summaryrefslogtreecommitdiffstats
path: root/usr.sbin/unbound/validator/val_utils.c
diff options
context:
space:
mode:
authorbrad <brad@openbsd.org>2015-02-10 22:07:42 +0000
committerbrad <brad@openbsd.org>2015-02-10 22:07:42 +0000
commit3b25f654de6d005456a80337983ec4bd86c64d81 (patch)
treed1519939a76712e8e2778f9e38b570f7ee63fb8d /usr.sbin/unbound/validator/val_utils.c
parentMerge in a commit from upstream.. (diff)
downloadwireguard-openbsd-3b25f654de6d005456a80337983ec4bd86c64d81.tar.xz
wireguard-openbsd-3b25f654de6d005456a80337983ec4bd86c64d81.zip
Merge in a commit from upstream..
- Fix validation failure in case upstream forwarder (ISC BIND) does not have the same trust anchors and decides to insert unsigned NS record in authority section. ok sthen@
Diffstat (limited to 'usr.sbin/unbound/validator/val_utils.c')
-rw-r--r--usr.sbin/unbound/validator/val_utils.c12
1 files changed, 12 insertions, 0 deletions
diff --git a/usr.sbin/unbound/validator/val_utils.c b/usr.sbin/unbound/validator/val_utils.c
index ecf2dfaf05c..475b0c9054e 100644
--- a/usr.sbin/unbound/validator/val_utils.c
+++ b/usr.sbin/unbound/validator/val_utils.c
@@ -846,6 +846,18 @@ val_fill_reply(struct reply_info* chase, struct reply_info* orig,
chase->ar_numrrsets;
}
+void val_reply_remove_auth(struct reply_info* rep, size_t index)
+{
+ log_assert(index < rep->rrset_count);
+ log_assert(index >= rep->an_numrrsets);
+ log_assert(index < rep->an_numrrsets+rep->ns_numrrsets);
+ memmove(rep->rrsets+index, rep->rrsets+index+1,
+ sizeof(struct ub_packed_rrset_key*)*
+ (rep->rrset_count - index - 1));
+ rep->ns_numrrsets--;
+ rep->rrset_count--;
+}
+
void
val_check_nonsecure(struct val_env* ve, struct reply_info* rep)
{