Commit Graph

201 Commits

Author SHA1 Message Date
Mark Andrews
5a5d7187e5 1930. [port] HPUX: ia64 support. [RT #15473]
1929.   [port]          FreeBSD: extend use of PTHREAD_SCOPE_SYSTEM.
2005-10-14 01:38:51 +00:00
Mark Andrews
6963c68e5f 1896. [bug] The cache could delete expired records too fast for
clients with a virtual time in the past. [RT #14991]
2005-07-07 02:58:53 +00:00
Mark Andrews
93ac517690 1886. [bug] Fix unreasonably low quantum on call to
dns_rbt_destroy2().  Remove unnecessay unhash_node()
                        call. [RT #14919]
2005-06-17 01:05:40 +00:00
Mark Andrews
abe67930fc 1847. [bug] isc_ondestroy_init() is called too late in
in dns_rbtdb_create()/dns_rbtdb_create().
                        [RT #13661]
2005-04-01 07:08:18 +00:00
Mark Andrews
242ef7b98a update copyright notice 2005-03-17 03:58:33 +00:00
Mark Andrews
b5db10b35d 1825. [bug] Missing unlock on out of memory error from in
rbtdb.c:subtractrdataset().  [RT #13519]
2005-03-15 00:34:42 +00:00
Mark Andrews
4c7910ecc0 1643. [bug] dns_db_closeversion() could leak memory / node
references. [RT #11163]
2004-05-23 11:07:23 +00:00
Mark Andrews
c95fa7d1d8 1606. [bug] DVL insecurity proof was failing.
1605.   [func]          New dns_db_find() option DNS_DBFIND_COVERINGNSEC.
2004-05-14 05:06:42 +00:00
Mark Andrews
c75e60d409 1637. [bug] Node reference leak on error in addnoqname(). 2004-05-14 01:16:08 +00:00
Mark Andrews
44058ba2e1 1625. [bug] named failed to load/transfer RFC2535 signed zones
which contained CNAMES. [RT# 11237]
2004-05-05 01:32:17 +00:00
Mark Andrews
a821d5fa3d DNSSEC bis merge from HEAD:
1581.  [func]          Disable DNSSEC support by default.  To enable
                       DNSSEC specify "enable-dnssec yes;" in named.conf.

1565.  [bug]           CD flag should be copied to outgoing queries unless
                       the query is under a secure entry point in which case
                       CD should be set.

1558.  [func]          New DNSSEC 'disable-algorithms'.  Support entry into
                       child zones for which we don't have a supported
                       algorithm.  Such child zones are treated as unsigned.

1557.  [func]          Implement missing DNSSEC tests for
                       * NOQNAME proof with wildcard answers.
                       * NOWILDARD proof with NXDOMAIN.
                       Cache and return NOQNAME with wildcard answers.

1541.  [func]          NSEC now uses new bitmap format.

1519.  [bug]           dnssec-signzone:nsec_setbit() computed the wrong
                       length of the new bitmap.

1516.  [func]          Roll the DNSSEC types to RRSIG, NSEC and DNSKEY.
2004-03-08 02:08:05 +00:00
Mark Andrews
cbdd3a318b update lib copyrights 2004-03-06 08:15:48 +00:00
Mark Andrews
ed5f057fd5 1580. [bug] Zone destuction on final detach takes a long time.
[RT #3746]

