BIND 10 trac1584review, updated. 80df2d4fcda75c7b9e8ca0e8d2e4824c13ff2867 [1584review] corrected indentation per the guideline.

BIND 10 source code commits bind10-changes at lists.isc.org
Thu Feb 16 22:35:28 UTC 2012


The branch, trac1584review has been updated
       via  80df2d4fcda75c7b9e8ca0e8d2e4824c13ff2867 (commit)
      from  4851408343c11ba763b1c7e4318ef68f1e3393fc (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 80df2d4fcda75c7b9e8ca0e8d2e4824c13ff2867
Author: JINMEI Tatuya <jinmei at isc.org>
Date:   Thu Feb 16 14:35:19 2012 -0800

    [1584review] corrected indentation per the guideline.

-----------------------------------------------------------------------

Summary of changes:
 src/bin/auth/query.cc |   74 ++++++++++++++++++++++++------------------------
 1 files changed, 37 insertions(+), 37 deletions(-)

-----------------------------------------------------------------------
diff --git a/src/bin/auth/query.cc b/src/bin/auth/query.cc
index 4fb1c6f..4e0d7e3 100644
--- a/src/bin/auth/query.cc
+++ b/src/bin/auth/query.cc
@@ -171,43 +171,43 @@ void
 Query::addWildcardProof(ZoneFinder& finder,
                         const ZoneFinder::FindResult& db_result)
 {
-	// The query name shouldn't exist in the zone if there were no wildcard
-	// substitution.  Confirm that by specifying NO_WILDCARD.  It should result
-	// in NXDOMAIN and an NSEC RR that proves it should be returned.
-	if (db_result.isNSECSigned() && db_result.isWildcard()){
-		const ZoneFinder::FindResult fresult =
-                    finder.find(qname_, RRType::NSEC(),
-                                dnssec_opt_ | ZoneFinder::NO_WILDCARD);
-		if (fresult.code != ZoneFinder::NXDOMAIN || !fresult.rrset ||
-                    fresult.rrset->getRdataCount() == 0) {
-                    isc_throw(BadNSEC,
-                              "Unexpected NSEC result for wildcard proof");
-		}
-		response_.addRRset(Message::SECTION_AUTHORITY,
-                                   boost::const_pointer_cast<AbstractRRset>(
-                                       fresult.rrset),
-                                   dnssec_);
-	} else if (db_result.isNSEC3Signed() && db_result.isWildcard()) {
-            // case for RFC5155 Section 7.2.6
-            const ZoneFinder::FindNSEC3Result NSEC3Result(
-                finder.findNSEC3(qname_, true));
-		if (NULL == NSEC3Result.next_proof) {
-			isc_throw(BadNSEC3, "Unexpected NSEC3 "
-                                  "result for wildcard proof");
-		}
-		response_.addRRset(Message::SECTION_AUTHORITY,
-                                   boost::const_pointer_cast<AbstractRRset>(
-                                       NSEC3Result.next_proof), dnssec_);
-		const Name wname =
-                    qname_.split(qname_.getLabelCount() -
-                                 NSEC3Result.closest_labels - 1);
-		const ZoneFinder::FindNSEC3Result wresult(
-                    finder.findNSEC3(wname, false));
-		if (wresult.matched) {
-			isc_throw(BadNSEC3, "Unexpected NSEC3 "
-                                  "found for existing domain " << wname);
-		}
-	}
+    // The query name shouldn't exist in the zone if there were no wildcard
+    // substitution.  Confirm that by specifying NO_WILDCARD.  It should result
+    // in NXDOMAIN and an NSEC RR that proves it should be returned.
+    if (db_result.isNSECSigned() && db_result.isWildcard()){
+        const ZoneFinder::FindResult fresult =
+            finder.find(qname_, RRType::NSEC(),
+                        dnssec_opt_ | ZoneFinder::NO_WILDCARD);
+        if (fresult.code != ZoneFinder::NXDOMAIN || !fresult.rrset ||
+            fresult.rrset->getRdataCount() == 0) {
+            isc_throw(BadNSEC,
+                      "Unexpected NSEC result for wildcard proof");
+        }
+        response_.addRRset(Message::SECTION_AUTHORITY,
+                           boost::const_pointer_cast<AbstractRRset>(
+                               fresult.rrset),
+                           dnssec_);
+    } else if (db_result.isNSEC3Signed() && db_result.isWildcard()) {
+        // case for RFC5155 Section 7.2.6
+        const ZoneFinder::FindNSEC3Result NSEC3Result(
+            finder.findNSEC3(qname_, true));
+        if (NULL == NSEC3Result.next_proof) {
+            isc_throw(BadNSEC3, "Unexpected NSEC3 "
+                      "result for wildcard proof");
+        }
+        response_.addRRset(Message::SECTION_AUTHORITY,
+                           boost::const_pointer_cast<AbstractRRset>(
+                               NSEC3Result.next_proof), dnssec_);
+        const Name wname =
+            qname_.split(qname_.getLabelCount() -
+                         NSEC3Result.closest_labels - 1);
+        const ZoneFinder::FindNSEC3Result wresult(
+            finder.findNSEC3(wname, false));
+        if (wresult.matched) {
+            isc_throw(BadNSEC3, "Unexpected NSEC3 "
+                      "found for existing domain " << wname);
+        }
+    }
 }
 
 void



More information about the bind10-changes mailing list