named_g_memstatistics = cfg_obj_asboolean(obj);
} else {
named_g_memstatistics =
- (isc_mem_debugging & ISC_MEM_DEBUGRECORD);
+ ((isc_mem_debugging & ISC_MEM_DEBUGRECORD) != 0);
}
obj = NULL;
/* Security */
secure = dns_db_issecure(db);
- allow = (dns_zone_getkeyopts(zone) & DNS_ZONEKEY_ALLOW);
- maintain = (dns_zone_getkeyopts(zone) & DNS_ZONEKEY_MAINTAIN);
+ allow = ((dns_zone_getkeyopts(zone) & DNS_ZONEKEY_ALLOW) != 0);
+ maintain = ((dns_zone_getkeyopts(zone) & DNS_ZONEKEY_MAINTAIN) != 0);
/* Master files */
file = dns_zone_getfile(mayberaw);
snprintf(buf, sizeof(buf), "\n\talgorithm: %s", alg);
CHECK(putstr(text, buf));
- revoked = (kd.flags & DNS_KEYFLAG_REVOKE);
+ revoked = ((kd.flags & DNS_KEYFLAG_REVOKE) != 0);
snprintf(buf, sizeof(buf), "\n\tflags:%s%s%s",
revoked ? " REVOKE" : "",
((kd.flags & DNS_KEYFLAG_KSK) != 0)
bucket = DNS_ADB_INVALIDBUCKET;
- if (find->options & DNS_ADBFIND_INET) {
+ if ((find->options & DNS_ADBFIND_INET) != 0) {
namehook = ISC_LIST_HEAD(name->v4);
while (namehook != NULL) {
entry = namehook->entry;
}
}
- if (find->options & DNS_ADBFIND_INET6) {
+ if ((find->options & DNS_ADBFIND_INET6) != 0) {
namehook = ISC_LIST_HEAD(name->v6);
while (namehook != NULL) {
entry = namehook->entry;
result = dns_view_find(adb->view, &adbname->name, rdtype, now,
NAME_GLUEOK(adbname) ? DNS_DBFIND_GLUEOK : 0,
NAME_HINTOK(adbname),
- (adbname->flags & NAME_STARTATZONE) != 0 ?
- true : false,
+ ((adbname->flags & NAME_STARTATZONE) != 0),
NULL, NULL, fname, &rdataset, NULL);
/* XXXVIX this switch statement is too sparse to gen a jump table. */
mctx = client->mctx;
rdataset = NULL;
sigrdataset = NULL;
- want_dnssec = !(options & DNS_CLIENTRESOPT_NODNSSEC);
- want_validation = !(options & DNS_CLIENTRESOPT_NOVALIDATE);
- want_cdflag = !(options & DNS_CLIENTRESOPT_NOCDFLAG);
- want_tcp = (options & DNS_CLIENTRESOPT_TCP);
+ want_dnssec = ((options & DNS_CLIENTRESOPT_NODNSSEC) == 0);
+ want_validation = ((options & DNS_CLIENTRESOPT_NOVALIDATE) == 0);
+ want_cdflag = ((options & DNS_CLIENTRESOPT_NOCDFLAG) == 0);
+ want_tcp = ((options & DNS_CLIENTRESOPT_TCP) != 0);
/*
* Prepare some intermediate resources
if (result != ISC_R_SUCCESS)
return (result);
- want_tcp = (options & DNS_CLIENTUPDOPT_TCP);
+ want_tcp = ((options & DNS_CLIENTUPDOPT_TCP) != 0);
/*
* Create a context and prepare some resources.
dispatch_log(disp, LVL(92),
"got valid DNS message header, /QR %c, id %u",
- ((flags & DNS_MESSAGEFLAG_QR) ? '1' : '0'), id);
+ (((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0'), id);
/*
* Look at flags. If query, drop it. If response,
dispatch_log(disp, LVL(92),
"got valid DNS message header, /QR %c, id %u",
- ((flags & DNS_MESSAGEFLAG_QR) ? '1' : '0'), id);
+ (((flags & DNS_MESSAGEFLAG_QR) != 0) ? '1' : '0'), id);
/*
* Allocate an event to send to the query or response client, and
LIBDNS_EXTERNAL_DATA isc_stats_t *dns_dnssec_stats;
-#define is_response(msg) (msg->flags & DNS_MESSAGEFLAG_QR)
+#define is_response(msg) ((msg->flags & DNS_MESSAGEFLAG_QR) != 0)
#define RETERR(x) do { \
result = (x); \
* Is the key allowed to sign data?
*/
flags = dst_key_flags(key);
- if (flags & DNS_KEYTYPE_NOAUTH)
+ if ((flags & DNS_KEYTYPE_NOAUTH) != 0) {
return (DNS_R_KEYUNAUTHORIZED);
- if ((flags & DNS_KEYFLAG_OWNERMASK) != DNS_KEYOWNER_ZONE)
+ }
+ if ((flags & DNS_KEYFLAG_OWNERMASK) != DNS_KEYOWNER_ZONE) {
return (DNS_R_KEYUNAUTHORIZED);
+ }
sig.mctx = mctx;
sig.common.rdclass = set->rdclass;
* Is the key allowed to sign data?
