Commit Graph

251 Commits

Author SHA1 Message Date
Mark Andrews
9f375be7d9 4276. [protocol] Add support for SMIMEA. [RT #40513]
(cherry picked from commit 322e6b5be7)
2015-12-08 08:17:35 +11:00
Mukund Sivaraman
d048a2c7f4 Speed up typemap_fromtext() (#41196)
(cherry picked from commit 5b13a593fe)
2015-12-07 12:37:20 +05:30
Mark Andrews
0eda4fc1d5 4265. [bug] Address unchecked isc_mem_get calls. [RT #41187]
(cherry picked from commit 8e73941f33)
2015-11-30 10:30:01 +11:00
Tinderbox User
99be06f28c update copyright notice / whitespace 2015-09-18 23:45:51 +00:00
Mark Andrews
7677f0083f 4217. [protocol] Add support for CSYNC. [RT #40532]
(cherry picked from commit f6e45a5c54)
2015-09-18 23:47:54 +10:00
Mark Andrews
0f6e4cb5bd 4199. [protocol] Add support for NINFO, RKEY, TA.
[RT #40545] [RT #40547] [RT #40563]

(cherry picked from commit 3dd63ba00f)
2015-09-10 17:59:44 +10:00
Mark Andrews
9a95c605e8 4199. [protocol] Add support for NINFO, RKEY. [RT #40547] [RT #40563]
(cherry picked from commit 63874956de)
2015-09-10 17:08:02 +10:00
Mark Andrews
f00d028c20 4199. [protocol] Add support for RKEY. [RT #40563]
(cherry picked from commit 8b29fc0b7a)
2015-09-10 14:53:20 +10:00
Mark Andrews
daec213a5c 4190. [protocol] Accept Active Diretory gc._msdcs.<forest> name as
valid with check-names.  <forest> still needs to be
                        LDH. [RT #40399]

(cherry picked from commit dc3912f3ca)
2015-08-22 15:28:09 +10:00
Mukund Sivaraman
ff82214714 Use unknown format when totext() is not implemented for any RDATA (#40317)
(cherry picked from commit ec3dbae9eb)
2015-08-18 20:13:55 +05:30
Mukund Sivaraman
9a88ab054b Fix assertion failure in parsing UNSPEC(103) RR from text (#40274)
(cherry picked from commit 984d2bb9e5)
2015-08-14 13:31:43 +05:30
Evan Hunt
a51bed6650 [v9_10] fix length check in OPENPGPKEY
4170.	[security]	An incorrect boundary check in the OPENPGPKEY
			rdatatype could trigger an assertion failure.
			[RT #40286]
2015-08-11 20:02:39 -07:00
Mark Andrews
19818edc45 don't use C++ keyword new; use (const char *) for output of strchr((const char *), char)
(cherry picked from commit d4422ec231)
2015-06-18 11:15:15 +10:00
Tinderbox User
4c15022601 update copyright notice / whitespace 2015-04-17 23:45:52 +00:00
Evan Hunt
0fdcf394cb [v9_10] misc x64 VS 2015 CTP fixes [#39308]
(cherry picked from commit ab973ec40c)
2015-04-17 15:32:05 -07:00
Mark Andrews
1809c690e3 3953. [bug] Don't escape semi-colon in TXT fields. [RT #37159]
(cherry picked from commit 9a36fb86f5)
2014-09-27 12:14:47 +10:00
Evan Hunt
a766d4c1d2 [v9_10] [36737] allow zero-length URI and CAA fields
3914.	[bug]		Allow the URI target and CAA value fields to
			be zero length. [RT #36737]

(cherry picked from commit cfe32752a6)
2014-08-06 17:41:16 -07:00
Evan Hunt
ad85db4051 [v9_10] [rt36642] fix URI RR format
3906.	[protocol]	Update URI record format to comply with
			draft-faltstrom-uri-08. [RT #36642]

(cherry picked from commit 7712d1660a)
2014-07-30 20:43:35 -07:00
Tinderbox User
79ad2fed7b update copyright notice 2014-07-29 23:45:45 +00:00
Evan Hunt
eb898fa698 [v9_10] add CAA rdata support
3056.	[protocol]	Added support for CAA record type (RFC 6844).
			[RT #36625]
2014-07-29 08:40:50 -07:00
Tinderbox User
431a83fb29 update copyright notice 2014-01-09 23:46:35 +00:00
Evan Hunt
e851ea8260 [master] replace memcpy() with memmove().
3698.	[cleanup]	Replaced all uses of memcpy() with memmove().
			[RT #35120]
2014-01-08 16:39:05 -08:00
Mark Andrews
c3c8823fed 3681. [port] Update the Windows build system to support feature
selection and WIN64 builds.  This is a work in
                        progress. [RT #34160]
2013-12-04 12:47:23 +11:00
Mark Andrews
1cc4695f0d 3547. [bug] Some malformed unknown rdata records were not properly
detected and rejected. [RT #33129]
2013-04-08 09:55:14 +10:00
Mark Andrews
6a528eaa09 remove dead code 2013-01-10 18:13:25 +11:00
Tinderbox User
b941edbeb5 update copyright notice 2013-01-09 23:45:53 +00:00
Mark Andrews
f1c1aab2c9 3457. [protocol] Add ILNP records (NID, LP, L32, L64). [RT #31836] 2013-01-10 08:26:31 +11:00
Tinderbox User
b8e2e5dd86 update copyright notice 2012-12-08 23:45:51 +00:00
Mark Andrews
e85702ce5b 3438. [bug] Don't accept unknown data escape in quotes. [RT #32031]
Squashed commit of the following:

commit 7ad3daade513c94a1c92ee7c91c112f161d13ef4
Author: Mark Andrews <marka@isc.org>
Date:   Mon Dec 3 15:03:44 2012 +1100

    look at the second token to determine if a TXT record in of unknown format or not

commit 7df32138462646f6aee84ffa56d02ac24ec8d672
Author: Mark Andrews <marka@isc.org>
Date:   Mon Dec 3 12:42:18 2012 +1100

