No real issue I'm aware of, but it's cleaner that way.
if(!ret.empty())
return ret;
if(subdomain.countLabels())
- prefix+= DNSName(subdomain.getRawLabels()[0]); // XXX DNSName pain this feels wrong
+ prefix.appendRawLabel(subdomain.getRawLabels()[0]); // XXX DNSName pain this feels wrong
if(subdomain == sd.qname) // stop at SOA
break;
for(const auto &i: tlsas) {
DNSName name = DNSName(i);
- name.trimToLabels(name.getRawLabels().size()-2);
+ name.trimToLabels(name.countLabels()-2);
if (cnames.find(name) == cnames.end() && noncnames.find(name) == noncnames.end()) {
// No specific record for the name in the TLSA record exists, this
// is already worth emitting a warning. Let's see if a wildcard exist.