*/
flags = dst_key_flags(key);
- if (flags & DNS_KEYTYPE_NOAUTH) {
+ if ((flags & DNS_KEYTYPE_NOAUTH) != 0) {
inc_stat(dns_dnssecstats_fail);
return (DNS_R_KEYUNAUTHORIZED);
}
dk->index = 0;
/* KSK or ZSK? */
- dk->ksk = (dst_key_flags(dk->key) & DNS_KEYFLAG_KSK);
+ dk->ksk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) != 0);
/* Is this an old-style key? */
result = dst_key_getprivateformat(dk->key, &major, &minor);
if (key->func->tofile == NULL)
return (DST_R_UNSUPPORTEDALG);
- if (type & DST_TYPE_PUBLIC) {
+ if ((type & DST_TYPE_PUBLIC) != 0) {
ret = write_public_key(key, type, directory);
if (ret != ISC_R_SUCCESS)
return (ret);
}
- if ((type & DST_TYPE_PRIVATE) &&
+ if (((type & DST_TYPE_PRIVATE) != 0) &&
(key->key_flags & DNS_KEYFLAG_TYPEMASK) != DNS_KEYTYPE_NOKEY)
return (key->func->tofile(key, directory));
else
isc_buffer_putuint8(target, (uint8_t)key->key_proto);
isc_buffer_putuint8(target, (uint8_t)key->key_alg);
- if (key->key_flags & DNS_KEYFLAG_EXTENDED) {
+ if ((key->key_flags & DNS_KEYFLAG_EXTENDED) != 0) {
if (isc_buffer_availablelength(target) < 2)
return (ISC_R_NOSPACE);
isc_buffer_putuint16(target,
id = dst_region_computeid(&r, alg);
rid = dst_region_computerid(&r, alg);
- if (flags & DNS_KEYFLAG_EXTENDED) {
+ if ((flags & DNS_KEYFLAG_EXTENDED) != 0) {
if (isc_buffer_remaininglength(source) < 2)
return (DST_R_INVALIDPUBLICKEY);
extflags = isc_buffer_getuint16(source);
raw += 2;
#endif
if (rdataset->type == dns_rdatatype_rrsig) {
- if (*raw & DNS_RDATASLAB_OFFLINE)
+ if ((*raw & DNS_RDATASLAB_OFFLINE) != 0)
flags |= DNS_RDATA_OFFLINE;
length--;
raw++;
journal_pos_decode(&raw->h.end, &cooked->end);
cooked->index_size = decode_uint32(raw->h.index_size);
cooked->sourceserial = decode_uint32(raw->h.sourceserial);
- cooked->serialset = (raw->h.flags & JOURNAL_SERIALSET);
+ cooked->serialset = ((raw->h.flags & JOURNAL_SERIALSET) != 0);
}
static void
journal_pos_encode(&raw->h.end, &cooked->end);
encode_uint32(cooked->index_size, raw->h.index_size);
encode_uint32(cooked->sourceserial, raw->h.sourceserial);
- if (cooked->serialset)
+ if (cooked->serialset) {
flags |= JOURNAL_SERIALSET;
+ }
raw->h.flags = flags;
}
char backup[1024];
bool writable, create;
- create = (mode & DNS_JOURNAL_CREATE);
- writable = (mode & (DNS_JOURNAL_WRITE|DNS_JOURNAL_CREATE));
+ create = ((mode & DNS_JOURNAL_CREATE) != 0);
+ writable = ((mode & (DNS_JOURNAL_WRITE|DNS_JOURNAL_CREATE)) != 0);
result = journal_open(mctx, filename, writable, create, journalp);
if (result == ISC_R_NOTFOUND) {
isc_lex_setcomments(lctx->lex, ISC_LEXCOMMENT_DNSMASTERFILE);
}
- lctx->ttl_known = (options & DNS_MASTER_NOTTL);
+ lctx->ttl_known = ((options & DNS_MASTER_NOTTL) != 0);
lctx->ttl = 0;
lctx->default_ttl_known = lctx->ttl_known;
lctx->default_ttl = 0;
for (i = 0; i < n; i++) {
dns_rdataset_t *rds = sorted[i];
- if (ctx->style.flags & DNS_STYLEFLAG_TRUST) {
+ if ((ctx->style.flags & DNS_STYLEFLAG_TRUST) != 0) {
if ((ctx->style.flags & DNS_STYLEFLAG_INDENT) != 0 ||
(ctx->style.flags & DNS_STYLEFLAG_YAML) != 0)
{
if ((ctx->style.flags & DNS_STYLEFLAG_OMIT_OWNER) != 0)
name = NULL;
}
- if (ctx->style.flags & DNS_STYLEFLAG_RESIGN &&
- rds->attributes & DNS_RDATASETATTR_RESIGN) {
+ if (((ctx->style.flags & DNS_STYLEFLAG_RESIGN) != 0) &&
+ ((rds->attributes & DNS_RDATASETATTR_RESIGN) != 0)) {
isc_buffer_t b;
char buf[sizeof("YYYYMMDDHHMMSS")];
memset(buf, 0, sizeof(buf));
section = &msg->sections[DNS_SECTION_QUESTION];
- best_effort = (options & DNS_MESSAGEPARSE_BESTEFFORT);
+ best_effort = ((options & DNS_MESSAGEPARSE_BESTEFFORT) != 0);
seen_problem = false;
name = NULL;
bool preserve_order, best_effort, seen_problem;
bool issigzero;
- preserve_order = (options & DNS_MESSAGEPARSE_PRESERVEORDER);
- best_effort = (options & DNS_MESSAGEPARSE_BESTEFFORT);
+ preserve_order = ((options & DNS_MESSAGEPARSE_PRESERVEORDER) != 0);
+ best_effort = ((options & DNS_MESSAGEPARSE_BESTEFFORT) != 0);
seen_problem = false;
section = &msg->sections[sectionid];
REQUIRE(msg->from_to_wire == DNS_MESSAGE_INTENTPARSE);
seen_problem = false;
- ignore_tc = (options & DNS_MESSAGEPARSE_IGNORETRUNCATION);
+ ignore_tc = ((options & DNS_MESSAGEPARSE_IGNORETRUNCATION) != 0);
origsource = *source;
REQUIRE((target != NULL && ISC_BUFFER_VALID(target)) ||
(target == NULL && ISC_BUFFER_VALID(name->buffer)));
- downcase = (options & DNS_NAME_DOWNCASE);
+ downcase = ((options & DNS_NAME_DOWNCASE) != 0);
if (target == NULL && name->buffer != NULL) {
target = name->buffer;
dns_name_totextfilter_t *mem;
dns_name_totextfilter_t totext_filter_proc = NULL;
isc_result_t result;
- bool omit_final_dot = (options & DNS_NAME_OMITFINALDOT);
+ bool omit_final_dot = ((options & DNS_NAME_OMITFINALDOT) != 0);
/*
* This function assumes the name is in proper uncompressed
REQUIRE((target != NULL && ISC_BUFFER_VALID(target)) ||
(target == NULL && ISC_BUFFER_VALID(name->buffer)));
- downcase = (options & DNS_NAME_DOWNCASE);
+ downcase = ((options & DNS_NAME_DOWNCASE) != 0);
if (target == NULL && name->buffer != NULL) {
target = name->buffer;
/*
* Ordinary 14-bit pointer.
