2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-29 05:28:00 +00:00

592 Commits

Author SHA1 Message Date
Mukund Sivaraman
b0ba1a6059 Use mnemonics for RR class and type comparisons (#40297) 2015-08-17 12:23:35 +05:30
Tinderbox User
288c18263f update copyright notice / whitespace 2015-08-14 23:45:27 +00:00
Mukund Sivaraman
474921d733 Fix assertion failure in parsing NSAP records from text 2015-08-14 13:11:26 +05:30
Tinderbox User
ed91aca9e6 update copyright notice / whitespace 2015-08-12 23:45:25 +00:00
Evan Hunt
9b8f93083d [master] fix tsig class checks
4171.	[bug]		Fixed incorrect class checks in TSIG RR
			implementation. [RT #40287]
2015-08-11 22:16:44 -07:00
Evan Hunt
c707e2b986 [master] fix length check in OPENPGPKEY
4170.	[security]	An incorrect boundary check in the OPENPGPKEY
			rdatatype could trigger an assertion failure.
			[RT #40286]
2015-08-11 20:01:44 -07:00
Tinderbox User
9ab5a7d83c update copyright notice / whitespace 2015-07-07 23:45:22 +00:00
Mark Andrews
3e33f4198d 4154. [bug] A OPT record should be included with the FORMERR
response when there is a malformed EDNS option.
                        [RT #39647]

4153.   [bug]           Dig should zero non significant +subnet bits.  Check
                        that non significant ECS bits are zero on receipt.
                        [RT #39647]
2015-07-06 12:52:37 +10:00
Mark Andrews
ce67023ae3 4152. [func] Implement DNS COOKIE option. This replaces the
experimental SIT option of BIND 9.10.  The following
                        named.conf directives are avaliable: send-cookie,
                        cookie-secret, cookie-algorithm and nocookie-udp-size.
                        The following dig options are available:
                        +[no]cookie[=value] and +[no]badcookie.  [RT #39928]
2015-07-06 09:44:24 +10:00
Tinderbox User
6e61135f10 update copyright notice / whitespace 2015-03-27 23:45:21 +00:00
Mukund Sivaraman
f9f81abff0 Fix a crash while parsing malformed CAA RRs in presentation format (#39003) 2015-03-27 10:32:03 +05:30
Tinderbox User
5e93bad21b update copyright notice / whitespace 2015-03-01 23:45:20 +00:00
Mark Andrews
af669cb4fd 4074. [cleanup] Cleaned up more warnings from gcc -Wshadow. [RT #38708] 2015-02-27 10:55:55 +11:00
Mark Andrews
072ce62d23 used unsigned zero 2015-02-19 15:42:29 +11:00
Tinderbox User
29756974c5 update copyright notice / whitespace 2015-02-06 23:45:21 +00:00
Evan Hunt
591389c7d4 [master] 5011 tests and fixes
4056.	[bug]		Expanded automatic testing of trust anchor
			management and fixed several small bugs including
			a memory leak and a possible loss of key state
			information. [RT #38458]

4055.	[func]		"rndc managed-keys" can be used to check status
			of trust anchors or to force keys to be refreshed,
			Also, the managed keys data file has easier-to-read
			comments.  [RT #38458]
2015-02-05 17:18:15 -08:00
Tinderbox User
f72460c717 update copyright notice / whitespace 2015-01-30 23:45:24 +00:00
Mark Andrews
e77ef50a57 4049. [bug] CDS and CDNSKEY had the wrong attributes. [RT #38491] 2015-01-30 21:48:28 +11:00
Tinderbox User
c110d61b17 update copyright notice / whitespace 2015-01-20 23:45:26 +00:00
Evan Hunt
11463c0ac2 [master] clean up gcc -Wshadow warnings
4039.	[cleanup]	Cleaned up warnings from gcc -Wshadow. [RT #37381]
2015-01-20 13:29:18 -08:00
Tinderbox User
055f6517b4 update copyright notice / whitespace 2014-12-19 23:45:22 +00:00
Mark Andrews
1e0ed0c6f5 4024. [bug] dns_rdata_opt_first, dns_rdata_opt_next,
dns_rdata_opt_current, dns_rdata_txt_first,
                        dns_rdata_txt_next and dns_rdata_txt_current were
                        documented but not implemented.  These have now been
                        implemented.

