};
struct dlz_bind9_data *state = private_ptr;
int isc_log_level;
-
+
if (msg_level >= ARRAY_SIZE(isc_log_map) || msg_level < 0) {
isc_log_level = ISC_LOG_INFO;
} else {
denied_clients = lpcfg_dns_zone_transfer_clients_deny(state->lp);
/* The logic of allow_access() when both allow and deny lists are given
- * does not match our expectation here: it would allow clients thar are
+ * does not match our expectation here: it would allow clients that are
* neither allowed nor denied.
* Here, we want to deny clients by default.
* Using the allow_access() function is still useful as it takes care of
- * parsing IP adresses and subnets in a consistent way with other options
+ * parsing IP addresses and subnets in a consistent way with other options
* from smb.conf.
*
* We will then check the deny list first, then the allow list, so that
- * we accept only clients that are explicitely allowed AND not explicitely
+ * we accept only clients that are explicitly allowed AND not explicitly
* denied.
*/
if ((authorized_clients == NULL) && (denied_clients == NULL)) {
}
/*
- * The SOA record is alwas stored under DC=@,DC=zonename
+ * The SOA record is always stored under DC=@,DC=zonename
* This can probably be removed when dns_common_lookup makes a fallback
* lookup on @ pseudo record
*/
* dns_common_replace() will work out whether to bump the
* timestamp or not. But to do that, we need to tell it the
* old timestamp.
- */
+ */
if (! dns_name_is_static(recs, num_recs)) {
rec->dwTimeStamp = recs[i].dwTimeStamp;
}
bool found = false;
struct dnsp_DnssrvRpcRecord *rec = NULL;
struct dnsp_DnssrvRpcRecord *ans;
- uint16_t acount;
+ uint16_t a_count;
size_t host_part_len = 0;
if (pr->rr_type == DNS_QTYPE_ALL) {
/*
*/
- werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &acount);
+ werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &a_count);
if (W_ERROR_EQUAL(werror, WERR_DNS_ERROR_NAME_DOES_NOT_EXIST)) {
return DNS_ERR(NAME_ERROR);
}
W_ERROR_NOT_OK_RETURN(werror);
- if (acount == 0) {
+ if (a_count == 0) {
return DNS_ERR(NAME_ERROR);
}
} else {
/*
*/
- werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &acount);
+ werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &a_count);
if (W_ERROR_EQUAL(werror, WERR_DNS_ERROR_NAME_DOES_NOT_EXIST)) {
return DNS_ERR(NXRRSET);
}
}
W_ERROR_NOT_OK_RETURN(werror);
- for (i = 0; i < acount; i++) {
+ for (i = 0; i < a_count; i++) {
if (ans[i].wType == (enum dns_record_type) pr->rr_type) {
found = true;
break;
if (pr->rr_type == DNS_QTYPE_ALL) {
/*
*/
- werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &acount);
+ werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &a_count);
if (W_ERROR_EQUAL(werror, WERR_OK)) {
return DNS_ERR(YXDOMAIN);
}
} else {
/*
*/
- werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &acount);
+ werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &a_count);
if (W_ERROR_EQUAL(werror, WERR_DNS_ERROR_NAME_DOES_NOT_EXIST)) {
werror = WERR_OK;
}
werror = WERR_OK;
}
- for (i = 0; i < acount; i++) {
+ for (i = 0; i < a_count; i++) {
if (ans[i].wType == (enum dns_record_type) pr->rr_type) {
found = true;
break;
*final_result = false;
- werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &acount);
+ werror = dns_lookup_records(dns, mem_ctx, dn, &ans, &a_count);
if (W_ERROR_EQUAL(werror, WERR_DNS_ERROR_NAME_DOES_NOT_EXIST)) {
return DNS_ERR(NXRRSET);
}
rec = talloc_zero(mem_ctx, struct dnsp_DnssrvRpcRecord);
W_ERROR_HAVE_NO_MEMORY(rec);
- werror = dns_rr_to_dnsp(rec, pr, rec, dns_name_is_static(ans, acount));
+ werror = dns_rr_to_dnsp(rec, pr, rec, dns_name_is_static(ans, a_count));
W_ERROR_NOT_OK_RETURN(werror);
- for (i = 0; i < acount; i++) {
+ for (i = 0; i < a_count; i++) {
if (dns_record_match(rec, &ans[i])) {
found = true;
break;