*/
- if ((dctx->allowed & DNS_COMPRESS_GLOBAL14) ==
- 0)
+ if ((dctx->allowed & DNS_COMPRESS_GLOBAL14) == 0)
+ {
return (DNS_R_DISALLOWED);
+ }
new_current = c & 0x3F;
state = fw_newcurrent;
} else
shift = 7 - (type % 8);
mask = 1 << shift;
- return (byte & mask);
+ return ((byte & mask) != 0);
}
unsigned int
*exists = false;
*data = false;
if (optout != NULL) {
- if ((nsec3.flags & DNS_NSEC3FLAG_OPTOUT) != 0)
- (*logit)(arg, ISC_LOG_DEBUG(3),
- "NSEC3 indicates optout");
- else
- (*logit)(arg, ISC_LOG_DEBUG(3),
- "NSEC3 indicates secure range");
- *optout = (nsec3.flags & DNS_NSEC3FLAG_OPTOUT);
+ *optout = ((nsec3.flags & DNS_NSEC3FLAG_OPTOUT)
+ != 0);
+ (*logit)(arg, ISC_LOG_DEBUG(3),
+ (*optout
+ ? "NSEC3 indicates optout"
+ : "NSEC3 indicates secure range"));
}
answer = ISC_R_SUCCESS;
}
isc_log_write(dns_lctx, category,
DNS_LOGMODULE_CRYPTO, ISC_LOG_INFO,
"%s:%s:%d:%s", buf, file, line,
- (flags & ERR_TXT_STRING) ? data : "");
+ ((flags & ERR_TXT_STRING) != 0) ? data : "");
}
done:
CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL));
- del = (nsec3param.flags & DNS_NSEC3FLAG_REMOVE);
- init = (nsec3param.flags & DNS_NSEC3FLAG_INITIAL);
- nonsec = (nsec3param.flags & DNS_NSEC3FLAG_NONSEC);
+ del = ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0);
+ init = ((nsec3param.flags & DNS_NSEC3FLAG_INITIAL) != 0);
+ nonsec = ((nsec3param.flags & DNS_NSEC3FLAG_NONSEC) != 0);
nsec3param.flags &= ~(DNS_NSEC3FLAG_CREATE|
DNS_NSEC3FLAG_REMOVE|
rbtdbiter->common.db = NULL;
dns_db_attach(db, &rbtdbiter->common.db);
rbtdbiter->common.relative_names =
- (options & DNS_DB_RELATIVENAMES);
+ ((options & DNS_DB_RELATIVENAMES) != 0);
rbtdbiter->common.magic = DNS_DBITERATOR_MAGIC;
rbtdbiter->common.cleaning = false;
rbtdbiter->paused = true;
dns_fixedname_init(&rbtdbiter->origin);
rbtdbiter->node = NULL;
rbtdbiter->delcnt = 0;
- rbtdbiter->nsec3only = (options & DNS_DB_NSEC3ONLY);
- rbtdbiter->nonsec3 = (options & DNS_DB_NONSEC3);
+ rbtdbiter->nsec3only = ((options & DNS_DB_NSEC3ONLY) != 0);
+ rbtdbiter->nonsec3 = ((options & DNS_DB_NONSEC3) != 0);
memset(rbtdbiter->deletions, 0, sizeof(rbtdbiter->deletions));
dns_rbtnodechain_init(&rbtdbiter->chain, db->mctx);
dns_rbtnodechain_init(&rbtdbiter->nsec3chain, db->mctx);
RETERR(str_totext(buf, target));
RETERR(str_totext(" ", target));
if ((flags & DNS_KEYFLAG_KSK) != 0) {
- if (flags & DNS_KEYFLAG_REVOKE)
+ if ((flags & DNS_KEYFLAG_REVOKE) != 0) {
keyinfo = "revoked KSK";
- else
+ } else {
keyinfo = "KSK";
- } else
+ }
+ } else {
keyinfo = "ZSK";
+ }
/* protocol */
snprintf(buf, sizeof(buf), "%u", sr.base[0]);
REQUIRE(rdata->type == dns_rdatatype_soa);
REQUIRE(rdata->length != 0);
- multiline = (tctx->flags & DNS_STYLEFLAG_MULTILINE);
- if (multiline)
- comm = (tctx->flags & DNS_STYLEFLAG_RRCOMMENT);
- else
+ multiline = ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0);
+ if (multiline) {
+ comm = ((tctx->flags & DNS_STYLEFLAG_RRCOMMENT) != 0);
+ } else {
comm = false;
+ }
dns_name_init(&mname, NULL);
dns_tsigkey_attach(key, &request->tsigkey);
use_tcp:
- tcp = (options & DNS_REQUESTOPT_TCP);
- share = (options & DNS_REQUESTOPT_SHARE);
+ tcp = ((options & DNS_REQUESTOPT_TCP) != 0);
+ share = ((options & DNS_REQUESTOPT_SHARE) != 0);
result = get_dispatch(tcp, false, share,
requestmgr, srcaddr, destaddr,
dscp, &connected, &request->dispatch);
dns_request_usedtcp(dns_request_t *request) {
REQUIRE(VALID_REQUEST(request));
- return (request->flags & DNS_REQUEST_F_TCP);
+ return ((request->flags & DNS_REQUEST_F_TCP) != 0);
}
void
dns_compress_t cctx;
bool cleanup_cctx = false;
bool secure_domain;
- bool tcp = (query->options & DNS_FETCHOPT_TCP);
+ bool tcp = ((query->options & DNS_FETCHOPT_TCP) != 0);
dns_ednsopt_t ednsopts[DNS_EDNSOPTIONS];
unsigned ednsopt = 0;
uint16_t hint = 0, udpsize = 0; /* No EDNS */
else if (res->view->enablevalidation &&
((fctx->qmessage->flags & DNS_MESSAGEFLAG_RD) != 0))
{
- bool checknta = !(query->options & DNS_FETCHOPT_NONTA);
+ bool checknta = ((query->options & DNS_FETCHOPT_NONTA) == 0);
result = issecuredomain(res->view, &fctx->name, fctx->type,
isc_time_seconds(&query->start),
checknta, &secure_domain);
FCTXTRACE("FINDNAME");
res = fctx->res;
- unshared = (fctx->options & DNS_FETCHOPT_UNSHARED);
+ unshared = ((fctx->options & DNS_FETCHOPT_UNSHARED) != 0);
/*
* If this name is a subdomain of the query domain, tell
* the ADB to start looking using zone/hint data. This keeps us
negative = (vevent->rdataset == NULL);
- sentresponse = (fctx->options & DNS_FETCHOPT_NOVALIDATE);
+ sentresponse = ((fctx->options & DNS_FETCHOPT_NOVALIDATE) != 0);
/*
* If shutting down, ignore the results. Check to see if we're
/*
* Cache or validate each cacheable rdataset.
