dname that should be prefixed.
- * \param[in] port The service port number for wich the name should be created.
+ * \param[in] port The service port number for which the name should be created.
* \param[in] transport The transport for which the name should be created.
* \return LDNS_STATUS_OK on success or an error code otherwise.
*/
void ldns_dname2canonical(const ldns_rdf *rdf);
/**
- * test wether the name sub falls under parent (i.e. is a subdomain
+ * test whether the name sub falls under parent (i.e. is a subdomain
* of parent). This function will return false if the given dnames are
* equal.
* \param[in] sub the name to test
* \param[in] rrset the rrset
* \param[in] rrsig the rrsig to verify
* \param[in] key the key to use
- * \return status message wether verification succeeded.
+ * \return status message whether verification succeeded.
*/
ldns_status ldns_verify_rrsig(ldns_rr_list *rrset,
ldns_rr *rrsig,
* \param[in] rrsig the rrsig to verify
* \param[in] key the key to use
* \param[in] check_time the time for which the validation is performed
- * \return status message wether verification succeeded.
+ * \return status message whether verification succeeded.
*/
ldns_status ldns_verify_rrsig_time(
ldns_rr_list *rrset, ldns_rr *rrsig,
* \param[in] p packet to copy to
* \param[in] r resolver to copy from
*
- * \return status wether successfull or not
+ * \return status whether successful or not
*/
ldns_status ldns_update_pkt_tsig_add(ldns_pkt *p, const ldns_resolver *r);
{
/** the soa defines a zone */
ldns_rr *_soa;
- /* basicly a zone is a list of rr's */
+ /* basically a zone is a list of rr's */
ldns_rr_list *_rrs;
/* we could change this to be a b-tree etc etc todo */
};