mirror of
https://github.com/samba-team/samba.git
synced 2025-08-03 04:22:09 +03:00
werror: replace WERR_NOMEM with WERR_NOT_ENOUGH_MEMORY in source4/dns_server/
Guenther Signed-off-by: Guenther Deschner <gd@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
This commit is contained in:
committed by
Jeremy Allison
parent
ead4e90edb
commit
c1c079cf3d
@ -133,7 +133,7 @@ WERROR dns_verify_tsig(struct dns_server *dns,
|
|||||||
|
|
||||||
state->tsig = talloc_zero(state->mem_ctx, struct dns_res_rec);
|
state->tsig = talloc_zero(state->mem_ctx, struct dns_res_rec);
|
||||||
if (state->tsig == NULL) {
|
if (state->tsig == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
werror = dns_copy_tsig(state->tsig, &packet->additional[i],
|
werror = dns_copy_tsig(state->tsig, &packet->additional[i],
|
||||||
@ -154,7 +154,7 @@ WERROR dns_verify_tsig(struct dns_server *dns,
|
|||||||
state->key_name = talloc_strdup(state->mem_ctx,
|
state->key_name = talloc_strdup(state->mem_ctx,
|
||||||
state->tsig->name);
|
state->tsig->name);
|
||||||
if (state->key_name == NULL) {
|
if (state->key_name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
state->tsig_error = DNS_RCODE_BADKEY;
|
state->tsig_error = DNS_RCODE_BADKEY;
|
||||||
return DNS_ERR(NOTAUTH);
|
return DNS_ERR(NOTAUTH);
|
||||||
@ -167,24 +167,24 @@ WERROR dns_verify_tsig(struct dns_server *dns,
|
|||||||
*/
|
*/
|
||||||
state->key_name = talloc_strdup(state->mem_ctx, tkey->name);
|
state->key_name = talloc_strdup(state->mem_ctx, tkey->name);
|
||||||
if (state->key_name == NULL) {
|
if (state->key_name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* FIXME: check TSIG here */
|
/* FIXME: check TSIG here */
|
||||||
if (check_rec == NULL) {
|
if (check_rec == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* first build and verify check packet */
|
/* first build and verify check packet */
|
||||||
check_rec->name = talloc_strdup(check_rec, tkey->name);
|
check_rec->name = talloc_strdup(check_rec, tkey->name);
|
||||||
if (check_rec->name == NULL) {
|
if (check_rec->name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
check_rec->rr_class = DNS_QCLASS_ANY;
|
check_rec->rr_class = DNS_QCLASS_ANY;
|
||||||
check_rec->ttl = 0;
|
check_rec->ttl = 0;
|
||||||
check_rec->algorithm_name = talloc_strdup(check_rec, tkey->algorithm);
|
check_rec->algorithm_name = talloc_strdup(check_rec, tkey->algorithm);
|
||||||
if (check_rec->algorithm_name == NULL) {
|
if (check_rec->algorithm_name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
check_rec->time_prefix = 0;
|
check_rec->time_prefix = 0;
|
||||||
check_rec->time = state->tsig->rdata.tsig_record.time;
|
check_rec->time = state->tsig->rdata.tsig_record.time;
|
||||||
@ -215,7 +215,7 @@ WERROR dns_verify_tsig(struct dns_server *dns,
|
|||||||
buffer_len = packet_len + fake_tsig_blob.length;
|
buffer_len = packet_len + fake_tsig_blob.length;
|
||||||
buffer = talloc_zero_array(mem_ctx, uint8_t, buffer_len);
|
buffer = talloc_zero_array(mem_ctx, uint8_t, buffer_len);
|
||||||
if (buffer == NULL) {
|
if (buffer == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
memcpy(buffer, in->data, packet_len);
|
memcpy(buffer, in->data, packet_len);
|
||||||
@ -224,7 +224,7 @@ WERROR dns_verify_tsig(struct dns_server *dns,
|
|||||||
sig.length = state->tsig->rdata.tsig_record.mac_size;
|
sig.length = state->tsig->rdata.tsig_record.mac_size;
|
||||||
sig.data = talloc_memdup(mem_ctx, state->tsig->rdata.tsig_record.mac, sig.length);
|
sig.data = talloc_memdup(mem_ctx, state->tsig->rdata.tsig_record.mac, sig.length);
|
||||||
if (sig.data == NULL) {
|
if (sig.data == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Now we also need to count down the additional record counter */
|
/* Now we also need to count down the additional record counter */
|
||||||
@ -266,19 +266,19 @@ static WERROR dns_tsig_compute_mac(TALLOC_CTX *mem_ctx,
|
|||||||
size_t mac_size = 0;
