BIND 10 trac1587, updated. 51146871aa0303636eff16193b66f61c80b9b7f8 [1587] some more documentation cleanups/additions

BIND 10 source code commits bind10-changes at lists.isc.org
Wed Feb 22 04:16:42 UTC 2012


The branch, trac1587 has been updated
       via  51146871aa0303636eff16193b66f61c80b9b7f8 (commit)
      from  2ec4a397f113081c96807b3138549bd4bf1e2edf (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 51146871aa0303636eff16193b66f61c80b9b7f8
Author: JINMEI Tatuya <jinmei at isc.org>
Date:   Tue Feb 21 20:16:16 2012 -0800

    [1587] some more documentation cleanups/additions

-----------------------------------------------------------------------

Summary of changes:
 src/bin/auth/query.cc |   14 +++++++-------
 src/bin/auth/query.h  |    5 ++++-
 2 files changed, 11 insertions(+), 8 deletions(-)

-----------------------------------------------------------------------
diff --git a/src/bin/auth/query.cc b/src/bin/auth/query.cc
index 55800a6..3474430 100644
--- a/src/bin/auth/query.cc
+++ b/src/bin/auth/query.cc
@@ -217,7 +217,7 @@ Query::addNSEC3ForName(ZoneFinder& finder, const Name& name, bool match) {
 void
 Query::addNXDOMAINProofByNSEC3(ZoneFinder& finder) {
     // Firstly get the NSEC3 proves for Closest Encloser Proof
-    // See section 7.2.1 of RFC 5155.
+    // See Section 7.2.1 of RFC 5155.
     const uint8_t closest_labels =
         addClosestEncloserProof(finder, qname_, false);
 
@@ -251,7 +251,7 @@ Query::addWildcardProof(ZoneFinder& finder,
                                fresult.rrset),
                            dnssec_);
     } else if (db_result.isNSEC3Signed()) {
-        // Case for RFC5155 Section 7.2.6.
+        // Case for RFC 5155 Section 7.2.6.
         //
         // Note that the closest encloser must be the immediate ancestor
         // of the matching wildcard, so NSEC3 for its next closer (and only
@@ -299,7 +299,7 @@ Query::addDS(ZoneFinder& finder, const Name& dname) {
         addNXRRsetProof(finder, ds_result);
     } else if (ds_result.code == ZoneFinder::NXRRSET &&
                ds_result.isNSEC3Signed()) {
-        // Add no DS proof with NSEC3 as specified in RFC5155 Section 7.2.7.
+        // Add no DS proof with NSEC3 as specified in RFC 5155 Section 7.2.7.
         addClosestEncloserProof(finder, dname, true);
     } else {
         // Any other case should be an error
@@ -321,15 +321,15 @@ Query::addNXRRsetProof(ZoneFinder& finder,
         }
     } else if (db_result.isNSEC3Signed() && !db_result.isWildcard()) {
         if (qtype_ == RRType::DS()) {
-            // RFC5155, 7.2.4.  Add either NSEC3 for the qname or closest
-            // (provable) encloser proof in case of optout.
+            // RFC 5155, Section 7.2.4.  Add either NSEC3 for the qname or
+            // closest (provable) encloser proof in case of optout.
             addClosestEncloserProof(finder, qname_, true);
         } else {
-            // RFC5155, 7.2.3.  Just add NSEC3 for the qname.
+            // RFC 5155, Section 7.2.3.  Just add NSEC3 for the qname.
             addNSEC3ForName(finder, qname_, true);
         }
     } else if (db_result.isNSEC3Signed() && db_result.isWildcard()) {
-        // Case for RFC5155 Section 7.2.5: add closest encloser proof for the
+        // Case for RFC 5155 Section 7.2.5: add closest encloser proof for the
         // qname, construct the matched wildcard name and add NSEC3 for it.
         const uint8_t closest_labels =
             addClosestEncloserProof(finder, qname_, false);
diff --git a/src/bin/auth/query.h b/src/bin/auth/query.h
index c98d300..e8d3ba8 100644
--- a/src/bin/auth/query.h
+++ b/src/bin/auth/query.h
@@ -253,7 +253,10 @@ private:
     /// only one of matching or covering NSEC3.  If \c match is true the
     /// returned NSEC3 must be a matching one; otherwise it must be a covering
     /// one.  If this assumption isn't met this method throws a BadNSEC3
-    /// exception.
+    /// exception (if it must be a matching NSEC3 but is not, it means a broken
+    /// zone, maybe with incorrect optout NSEC3s; if it must be a covering
+    /// NSEC3 but is not, it means a run time collision; or the \c findNSEC3()
+    /// implementation is broken for both cases.)
     void addNSEC3ForName(isc::datasrc::ZoneFinder& finder,
                          const isc::dns::Name& name, bool match);
 



More information about the bind10-changes mailing list