*/
- fail = (fctx->res->options & DNS_RESOLVER_CHECKNAMESFAIL);
+ fail = ((fctx->res->options & DNS_RESOLVER_CHECKNAMESFAIL) != 0);
for (rdataset = ISC_LIST_HEAD(name->list);
rdataset != NULL;
rdataset = ISC_LIST_NEXT(rdataset, link))
rctx_answer_init(respctx_t *rctx) {
fetchctx_t *fctx = rctx->fctx;
- rctx->aa = (fctx->rmessage->flags & DNS_MESSAGEFLAG_AA);
+ rctx->aa = ((fctx->rmessage->flags & DNS_MESSAGEFLAG_AA) != 0);
if (rctx->aa) {
rctx->trust = dns_trust_authanswer;
} else {
dns_dt_send(fctx->res->view, dtmsgtype, la,
&rctx->query->addrinfo->sockaddr,
- (rctx->query->options & DNS_FETCHOPT_TCP),
+ ((rctx->query->options & DNS_FETCHOPT_TCP) != 0),
&zr, &rctx->query->start, NULL, &rctx->devent->buffer);
#endif /* HAVE_DNSTAP */
}
const dns_rpz_cidr_key_t *tgt_ip, dns_rpz_prefix_t tgt_prefix,
bool inc)
{
- dns_rpz_trigger_counter_t *cnt = 0;
- dns_rpz_zbits_t *have = 0;
+ dns_rpz_trigger_counter_t *cnt = NULL;
+ dns_rpz_zbits_t *have = NULL;
switch (rpz_type) {
case DNS_RPZ_TYPE_CLIENT_IP:
sdbiter->common.methods = &dbiterator_methods;
sdbiter->common.db = NULL;
dns_db_attach(db, &sdbiter->common.db);
- sdbiter->common.relative_names = (options & DNS_DB_RELATIVENAMES);
+ sdbiter->common.relative_names = ((options & DNS_DB_RELATIVENAMES) != 0);
sdbiter->common.magic = DNS_DBITERATOR_MAGIC;
ISC_LIST_INIT(sdbiter->nodelist);
sdbiter->current = NULL;
sdlziter->common.methods = &dbiterator_methods;
sdlziter->common.db = NULL;
dns_db_attach(db, &sdlziter->common.db);
- sdlziter->common.relative_names = (options & DNS_DB_RELATIVENAMES);
+ sdlziter->common.relative_names =
+ ((options & DNS_DB_RELATIVENAMES) != 0);
sdlziter->common.magic = DNS_DBITERATOR_MAGIC;
ISC_LIST_INIT(sdlziter->nodelist);
sdlziter->current = NULL;
#define DNS_TSIG_MAXGENERATEDKEYS 4096
#endif
-#define is_response(msg) (msg->flags & DNS_MESSAGEFLAG_QR)
+#define is_response(msg) ((msg->flags & DNS_MESSAGEFLAG_QR) != 0)
#define BADTIMELEN 6
* and one doesn't.
*/
state->check_ksk =
- (dns_zone_getoptions(zone) & DNS_ZONEOPT_UPDATECHECKKSK);
+ ((dns_zone_getoptions(zone) &
+ DNS_ZONEOPT_UPDATECHECKKSK) != 0);
state->keyset_kskonly =
- (dns_zone_getoptions(zone) & DNS_ZONEOPT_DNSKEYKSKONLY);
+ ((dns_zone_getoptions(zone) &
+ DNS_ZONEOPT_DNSKEYKSKONLY) != 0);
/*
* Get the NSEC/NSEC3 TTL from the SOA MINIMUM field.