|
size_t mac_size = 0;
|
||||||
|
|
||||||
if (check_rec == NULL) {
|
if (check_rec == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* first build and verify check packet */
|
/* first build and verify check packet */
|
||||||
check_rec->name = talloc_strdup(check_rec, tkey->name);
|
check_rec->name = talloc_strdup(check_rec, tkey->name);
|
||||||
if (check_rec->name == NULL) {
|
if (check_rec->name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
check_rec->rr_class = DNS_QCLASS_ANY;
|
check_rec->rr_class = DNS_QCLASS_ANY;
|
||||||
check_rec->ttl = 0;
|
check_rec->ttl = 0;
|
||||||
check_rec->algorithm_name = talloc_strdup(check_rec, tkey->algorithm);
|
check_rec->algorithm_name = talloc_strdup(check_rec, tkey->algorithm);
|
||||||
if (check_rec->algorithm_name == NULL) {
|
if (check_rec->algorithm_name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
check_rec->time_prefix = 0;
|
check_rec->time_prefix = 0;
|
||||||
check_rec->time = current_time;
|
check_rec->time = current_time;
|
||||||
@ -320,7 +320,7 @@ static WERROR dns_tsig_compute_mac(TALLOC_CTX *mem_ctx,
|
|||||||
|
|
||||||
buffer = talloc_zero_array(mem_ctx, uint8_t, buffer_len);
|
buffer = talloc_zero_array(mem_ctx, uint8_t, buffer_len);
|
||||||
if (buffer == NULL) {
|
if (buffer == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
p = buffer;
|
p = buffer;
|
||||||
@ -368,7 +368,7 @@ WERROR dns_sign_tsig(struct dns_server *dns,
|
|||||||
|
|
||||||
tsig = talloc_zero(mem_ctx, struct dns_res_rec);
|
tsig = talloc_zero(mem_ctx, struct dns_res_rec);
|
||||||
if (tsig == NULL) {
|
if (tsig == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (state->tsig_error == DNS_RCODE_OK) {
|
if (state->tsig_error == DNS_RCODE_OK) {
|
||||||
@ -387,7 +387,7 @@ WERROR dns_sign_tsig(struct dns_server *dns,
|
|||||||
|
|
||||||
tsig->name = talloc_strdup(tsig, state->key_name);
|
tsig->name = talloc_strdup(tsig, state->key_name);
|
||||||
if (tsig->name == NULL) {
|
if (tsig->name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
tsig->rr_class = DNS_QCLASS_ANY;
|
tsig->rr_class = DNS_QCLASS_ANY;
|
||||||
tsig->rr_type = DNS_QTYPE_TSIG;
|
tsig->rr_type = DNS_QTYPE_TSIG;
|
||||||
@ -409,14 +409,14 @@ WERROR dns_sign_tsig(struct dns_server *dns,
|
|||||||
if (packet->arcount == 0) {
|
if (packet->arcount == 0) {
|
||||||
packet->additional = talloc_zero(mem_ctx, struct dns_res_rec);
|
packet->additional = talloc_zero(mem_ctx, struct dns_res_rec);
|
||||||
if (packet->additional == NULL) {
|
if (packet->additional == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
packet->additional = talloc_realloc(mem_ctx, packet->additional,
|
packet->additional = talloc_realloc(mem_ctx, packet->additional,
|
||||||
struct dns_res_rec,
|
struct dns_res_rec,
|
||||||
packet->arcount + 1);
|
packet->arcount + 1);
|
||||||
if (packet->additional == NULL) {
|
if (packet->additional == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
werror = dns_copy_tsig(mem_ctx, tsig,
|
werror = dns_copy_tsig(mem_ctx, tsig,
|
||||||
|
@ -63,7 +63,7 @@ static WERROR add_response_rr(const char *name,
|
|||||||
*/
|
*/
|
||||||
ans = talloc_realloc(ans, ans, struct dns_res_rec, ai+1);
|
ans = talloc_realloc(ans, ans, struct dns_res_rec, ai+1);
|
||||||
if (ans == NULL) {
|
if (ans == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ZERO_STRUCT(ans[ai]);
|
ZERO_STRUCT(ans[ai]);
|
||||||
@ -115,7 +115,7 @@ static WERROR add_response_rr(const char *name,
|
|||||||
ans[ai].rdata.mx_record.exchange = talloc_strdup(
|
ans[ai].rdata.mx_record.exchange = talloc_strdup(
|
||||||
ans, rec->data.mx.nameTarget);
|
ans, rec->data.mx.nameTarget);
|
||||||
if (ans[ai].rdata.mx_record.exchange == NULL) {
|
if (ans[ai].rdata.mx_record.exchange == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_TXT:
|
case DNS_QTYPE_TXT:
|
||||||
@ -123,7 +123,7 @@ static WERROR add_response_rr(const char *name,
|
|||||||
&rec->data.txt,