                        dns_rdata_spf_first, dns_rdata_spf_next and
                        dns_rdata_spf_current were document but not
                        implemented.  The prototypes for these
                        functions have been removed. [RT #38068]

4023.   [bug]           win32: socket handling with explict ports and
                        invoking named with -4 was broken for some
                        configurations. [RT #38068]
2014-12-19 11:35:07 +11:00
Mukund Sivaraman
47d837a499 Make named a singleton process [RT#37908]
Conflicts:
	bin/tests/system/conf.sh.in
	lib/dns/win32/libdns.def.in
	lib/isc/win32/file.c

The merge also needed to update files in legacy and tcp system tests
(newly introduced in master after branch was created) to introduce use
of lockfile.
2014-12-18 12:31:25 +05:30
Tinderbox User
5781d00939 update copyright notice 2014-11-04 23:45:20 +00:00
Mark Andrews
a31d0513c3 add missing opening bracket 2014-11-04 17:02:32 +11:00
Mark Andrews
1feee79e1f 3997. [protocol] Add OPENGPGKEY record. [RT# 37671] 2014-11-04 12:24:39 +11:00
Evan Hunt
0c2313eb36 [master] fixes to checkconf test, HIP casecompare
3933.	[bug]		Corrected the implementation of dns_rdata_casecompare()
			for the HIP rdata type.  [RT #36911]

3932.	[test]		Improved named-checkconf tests. [RT #36911]
2014-08-27 21:36:13 -07:00
Evan Hunt
cfe32752a6 [master] [36737] allow zero-length URI and CAA fields
3914.	[bug]		Allow the URI target and CAA value fields to
			be zero length. [RT #36737]
2014-08-06 17:40:42 -07:00
Evan Hunt
7712d1660a [master] [rt36642] fix URI RR format
3906.	[protocol]	Update URI record format to comply with
			draft-faltstrom-uri-08. [RT #36642]
2014-07-30 20:41:59 -07:00
Tinderbox User
d1b499c827 update copyright notice 2014-07-29 23:45:20 +00:00
Evan Hunt
c1e42fa06d [master] use correct length 2014-07-29 15:24:39 -07:00
Evan Hunt
2383eb5272 [master] add CAA rdata support
3056.	[protocol]	Added support for CAA record type (RFC 6844).
			[RT #36625]
2014-07-29 08:40:35 -07:00
Tinderbox User
5a31767b09 update copyright notice 2014-06-19 23:45:23 +00:00
Evan Hunt
cac2181160 [master] CDS/CDNSKEY rrtypes
3884.	[protocol]	Add CDS and CDNSKEY record types. [RT #36333]
2014-06-19 00:35:11 -07:00
Tinderbox User
4ded8003e3 update copyright notice 2014-06-12 23:45:22 +00:00
Mark Andrews
1208790272 make lhs unsigned 2014-06-12 11:12:22 +10:00
Mark Andrews
8a2ff13c3d add INSISTs to silence tainted data false positive in Coverity 2014-06-12 10:42:39 +10:00
Tinderbox User
889eb2e055 update copyright notice 2014-06-11 23:45:23 +00:00
Mark Andrews
23fe5cbb07 pass rng to destroy 2014-06-11 22:57:46 +10:00
Mark Andrews
0e338b60cd 3843. [protocol] Check EDNS EXPIRE option in dns_rdata_fromwire.
[RT #35969]

Conflicts:
	CHANGES
2014-05-13 21:57:40 +10:00
Tinderbox User
37f7c4c673 update copyright notice 2014-04-24 23:45:21 +00:00
Mark Andrews
36e5ac0033 3819. [bug] NSEC3 hashes need to be able to be entered and
displayed without padding.  This is not a issue for
                        currently defined algorithms but may be for future
                        hash algorithms. [RT #27925]
2014-04-24 18:58:03 +10:00
Mark Andrews
45b8dc626a add #ifdef notdef check of DNS_OPT_EXPIRE length 2014-02-20 15:06:49 +11:00
Tinderbox User
56af756b6c update copyright notice 2014-02-14 23:46:27 +00:00
Evan Hunt
f2ea8c2f96 [master] updated published drafts 2014-02-14 08:53:06 -08:00
Mark Andrews
e20788e121 update copyrights 2014-01-16 15:19:24 +11:00
Tinderbox User
b269de36be update copyright notice 2014-01-15 23:46:24 +00:00
Mark Andrews
d8b83f0e2b silence compiler warning 2014-01-15 12:40:09 +11:00
Tinderbox User
bf0266f286 update copyright notice 2014-01-14 23:46:22 +00:00
Evan Hunt
ba751492fc [master] native PKCS#11 support
3705.	[func]		"configure --enable-native-pkcs11" enables BIND
			to use the PKCS#11 API for all cryptographic
			functions, so that it can drive a hardware service
			module directly without the need to use a modified
			OpenSSL as intermediary (so long as the HSM's vendor
			provides a complete-enough implementation of the
			PKCS#11 interface). This has been tested successfully
			with the Thales nShield HSM and with SoftHSMv2 from
			the OpenDNSSEC project. [RT #29031]
2014-01-14 15:40:56 -08:00