strlcpy(flags, "NONE", sizeof(flags));
else {
flags[0] = '\0';
- if (nsec3param->flags & DNS_NSEC3FLAG_REMOVE)
+ if ((nsec3param->flags & DNS_NSEC3FLAG_REMOVE) != 0) {
strlcat(flags, "REMOVE", sizeof(flags));
- if (nsec3param->flags & DNS_NSEC3FLAG_INITIAL) {
+ }
+ if ((nsec3param->flags & DNS_NSEC3FLAG_INITIAL) != 0) {
if (flags[0] == '\0')
strlcpy(flags, "INITIAL", sizeof(flags));
else
strlcat(flags, "|INITIAL", sizeof(flags));
}
- if (nsec3param->flags & DNS_NSEC3FLAG_CREATE) {
+ if ((nsec3param->flags & DNS_NSEC3FLAG_CREATE) != 0) {
if (flags[0] == '\0')
strlcpy(flags, "CREATE", sizeof(flags));
else
strlcat(flags, "|CREATE", sizeof(flags));
}
- if (nsec3param->flags & DNS_NSEC3FLAG_NONSEC) {
+ if ((nsec3param->flags & DNS_NSEC3FLAG_NONSEC) != 0) {
if (flags[0] == '\0')
strlcpy(flags, "NONSEC", sizeof(flags));
else
strlcat(flags, "|NONSEC", sizeof(flags));
}
- if (nsec3param->flags & DNS_NSEC3FLAG_OPTOUT) {
+ if ((nsec3param->flags & DNS_NSEC3FLAG_OPTOUT) != 0) {
if (flags[0] == '\0')
strlcpy(flags, "OPTOUT", sizeof(flags));
else
RUNTIME_CHECK(result == ISC_R_SUCCESS);
/* Skip ZSK's */
- if (!(dnskey.flags & DNS_KEYFLAG_KSK))
+ if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0) {
continue;
+ }
result = compute_tag(keyname, &dnskey, mctx, &keytag);
RUNTIME_CHECK(result == ISC_R_SUCCESS);
- revoked = (dnskey.flags & DNS_KEYFLAG_REVOKE);
+ revoked = ((dnskey.flags & DNS_KEYFLAG_REVOKE) != 0);
if (matchkey(&kfetch->keydataset, &dnskeyrr)) {
dns_rdata_reset(&keydatarr);
zone_iattach(notify->zone, &newnotify->zone);
ISC_LIST_APPEND(newnotify->zone->notifies, newnotify, link);
newnotify->dst = dst;
- startup = (notify->flags & DNS_NOTIFY_STARTUP);
+ startup = ((notify->flags & DNS_NOTIFY_STARTUP) != 0);
result = notify_send_queue(newnotify, startup);
if (result != ISC_R_SUCCESS)
goto cleanup;
result = dns_rdata_tostruct(&rdata, &nsec3, NULL);
RUNTIME_CHECK(result == ISC_R_SUCCESS);
- *optout = (nsec3.flags & DNS_NSEC3FLAG_OPTOUT);
+ *optout = ((nsec3.flags & DNS_NSEC3FLAG_OPTOUT) != 0);
done:
if (dns_rdataset_isassociated(&rdataset)) {
dns_rdataset_current(&vctx->keyset, &rdata);
result = dns_rdata_tostruct(&rdata, &dnskey, NULL);
RUNTIME_CHECK(result == ISC_R_SUCCESS);
- is_ksk = (dnskey.flags & DNS_KEYFLAG_KSK);
+ is_ksk = ((dnskey.flags & DNS_KEYFLAG_KSK) != 0);
if ((dnskey.flags & DNS_KEYOWNER_ZONE) == 0) {
;
goto done;
}
- wantcname = (resstate->head->ai_flags & AI_CANONNAME);
+ wantcname = ((resstate->head->ai_flags & AI_CANONNAME) != 0);
/* Parse the response and construct the addrinfo chain */
for (name = ISC_LIST_HEAD(rev->answerlist); name != NULL;
default:
INSIST(0);
}
- proto = (flags & NI_DGRAM) ? "udp" : "tcp";
+ proto = ((flags & NI_DGRAM) != 0) ? "udp" : "tcp";
if (serv == NULL || servlen == 0U) {
/*
}
#ifdef HAVE_ZLIB
- if (httpd->flags & HTTPD_ACCEPT_DEFLATE) {
+ if ((httpd->flags & HTTPD_ACCEPT_DEFLATE) != 0) {
result = isc_httpd_compress(httpd);
if (result == ISC_R_SUCCESS) {
is_compressed = true;
#define isc_prefix_tochar(prefix) ((char *)&(prefix)->add.sin)
#define isc_prefix_touchar(prefix) ((u_char *)&(prefix)->add.sin)
-#define BIT_TEST(f, b) ((f) & (b))
-
/*
* We need "first match" when we search the radix tree to preserve
* compatibility with the existing ACL implementation. Radix trees
goto done;
done = true;
continue;
- } else if (!(options & ISC_LEXOPT_CNUMBER) ||
+ } else if ((options & ISC_LEXOPT_CNUMBER) == 0 ||
((c != 'x' && c != 'X') ||
- (curr != &lex->data[1]) ||
- (lex->data[0] != '0'))) {
+ (curr != &lex->data[1]) ||
+ (lex->data[0] != '0'))) {
/* Above test supports hex numbers */
state = lexstate_string;
}
}
}
- utc = (channel->flags & ISC_LOG_UTC);
- iso8601 = (channel->flags & ISC_LOG_ISO8601);
- printtime = (channel->flags & ISC_LOG_PRINTTIME);
+ utc = ((channel->flags & ISC_LOG_UTC) != 0);
+ iso8601 = ((channel->flags & ISC_LOG_ISO8601) != 0);
+ printtime = ((channel->flags & ISC_LOG_PRINTTIME) != 0);
printtag = ((channel->flags &
- (ISC_LOG_PRINTTAG|ISC_LOG_PRINTPREFIX)) &&
+ (ISC_LOG_PRINTTAG|ISC_LOG_PRINTPREFIX)) != 0 &&
lcfg->tag != NULL);
- printcolon = ((channel->flags & ISC_LOG_PRINTTAG) &&