|
&rec->data.txt,
|
||||||
&ans[ai].rdata.txt_record.txt);
|
&ans[ai].rdata.txt_record.txt);
|
||||||
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
@ -156,7 +156,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
|
|
||||||
dst = talloc_realloc(dst, dst, struct dns_res_rec, di+1);
|
dst = talloc_realloc(dst, dst, struct dns_res_rec, di+1);
|
||||||
if (dst == NULL) {
|
if (dst == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ZERO_STRUCT(dst[di]);
|
ZERO_STRUCT(dst[di]);
|
||||||
@ -170,7 +170,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
};
|
};
|
||||||
|
|
||||||
if (dst[di].name == NULL) {
|
if (dst[di].name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
switch (src->rr_type) {
|
switch (src->rr_type) {
|
||||||
@ -178,28 +178,28 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
dst[di].rdata.cname_record = talloc_strdup(
|
dst[di].rdata.cname_record = talloc_strdup(
|
||||||
dst, src->rdata.cname_record);
|
dst, src->rdata.cname_record);
|
||||||
if (dst[di].rdata.cname_record == NULL) {
|
if (dst[di].rdata.cname_record == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_A:
|
case DNS_QTYPE_A:
|
||||||
dst[di].rdata.ipv4_record = talloc_strdup(
|
dst[di].rdata.ipv4_record = talloc_strdup(
|
||||||
dst, src->rdata.ipv4_record);
|
dst, src->rdata.ipv4_record);
|
||||||
if (dst[di].rdata.ipv4_record == NULL) {
|
if (dst[di].rdata.ipv4_record == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_AAAA:
|
case DNS_QTYPE_AAAA:
|
||||||
dst[di].rdata.ipv6_record = talloc_strdup(
|
dst[di].rdata.ipv6_record = talloc_strdup(
|
||||||
dst, src->rdata.ipv6_record);
|
dst, src->rdata.ipv6_record);
|
||||||
if (dst[di].rdata.ipv6_record == NULL) {
|
if (dst[di].rdata.ipv6_record == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_TYPE_NS:
|
case DNS_TYPE_NS:
|
||||||
dst[di].rdata.ns_record = talloc_strdup(
|
dst[di].rdata.ns_record = talloc_strdup(
|
||||||
dst, src->rdata.ns_record);
|
dst, src->rdata.ns_record);
|
||||||
if (dst[di].rdata.ns_record == NULL) {
|
if (dst[di].rdata.ns_record == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_SRV:
|
case DNS_QTYPE_SRV:
|
||||||
@ -211,7 +211,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
dst, src->rdata.srv_record.target)
|
dst, src->rdata.srv_record.target)
|
||||||
};
|
};
|
||||||
if (dst[di].rdata.srv_record.target == NULL) {
|
if (dst[di].rdata.srv_record.target == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_SOA:
|
case DNS_QTYPE_SOA:
|
||||||
@ -229,7 +229,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
|
|
||||||
if ((dst[di].rdata.soa_record.mname == NULL) ||
|
if ((dst[di].rdata.soa_record.mname == NULL) ||
|
||||||
(dst[di].rdata.soa_record.rname == NULL)) {
|
(dst[di].rdata.soa_record.rname == NULL)) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
break;
|
break;
|
||||||
@ -237,7 +237,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
dst[di].rdata.ptr_record = talloc_strdup(
|
dst[di].rdata.ptr_record = talloc_strdup(
|
||||||
dst, src->rdata.ptr_record);
|
dst, src->rdata.ptr_record);
|
||||||
if (dst[di].rdata.ptr_record == NULL) {
|
if (dst[di].rdata.ptr_record == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_MX:
|
case DNS_QTYPE_MX:
|
||||||
@ -248,7 +248,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
};
|
};
|
||||||
|
|
||||||
if (dst[di].rdata.mx_record.exchange == NULL) {
|
if (dst[di].rdata.mx_record.exchange == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case DNS_QTYPE_TXT:
|
case DNS_QTYPE_TXT:
|
||||||
@ -256,7 +256,7 @@ static WERROR add_dns_res_rec(struct dns_res_rec **pdst,
|
|||||||
&src->rdata.txt_record.txt,
|
&src->rdata.txt_record.txt,
|
||||||
&dst[di].rdata.txt_record.txt);
|
&dst[di].rdata.txt_record.txt);
|
||||||
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
@ -816,12 +816,12 @@ static WERROR handle_tkey(struct dns_server *dns,
|
|||||||
|
|
||||||
