diff options
author | 2015-02-10 22:07:42 +0000 | |
---|---|---|
committer | 2015-02-10 22:07:42 +0000 | |
commit | 3b25f654de6d005456a80337983ec4bd86c64d81 (patch) | |
tree | d1519939a76712e8e2778f9e38b570f7ee63fb8d /usr.sbin/unbound/validator/val_utils.c | |
parent | Merge in a commit from upstream.. (diff) | |
download | wireguard-openbsd-3b25f654de6d005456a80337983ec4bd86c64d81.tar.xz wireguard-openbsd-3b25f654de6d005456a80337983ec4bd86c64d81.zip |
Merge in a commit from upstream..
- Fix validation failure in case upstream forwarder (ISC BIND) does
not have the same trust anchors and decides to insert unsigned NS
record in authority section.
ok sthen@
Diffstat (limited to 'usr.sbin/unbound/validator/val_utils.c')
-rw-r--r-- | usr.sbin/unbound/validator/val_utils.c | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/usr.sbin/unbound/validator/val_utils.c b/usr.sbin/unbound/validator/val_utils.c index ecf2dfaf05c..475b0c9054e 100644 --- a/usr.sbin/unbound/validator/val_utils.c +++ b/usr.sbin/unbound/validator/val_utils.c @@ -846,6 +846,18 @@ val_fill_reply(struct reply_info* chase, struct reply_info* orig, chase->ar_numrrsets; } +void val_reply_remove_auth(struct reply_info* rep, size_t index) +{ + log_assert(index < rep->rrset_count); + log_assert(index >= rep->an_numrrsets); + log_assert(index < rep->an_numrrsets+rep->ns_numrrsets); + memmove(rep->rrsets+index, rep->rrsets+index+1, + sizeof(struct ub_packed_rrset_key*)* + (rep->rrset_count - index - 1)); + rep->ns_numrrsets--; + rep->rrset_count--; +} + void val_check_nonsecure(struct val_env* ve, struct reply_info* rep) { |