+ printcolon = ((channel->flags & ISC_LOG_PRINTTAG) != 0 &&
lcfg->tag != NULL);
- printcategory = (channel->flags & ISC_LOG_PRINTCATEGORY);
- printmodule = (channel->flags & ISC_LOG_PRINTMODULE);
- printlevel = (channel->flags & ISC_LOG_PRINTLEVEL);
- buffered = (channel->flags & ISC_LOG_BUFFERED);
+ printcategory = ((channel->flags & ISC_LOG_PRINTCATEGORY) != 0);
+ printmodule = ((channel->flags & ISC_LOG_PRINTMODULE) != 0);
+ printlevel = ((channel->flags & ISC_LOG_PRINTLEVEL) != 0);
+ buffered = ((channel->flags & ISC_LOG_BUFFERED) != 0);
if (printtime) {
if (iso8601) {
#include <isc/util.h>
#include <isc/radix.h>
+#define BIT_TEST(f, b) (((f) & (b)) != 0)
+
static isc_result_t
_new_prefix(isc_mem_t *mctx, isc_prefix_t **target, int family,
void *dest, int bitlen);
bool oldpriv;
LOCK(&task->lock);
- oldpriv = (task->flags & TASK_F_PRIVILEGED);
+ oldpriv = ((task->flags & TASK_F_PRIVILEGED) != 0);
if (priv)
task->flags |= TASK_F_PRIVILEGED;
else
REQUIRE(VALID_TASK(task));
LOCK(&task->lock);
- priv = (task->flags & TASK_F_PRIVILEGED);
+ priv = ((task->flags & TASK_F_PRIVILEGED) != 0);
UNLOCK(&task->lock);
return (priv);
}
} else {
recv_dscp = false;
}
- recv_trunc = (dev->attributes & ISC_SOCKEVENTATTR_TRUNC);
+ recv_trunc = ((dev->attributes & ISC_SOCKEVENTATTR_TRUNC) != 0);
isc_event_free(&event);
}
}
if (sender_match && type_match && tag_match) {
- if (event->ev_attributes & ISC_EVENTATTR_NOPURGE) {
+ if ((event->ev_attributes & ISC_EVENTATTR_NOPURGE) != 0) {
printf("event %p,%d,%p matched but was not purgeable\n",
event->ev_sender, (int)event->ev_type,
event->ev_tag);
ATF_TP_ADD_TC(tp, purgeevent_notpurge);
return (atf_no_error());
}
-
*/
#define ALT_E 0x01
#define ALT_O 0x02
-#define LEGAL_ALT(x) { if (alt_format & ~(x)) return (0); }
+#define LEGAL_ALT(x) { if ((alt_format & ~(x)) != 0) return (0); }
#ifndef TM_YEAR_BASE
#define TM_YEAR_BASE 1900
UNUSED(dev);
#ifdef MSG_TRUNC
- if ((msg->msg_flags & MSG_TRUNC) == MSG_TRUNC)
+ if ((msg->msg_flags & MSG_TRUNC) != 0) {
dev->attributes |= ISC_SOCKEVENTATTR_TRUNC;
+ }
#endif
#ifdef MSG_CTRUNC
- if ((msg->msg_flags & MSG_CTRUNC) == MSG_CTRUNC)
+ if ((msg->msg_flags & MSG_CTRUNC) != 0) {
dev->attributes |= ISC_SOCKEVENTATTR_CTRUNC;
+ }
#endif
#ifndef USE_CMSG
#endif
UNLOCK(&manager->lock);
- if (flags & ISC_SOCKFDWATCH_READ)
+ if ((flags & ISC_SOCKFDWATCH_READ) != 0) {
select_poke(sock->manager, sock->fd, SELECT_POKE_READ);
- if (flags & ISC_SOCKFDWATCH_WRITE)
+ }
+ if ((flags & ISC_SOCKFDWATCH_WRITE) != 0) {
select_poke(sock->manager, sock->fd, SELECT_POKE_WRITE);
+ }
socket_log(sock, NULL, CREATION, isc_msgcat, ISC_MSGSET_SOCKET,
ISC_MSG_CREATED, "fdwatch-created");
if (ISC_LINK_LINKED(*dev, ev_link))
ISC_LIST_DEQUEUE(sock->recv_list, *dev, ev_link);
- if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
- == ISC_SOCKEVENTATTR_ATTACHED)
+ if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED) != 0) {
isc_task_sendanddetach(&task, (isc_event_t **)dev);
- else
+ } else {
isc_task_send(task, (isc_event_t **)dev);
+ }
}
/*
if (ISC_LINK_LINKED(*dev, ev_link))
ISC_LIST_DEQUEUE(sock->send_list, *dev, ev_link);
- if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
- == ISC_SOCKEVENTATTR_ATTACHED)
+ if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED) != 0) {
isc_task_sendanddetach(&task, (isc_event_t **)dev);
- else
+ } else {
isc_task_send(task, (isc_event_t **)dev);
+ }
}
/*
* its done event with status of "ISC_R_CANCELED".
* o Reset any state needed.
*/
- if (((how & ISC_SOCKCANCEL_RECV) == ISC_SOCKCANCEL_RECV)
+ if (((how & ISC_SOCKCANCEL_RECV) != 0)
&& !ISC_LIST_EMPTY(sock->recv_list)) {
isc_socketevent_t *dev;
isc_socketevent_t *next;
}
}
- if (((how & ISC_SOCKCANCEL_SEND) == ISC_SOCKCANCEL_SEND)
+ if (((how & ISC_SOCKCANCEL_SEND) != 0)
&& !ISC_LIST_EMPTY(sock->send_list)) {
isc_socketevent_t *dev;
isc_socketevent_t *next;
}
}
- if (((how & ISC_SOCKCANCEL_ACCEPT) == ISC_SOCKCANCEL_ACCEPT)
+ if (((how & ISC_SOCKCANCEL_ACCEPT) != 0)
&& !ISC_LIST_EMPTY(sock->accept_list)) {
isc_socket_newconnev_t *dev;
isc_socket_newconnev_t *next;
}
}
- if (((how & ISC_SOCKCANCEL_CONNECT) == ISC_SOCKCANCEL_CONNECT)