ret_tkey = talloc_zero(mem_ctx, struct dns_res_rec);
|
ret_tkey = talloc_zero(mem_ctx, struct dns_res_rec);
|
||||||
if (ret_tkey == NULL) {
|
if (ret_tkey == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret_tkey->name = talloc_strdup(ret_tkey, in_tkey->name);
|
ret_tkey->name = talloc_strdup(ret_tkey, in_tkey->name);
|
||||||
if (ret_tkey->name == NULL) {
|
if (ret_tkey->name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret_tkey->rr_type = DNS_QTYPE_TKEY;
|
ret_tkey->rr_type = DNS_QTYPE_TKEY;
|
||||||
@ -831,7 +831,7 @@ static WERROR handle_tkey(struct dns_server *dns,
|
|||||||
ret_tkey->rdata.tkey_record.algorithm = talloc_strdup(ret_tkey,
|
ret_tkey->rdata.tkey_record.algorithm = talloc_strdup(ret_tkey,
|
||||||
in_tkey->rdata.tkey_record.algorithm);
|
in_tkey->rdata.tkey_record.algorithm);
|
||||||
if (ret_tkey->rdata.tkey_record.algorithm == NULL) {
|
if (ret_tkey->rdata.tkey_record.algorithm == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret_tkey->rdata.tkey_record.inception = in_tkey->rdata.tkey_record.inception;
|
ret_tkey->rdata.tkey_record.inception = in_tkey->rdata.tkey_record.inception;
|
||||||
@ -885,7 +885,7 @@ static WERROR handle_tkey(struct dns_server *dns,
|
|||||||
state->sign = true;
|
state->sign = true;
|
||||||
state->key_name = talloc_strdup(state->mem_ctx, tkey->name);
|
state->key_name = talloc_strdup(state->mem_ctx, tkey->name);
|
||||||
if (state->key_name == NULL) {
|
if (state->key_name == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
DEBUG(1, ("GSS key negotiation returned %s\n", nt_errstr(status)));
|
DEBUG(1, ("GSS key negotiation returned %s\n", nt_errstr(status)));
|
||||||
|
@ -272,7 +272,7 @@ static WERROR dns_process_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|||||||
drop:
|
drop:
|
||||||
*out = data_blob_talloc(mem_ctx, state->in->data, state->in->length);
|
*out = data_blob_talloc(mem_ctx, state->in->data, state->in->length);
|
||||||
if (out->data == NULL) {
|
if (out->data == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
out->data[2] |= 0x80; /* Toggle DNS_FLAG_REPLY */
|
out->data[2] |= 0x80; /* Toggle DNS_FLAG_REPLY */
|
||||||
out->data[3] |= state->dns_err;
|
out->data[3] |= state->dns_err;
|
||||||
|
@ -356,7 +356,7 @@ static WERROR dns_rr_to_dnsp(TALLOC_CTX *mem_ctx,
|
|||||||
&rrec->rdata.txt_record.txt,
|
&rrec->rdata.txt_record.txt,
|
||||||
&r->data.txt);
|
&r->data.txt);
|
||||||
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
|
|
||||||
break;
|
break;
|
||||||
|
@ -191,7 +191,7 @@ WERROR dns_generate_options(struct dns_server *dns,
|
|||||||
|
|
||||||
o = talloc_zero(mem_ctx, struct dns_res_rec);
|
o = talloc_zero(mem_ctx, struct dns_res_rec);
|
||||||
if (o == NULL) {
|
if (o == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
o->name = NULL;
|
o->name = NULL;
|
||||||
o->rr_type = DNS_QTYPE_OPT;
|
o->rr_type = DNS_QTYPE_OPT;
|
||||||
|
@ -83,7 +83,7 @@ WERROR dns_common_extract(const struct ldb_message_element *el,
|
|||||||
recs = talloc_zero_array(mem_ctx, struct dnsp_DnssrvRpcRecord,
|
recs = talloc_zero_array(mem_ctx, struct dnsp_DnssrvRpcRecord,
|
||||||
el->num_values);
|
el->num_values);
|
||||||
if (recs == NULL) {
|
if (recs == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
for (ri = 0; ri < el->num_values; ri++) {
|
for (ri = 0; ri < el->num_values; ri++) {
|
||||||
struct ldb_val *v = &el->values[ri];
|
struct ldb_val *v = &el->values[ri];
|
||||||
@ -162,7 +162,7 @@ WERROR dns_common_lookup(struct ldb_context *samdb,
|
|||||||
struct dnsp_DnssrvRpcRecord,
|
struct dnsp_DnssrvRpcRecord,
|
||||||
1);
|
1);
|
||||||
if (recs == NULL) {
|
if (recs == NULL) {
|
||||||
return WERR_NOMEM;
|
return WERR_NOT_ENOUGH_MEMORY;
|
||||||
}
|
}
|
||||||
recs[0] = (struct dnsp_DnssrvRpcRecord) {
|
recs[0] = (struct dnsp_DnssrvRpcRecord) {
|
||||||
.wType = DNS_TYPE_TOMBSTONE,
|
.wType = DNS_TYPE_TOMBSTONE,
|
||||||
|
Reference in New Issue
Block a user