    '"\#"' was incorrectly being treated as a unknown data escape sequence.
2012-12-08 14:05:32 +11:00
Mark Andrews
058e44186b 3387. [func] Support for a DS digest can be disabled at
runtime with disable-ds-digests. [RT #21581]
2012-10-03 12:38:43 +10:00
Mark Andrews
7e9d637131 3373. [bug] win32: open raw files in binary mode. [RT #30944] 2012-09-12 11:44:24 +10:00
Mark Andrews
1bbd36c4db 3364. [security] Named could die on specially crafted record.
[RT #30416]
2012-08-16 09:42:14 +10:00
Mark Andrews
735ca24fa6 3321. [security] dns_rdataslab_fromrdataset could produce bad
rdataslabs. [RT #29644]
2012-06-01 23:33:16 +10:00
Mark Andrews
c51f2c9a52 3297. [bug] Named could die on a malformed master file. [RT #28467] 2012-03-15 12:07:49 +11:00
Tinderbox User
5fa46bc916 update copyright notice 2012-03-10 23:45:53 +00:00
Mark Andrews
28a8f5b0de set $Id$ 2012-03-08 00:21:15 +11:00
Mark Andrews
a5a30ae7c0 3253. [bug] Return DNS_R_SYNTAX when the input to a text field is
too long. [RT #26956]
2011-12-22 07:41:29 +00:00
Mark Andrews
fe3472c80b 3191. [bug] Print NULL records using unknown format. [RT #26392] 2011-11-02 01:01:52 +00:00
Mark Andrews
0874abad14 3069. [cleanup] Silence warnings messages from clang static analysis.
[RT #20256]
2011-03-11 06:11:27 +00:00
Evan Hunt
9a859983d7 3062. [func] Made several changes to enhance human readability
of DNSSEC data in dig output and in generated
			zone files:
			 - DNSKEY record comments are more verbose, no
			   longer used in multiline mode only
			 - multiline RRSIG records reformatted
			 - multiline output mode for NSEC3PARAM records
			 - "dig +norrcomments" suppresses DNSKEY comments
			 - "dig +split=X" breaks hex/base64 records into
			   fields of width X; "dig +nosplit" disables this.
			[RT #22820]
2011-03-05 19:39:07 +00:00
Francis Dupont
9fe8cca065 add URI support 2011-03-03 14:10:27 +00:00
Mark Andrews
e01f55daa4 3030. [bug] dns_rdatatype_format() handle a zero sized buffer.
[RT #22521]
2011-02-21 06:41:07 +00:00
Automatic Updater
9cee5bb028 update copyright notice 2011-01-13 04:59:26 +00:00
Mark Andrews
38b84a1fcf 3007. [bug] Named failed to preserve the case of domain names in
rdata which is no compressable when writing master
                        files.  [RT #22863]
2011-01-13 00:55:49 +00:00
Automatic Updater
33cc94f04c update copyright notice 2010-11-17 23:47:09 +00:00
Mark Andrews
cd9d825a71 remove accidental commit 2010-11-16 05:38:31 +00:00
Mark Andrews
7965c00ca8 check for size equal zero in _format(), replace snprintf of a fixed string with strlcpy 2010-11-16 00:53:36 +00:00
Mark Andrews
3d17a3ba61 2801. [func] Detect and report records that are different according
to DNSSEC but are sematically equal according to plain
                        DNS.  Apply plain DNS comparisons rather than DNSSEC
                        comparisons when processing UPDATE requests.
                        dnssec-signzone now removes such semantically duplicate
                        records prior to signing the RRset.

                        named-checkzone -r {ignore|warn|fail} (default warn)
                        named-compilezone -r {ignore|warn|fail} (default warn)

                        named.conf: check-dup-records {ignore|warn|fail};
2009-12-04 21:09:34 +00:00
Mark Andrews
2847930722 2708. [func] Insecure to secure and NSEC3 parameter changes via
update are now fully supported and no longer require
                        defines to enable.  We now no longer overload the
                        NSEC3PARAM flag field, nor the NSEC OPT bit at the
                        apex.  Secure to insecure changes are controlled by
                        by the named.conf option 'secure-to-insecure'.

                        Warning: If you had previously enabled support by
                        adding defines at compile time to BIND 9.6 you should
                        ensure that all changes that are in progress have
                        completed prior to upgrading to BIND 9.7.  BIND 9.7
                        is not backwards compatible.
2009-10-08 23:13:07 +00:00
Automatic Updater
d7201de09b update copyright notice 2009-09-02 23:48:03 +00:00