+ if (((how & ISC_SOCKCANCEL_CONNECT) != 0)
&& !ISC_LIST_EMPTY(sock->connect_list)) {
isc_socket_connev_t *dev;
isc_socket_connev_t *next;
/* Owner check */
NTFSbits = 0;
- if (caccess & ISC_FSACCESS_READ)
+ if ((caccess & ISC_FSACCESS_READ) != 0) {
NTFSbits |= FILE_GENERIC_READ;
- if (caccess & ISC_FSACCESS_WRITE)
+ }
+ if ((caccess & ISC_FSACCESS_WRITE) != 0) {
NTFSbits |= FILE_GENERIC_WRITE;
- if (caccess & ISC_FSACCESS_EXECUTE)
+ }
+ if ((caccess & ISC_FSACCESS_EXECUTE) != 0) {
NTFSbits |= FILE_GENERIC_EXECUTE;
+ }
/* For directories check the directory-specific bits */
if (isdir == true) {
- if (caccess & ISC_FSACCESS_CREATECHILD)
+ if ((caccess & ISC_FSACCESS_CREATECHILD) != 0) {
NTFSbits |= FILE_ADD_SUBDIRECTORY | FILE_ADD_FILE;
- if (caccess & ISC_FSACCESS_DELETECHILD)
+ }
+ if ((caccess & ISC_FSACCESS_DELETECHILD) != 0) {
NTFSbits |= FILE_DELETE_CHILD;
- if (caccess & ISC_FSACCESS_LISTDIRECTORY)
+ }
+ if ((caccess & ISC_FSACCESS_LISTDIRECTORY) != 0) {
NTFSbits |= FILE_LIST_DIRECTORY;
- if (caccess & ISC_FSACCESS_ACCESSCHILD)
+ }
+ if ((caccess & ISC_FSACCESS_ACCESSCHILD) != 0) {
NTFSbits |= FILE_TRAVERSE;
+ }
}
if (NTFSbits == (FILE_GENERIC_READ | FILE_GENERIC_WRITE
caccess = caccess >> STEP;
NTFSbits = 0;
- if (caccess & ISC_FSACCESS_READ)
+ if ((caccess & ISC_FSACCESS_READ) != 0) {
NTFSbits |= FILE_GENERIC_READ;
- if (caccess & ISC_FSACCESS_WRITE)
+ }
+ if ((caccess & ISC_FSACCESS_WRITE) != 0) {
NTFSbits |= FILE_GENERIC_WRITE;
- if (caccess & ISC_FSACCESS_EXECUTE)
+ }
+ if ((caccess & ISC_FSACCESS_EXECUTE) != 0) {
NTFSbits |= FILE_GENERIC_EXECUTE;
+ }
/* For directories check the directory-specific bits */
if (isdir == TRUE) {
- if (caccess & ISC_FSACCESS_CREATECHILD)
+ if ((caccess & ISC_FSACCESS_CREATECHILD) != 0) {
NTFSbits |= FILE_ADD_SUBDIRECTORY | FILE_ADD_FILE;
- if (caccess & ISC_FSACCESS_DELETECHILD)
+ }
+ if ((caccess & ISC_FSACCESS_DELETECHILD) != 0) {
NTFSbits |= FILE_DELETE_CHILD;
- if (caccess & ISC_FSACCESS_LISTDIRECTORY)
+ }
+ if ((caccess & ISC_FSACCESS_LISTDIRECTORY) != 0) {
NTFSbits |= FILE_LIST_DIRECTORY;
- if (caccess & ISC_FSACCESS_ACCESSCHILD)
+ }
+ if ((caccess & ISC_FSACCESS_ACCESSCHILD) != 0) {
NTFSbits |= FILE_TRAVERSE;
+ }
}
/* Add the ACE to the ACL */
if (!AddAccessAllowedAce(pacl, ACL_REVISION, NTFSbits,
return (ISC_R_SUCCESS);
}
-
if (ISC_LINK_LINKED(*dev, ev_link))
ISC_LIST_DEQUEUE(sock->recv_list, *dev, ev_link);
- if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
- == ISC_SOCKEVENTATTR_ATTACHED)
+ if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED) != 0) {
isc_task_sendanddetach(&task, (isc_event_t **)dev);
- else
+ } else {
isc_task_send(task, (isc_event_t **)dev);
+ }
CONSISTENT(sock);
}
if (ISC_LINK_LINKED(*dev, ev_link))
ISC_LIST_DEQUEUE(sock->send_list, *dev, ev_link);
- if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED)
- == ISC_SOCKEVENTATTR_ATTACHED)
+ if (((*dev)->attributes & ISC_SOCKEVENTATTR_ATTACHED) != 0) {
isc_task_sendanddetach(&task, (isc_event_t **)dev);
- else
+ } else {
isc_task_send(task, (isc_event_t **)dev);
+ }
CONSISTENT(sock);
}
* o Reset any state needed.
*/
- if ((how & ISC_SOCKCANCEL_RECV) == ISC_SOCKCANCEL_RECV) {
+ if ((how & ISC_SOCKCANCEL_RECV) != 0) {
isc_socketevent_t *dev;
isc_socketevent_t *next;
isc_task_t *current_task;
}
how &= ~ISC_SOCKCANCEL_RECV;
- if ((how & ISC_SOCKCANCEL_SEND) == ISC_SOCKCANCEL_SEND) {
+ if ((how & ISC_SOCKCANCEL_SEND) != 0) {
isc_socketevent_t *dev;
isc_socketevent_t *next;
isc_task_t *current_task;
}
how &= ~ISC_SOCKCANCEL_SEND;
- if (((how & ISC_SOCKCANCEL_ACCEPT) == ISC_SOCKCANCEL_ACCEPT)
+ if (((how & ISC_SOCKCANCEL_ACCEPT) != 0)
&& !ISC_LIST_EMPTY(sock->accept_list)) {
isc_socket_newconnev_t *dev;
isc_socket_newconnev_t *next;
}
how &= ~ISC_SOCKCANCEL_ACCEPT;
- if (((how & ISC_SOCKCANCEL_CONNECT) == ISC_SOCKCANCEL_CONNECT)
+ if (((how & ISC_SOCKCANCEL_CONNECT) != 0)
&& !ISC_LIST_EMPTY(sock->connect_list)) {
isc_socket_connev_t *dev;
isc_socket_connev_t *next;
const unsigned int *flagp = type->of;
cfg_print_cstr(pctx, "( ( [ address ] ( ");
- if (*flagp & CFG_ADDR_V4OK)
