#include "util/net_help.h"
#include "util/module.h"
#include "util/regional.h"
+#include "util/config_file.h"
#include "sldns/wire2str.h"
#include "sldns/parseutil.h"
}
void
-val_check_nonsecure(struct val_env* ve, struct reply_info* rep)
+val_check_nonsecure(struct module_env* env, struct reply_info* rep)
{
size_t i;
/* authority */
}
}
/* additional */
- if(!ve->clean_additional)
+ if(!env->cfg->val_clean_additional)
return;
for(i=rep->an_numrrsets+rep->ns_numrrsets; i<rep->rrset_count; i++) {
if(((struct packed_rrset_data*)rep->rrsets[i]->entry.data)
* So that unsigned data does not get let through to clients, when we have
* found the data to be secure.
*
- * @param ve: validator environment with cleaning options.
+ * @param env: environment with cleaning options.
* @param rep: reply to dump all nonsecure stuff out of.
*/
-void val_check_nonsecure(struct val_env* ve, struct reply_info* rep);
+void val_check_nonsecure(struct module_env* env, struct reply_info* rep);
/**
* Mark all unchecked rrset entries not below a trust anchor as indeterminate.
* a different signer name). And drop additional rrsets
* that are not secure (if clean-additional option is set) */
/* this may cause the msg to be marked bogus */
- val_check_nonsecure(ve, vq->orig_msg->rep);
+ val_check_nonsecure(qstate->env, vq->orig_msg->rep);
if(vq->orig_msg->rep->security == sec_status_secure) {
log_query_info(VERB_DETAIL, "validation success",
&qstate->qinfo);