1579.   [bug]           Multiple task managers could not be created.
2004-03-04 06:56:19 +00:00
Mark Andrews
720af7a861 1583. [bug] Records add via UPDATE failed to get the correct trust
level. [RT #10452]
2004-03-04 02:43:36 +00:00
Mark Andrews
524bcb6dd5 1555. [func] 'rrset-order cyclic' no longer has a random starting
point. [RT #7572]
2004-01-12 04:29:42 +00:00
Mark Andrews
00597dcdac want free should be initaliased to ISC_FALSE. 2003-10-17 05:37:20 +00:00
Mark Andrews
69acffbb19 sync with HEAD 2003-10-14 03:48:11 +00:00
Mark Andrews
29b64bdae2 1523. [bug] Fix race condition in rbtdb. [RT# 9189] 2003-10-08 01:22:51 +00:00
Mark Andrews
57b54234cd sizeof style 2003-09-11 00:18:18 +00:00
Mark Andrews
56ccb82277 pullup:
When a lookup resulted in an nxrrset match of a wildcard, the wildcard
attribute wasn't set on foundname.
2003-08-21 06:48:26 +00:00
Mark Andrews
e6bb021434 1354. [bug] Fix DNSSEC wildcard proof for CNAME/DNAME. 2003-08-19 04:11:24 +00:00
Mark Andrews
d930eaf77b 1331. [func] Generate DNSSEC wildcard proofs. 2003-08-18 07:35:54 +00:00
Mark Andrews
f4d86cfcea update_copyrights 2003-07-22 04:03:54 +00:00
Mark Andrews
4b577580a0 1461. [bug] Remove deadlock from rbtdb code. [RT #5599] 2003-05-15 06:08:41 +00:00
Mark Andrews
55706e3839 1447. [bug] We were casting (unsigned int) to and from (void *).
rdataset->private4 is now rdataset->privateuint4
                        to reflect a type change.
2003-05-15 04:52:05 +00:00
Mark Andrews
b0fa111079 1448. [bug] Handle empty wildcards labels. 2003-05-14 06:51:38 +00:00
Mark Andrews
6fd5b7a222 1416. [bug] Empty node should return NOERROR NODATA, not NXDOMAIN.
[RT #4715]
2003-05-14 05:47:24 +00:00
Mark Andrews
90782106f2 1411. [bug] empty nodes should stop wildcard matches. [RT #4802] 2003-05-14 04:53:00 +00:00
Mark Andrews
ee879f2763 1429. [bug] Prevent the cache getting locked to old servers. 2003-05-13 03:57:53 +00:00
Mark Andrews
9631f485ae pullup:
1387.   [bug]           named could crash due to an access to invalid memory
                        space (which caused an assertion failure) in
                        incremental cleaning.  [RT #3588]
2003-05-12 03:22:44 +00:00
Mark Andrews
891c424e56 update_copyrights 2002-08-05 06:57:16 +00:00
Mark Andrews
456813d719 reviewed: bwelling
1307.   [bug]           REQUIRE that DNS_DBADD_MERGE only be set when adding
                        a rdataset to a zone db in the rbtdb implementation of
                        addrdataset.
2002-07-10 07:03:04 +00:00
Mark Andrews
fefab489c7 pullup:
1129.   [bug]           Multithreaded servers could crash under heavy
                        resolution load due to a race condition. [RT #2018]
2001-11-16 11:04:38 +00:00
Mark Andrews
440906ce59 INSIST that the rdataset is unassociated. 2001-08-27 03:58:44 +00:00
David Lawrence
163e27991b Revert part of the ISC_MAGIC/ISC_MAGIC_VALID change. Because
common.impmagic is not the first four bytes of the struct,
ISC_MAGIC_VALID() cannot be used.
2001-06-04 20:57:25 +00:00
David Lawrence
92ef1a9b9d use ISC_MAGIC for all magic numbers, for our friends in EBCDIC land 2001-06-04 19:33:39 +00:00
Bob Halley
4e9d4ceadf Take two of new semantics for ANY queries at zone cut points. Now doing
an ANY query at a zone cut point will return a delegation, except if
DNS_DBFIND_GLUEOK is set, in which case DNS_R_ZONECUT will be returned as
before.  Someday it would probably be a good idea to get rid of DNS_R_ZONECUT
entirely and just return DNS_R_GLUE in that case, but I was afraid to do
that now since it might break things.  These changes pass all system tests.
2001-05-15 05:35:27 +00:00
Andreas Gustafsson
0d205b805a backed out changes to handling of DNS_DBFIND_VALIDATEGLUE
option in previous commit - they broke DNS_DBFIND_GLUEOK lookups,
causing several of the system tests to fail
2001-05-15 03:52:31 +00:00
Bob Halley
751aa24c98 only return DNS_R_ZONECUT from secure zones 2001-05-14 19:25:59 +00:00
Andreas Gustafsson
17ed6b7945 when subtracting a nonempty rdataset from a nonexistent rdataset
and the DNS_DBSUB_EXACT flag, dns_db_subtractrdataset() should return
DNS_R_NOTEXACT, not DNS_R_UNCHANGED.
2001-05-10 16:26:07 +00:00
David Lawrence
e40cd7f5c9 preserve a reference to the node lock across a call to no_references() in
detachnode
2001-05-05 02:42:38 +00:00
Bob Halley
38d21a360a only reacquire the lock in no_references() if we actually gave it up 2001-04-24 17:03:54 +00:00
David Lawrence
ed1c40264e sigh. do not set the lock from node->locknum until being sure node is not null 2001-04-20 21:22:09 +00:00
David Lawrence
a0e1f68e14 Now that no_references() reacquires the node lock after deleting the node,
all of its callers need to maintain a reference to the lock that doesn't
involve looking at node->locknum after no_references() was called.
2001-04-20 14:35:04 +00:00
David Lawrence
f6f8d61a77 reacquire the node lock the caller held before returning from no_references() 2001-04-18 08:06:11 +00:00
David Lawrence
0109515495 use ISC_TF() to set an isc_boolean_t 2001-04-12 22:58:34 +00:00
David Lawrence
383b800c62 Fixed up iteration problems related to name cleaning. In a nutshell,
the node at the end of a chain always needed to have its reference
count incremented, not only when the iterator was paused.  [RT #1007]
2001-04-11 22:17:38 +00:00
Brian Wellington
414d289686 oops, cut-and-paste-o 2001-03-30 00:34:52 +00:00
Brian Wellington
e0bab4386b Treat a zone as secure only if it has a zone key and a signed NXT at the apex. 2001-03-30 00:33:39 +00:00
Andreas Gustafsson
b52a5b0630 790. [bug] Wildcards created using dynamic update or IXFR
could fail to match. [RT #1111]
2001-03-27 00:06:34 +00:00