+ if ((*flagp & CFG_ADDR_V4OK) != 0) {
cfg_print_cstr(pctx, "<ipv4_address>");
- else if (*flagp & CFG_ADDR_V6OK)
+ } else if ((*flagp & CFG_ADDR_V6OK) != 0) {
cfg_print_cstr(pctx, "<ipv6_address>");
- else
+ } else {
INSIST(0);
+ }
cfg_print_cstr(pctx, " | * ) [ port ( <integer> | * ) ] ) | "
"( [ [ address ] ( ");
- if (*flagp & CFG_ADDR_V4OK)
+ if ((*flagp & CFG_ADDR_V4OK) != 0) {
cfg_print_cstr(pctx, "<ipv4_address>");
- else if (*flagp & CFG_ADDR_V6OK)
+ } else if ((*flagp & CFG_ADDR_V6OK) != 0) {
cfg_print_cstr(pctx, "<ipv6_address>");
- else
+ } else {
INSIST(0);
+ }
cfg_print_cstr(pctx, " | * ) ] port ( <integer> | * ) ) )"
" [ dscp <integer> ]");
}
/* Single-valued clause */
if (result == ISC_R_NOTFOUND) {
bool callback =
- (clause->flags & CFG_CLAUSEFLAG_CALLBACK);
+ ((clause->flags &
+ CFG_CLAUSEFLAG_CALLBACK) != 0);
CHECK(parse_symtab_elt(pctx, clause->name,
clause->type,
obj->value.map.symtab,
cfg_doc_netaddr(cfg_printer_t *pctx, const cfg_type_t *type) {
const unsigned int *flagp = type->of;
int n = 0;
- if (*flagp != CFG_ADDR_V4OK && *flagp != CFG_ADDR_V6OK)
+ if (*flagp != CFG_ADDR_V4OK && *flagp != CFG_ADDR_V6OK) {
cfg_print_cstr(pctx, "( ");
- if (*flagp & CFG_ADDR_V4OK) {
+ }
+ if ((*flagp & CFG_ADDR_V4OK) != 0) {
cfg_print_cstr(pctx, "<ipv4_address>");
n++;
}
- if (*flagp & CFG_ADDR_V6OK) {
+ if ((*flagp & CFG_ADDR_V6OK) != 0) {
if (n != 0)
cfg_print_cstr(pctx, " | ");
cfg_print_cstr(pctx, "<ipv6_address>");
n++;
}
- if (*flagp & CFG_ADDR_WILDOK) {
+ if ((*flagp & CFG_ADDR_WILDOK) != 0) {
if (n != 0)
cfg_print_cstr(pctx, " | ");
cfg_print_cstr(pctx, "*");
n++;
POST(n);
}
- if (*flagp != CFG_ADDR_V4OK && *flagp != CFG_ADDR_V6OK)
+ if (*flagp != CFG_ADDR_V4OK && *flagp != CFG_ADDR_V6OK) {
cfg_print_cstr(pctx, " )");
+ }
}
LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_netaddr = {
REQUIRE(type != NULL);
cfg_print_cstr(pctx, "( ");
- if (*flagp & CFG_ADDR_V4OK) {
+ if ((*flagp & CFG_ADDR_V4OK) != 0) {
cfg_print_cstr(pctx, "<ipv4_address>");
n++;
}
- if (*flagp & CFG_ADDR_V6OK) {
+ if ((*flagp & CFG_ADDR_V6OK) != 0) {
if (n != 0)
cfg_print_cstr(pctx, " | ");
cfg_print_cstr(pctx, "<ipv6_address>");
n++;
}
- if (*flagp & CFG_ADDR_WILDOK) {
+ if ((*flagp & CFG_ADDR_WILDOK) != 0) {
if (n != 0)
cfg_print_cstr(pctx, " | ");
cfg_print_cstr(pctx, "*");
POST(n);
}
cfg_print_cstr(pctx, " ) ");
- if (*flagp & CFG_ADDR_WILDOK) {
+ if ((*flagp & CFG_ADDR_WILDOK) != 0) {
cfg_print_cstr(pctx, "[ port ( <integer> | * ) ]");
} else {
cfg_print_cstr(pctx, "[ port <integer> ]");
}
/* Choose a preposition. */
- if (flags & CFG_LOG_NEAR)
+ if ((flags & CFG_LOG_NEAR) != 0) {
prep = " near ";
- else if (flags & CFG_LOG_BEFORE)
+ } else if ((flags & CFG_LOG_BEFORE) != 0) {
prep = " before ";
- else
+ } else {
prep = " ";
+ }
} else {
tokenbuf[0] = '\0';
}
result = dns_rdata_tostruct(&rdata, &nsec3, NULL);
RUNTIME_CHECK(result == ISC_R_SUCCESS);
dns_rdata_reset(&rdata);
- optout = (nsec3.flags & DNS_NSEC3FLAG_OPTOUT);
+ optout = ((nsec3.flags & DNS_NSEC3FLAG_OPTOUT) != 0);
if (found != NULL && optout &&
dns_name_issubdomain(&name, dns_db_origin(db)))
{
* We don't need to set DNS_DBFIND_PENDINGOK when validation is
* disabled as there will be no pending data.
*/
- if (message->flags & DNS_MESSAGEFLAG_CD ||
+ if ((message->flags & DNS_MESSAGEFLAG_CD) != 0 ||
qtype == dns_rdatatype_rrsig)
{
client->query.dboptions |= DNS_DBFIND_PENDINGOK;
* Allow glue NS records to be added to the authority section
* if the answer is secure.
*/
- if (message->flags & DNS_MESSAGEFLAG_CD)
+ if ((message->flags & DNS_MESSAGEFLAG_CD) != 0) {
client->query.attributes &= ~NS_QUERYATTR_SECURE;
+ }
/*
* Set NS_CLIENTATTR_WANTAD if the client has set AD in the query.
ns_server_getoption(ns_server_t *sctx, unsigned int option) {
REQUIRE(SCTX_VALID(sctx));
- return (sctx->options & option);
+ return ((sctx->options & option) != 0);
}
isc_buffer_clear(&xfr->txlenbuf);
isc_buffer_clear(&xfr->txbuf);
- is_tcp = (xfr->client->attributes & NS_CLIENTATTR_TCP);
+ is_tcp = ((xfr->client->attributes & NS_CLIENTATTR_TCP) != 0);
if (!is_tcp) {
/*
* In the UDP case, we put the response data directly into