test -z "$MANIFEST_TOOL" && MANIFEST_TOOL=mt
{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking if $MANIFEST_TOOL is a manifest tool" >&5
printf %s "checking if $MANIFEST_TOOL is a manifest tool... " >&6; }
-if test ${lt_cv_path_mainfest_tool+y}
+if test ${lt_cv_path_manifest_tool+y}
then :
printf %s "(cached) " >&6
else $as_nop
- lt_cv_path_mainfest_tool=no
+ lt_cv_path_manifest_tool=no
echo "$as_me:$LINENO: $MANIFEST_TOOL '-?'" >&5
$MANIFEST_TOOL '-?' 2>conftest.err > conftest.out
cat conftest.err >&5
if $GREP 'Manifest Tool' conftest.out > /dev/null; then
- lt_cv_path_mainfest_tool=yes
+ lt_cv_path_manifest_tool=yes
fi
rm -f conftest*
fi
-{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: result: $lt_cv_path_mainfest_tool" >&5
-printf "%s\n" "$lt_cv_path_mainfest_tool" >&6; }
-if test yes != "$lt_cv_path_mainfest_tool"; then
+{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: result: $lt_cv_path_manifest_tool" >&5
+printf "%s\n" "$lt_cv_path_manifest_tool" >&6; }
+if test yes != "$lt_cv_path_manifest_tool"; then
MANIFEST_TOOL=:
fi
# Add ABI-specific directories to the system library path.
sys_lib_dlsearch_path_spec="/lib64 /usr/lib64 /lib /usr/lib"
- # Ideally, we could use ldconfig to report *all* directores which are
+ # Ideally, we could use ldconfig to report *all* directories which are
# searched for libraries, however this is still not possible. Aside from not
# being certain /sbin/ldconfig is available, command
# 'ldconfig -N -X -v | grep ^/' on 64bit Fedora does not report /usr/lib64,
}
if(!v->isfirst) {
/* Global local-zone is not used for this view,
- * therefore add defaults to this view-specic
+ * therefore add defaults to this view-specific
* local-zone. */
struct config_file lz_cfg;
memset(&lz_cfg, 0, sizeof(lz_cfg));
COPY_VAR_ptr(tls_cert_bundle);
COPY_VAR_int(tls_win_cert);
COPY_VAR_ptr(tls_additional_port);
- /* The first is used to walk throught the list but last is
+ /* The first is used to walk through the list but last is
* only used during config read. */
COPY_VAR_ptr(tls_session_ticket_keys.first);
COPY_VAR_ptr(tls_session_ticket_keys.last);
tagname, num_tags
*/
COPY_VAR_int(remote_control_enable);
- /* The first is used to walk throught the list but last is
+ /* The first is used to walk through the list but last is
* only used during config read. */
COPY_VAR_ptr(control_ifs.first);
COPY_VAR_ptr(control_ifs.last);
fast_reload_worker_pickup_changes(struct worker* worker)
{
/* The pickup of changes is called when the fast reload has
- * a syncronized moment, and all the threads are paused and the
+ * a synchronized moment, and all the threads are paused and the
* reload has been applied. Then the worker can pick up the new
* changes and store them in worker-specific structs.
* The pickup is also called when there is no pause, and then
/* When an AAAA query completes check if we want to perform DNS64
* synthesis. We skip queries with DNSSEC enabled (!CD) and
- * ones generated by us to retrive the A/PTR record to use for
+ * ones generated by us to retrieve the A/PTR record to use for
* synth. */
int could_synth =
qstate->qinfo.qtype == LDNS_RR_TYPE_AAAA &&
// rule: the rule matched by the message.
//
// In a RPZ context, this is the owner name of the rule in
- // the Reponse Policy Zone in wire format.
+ // the Response Policy Zone in wire format.
optional bytes rule = 2;
// action: the policy action taken in response to the
now checks both single and multi process/thread operation.
16 May 2024: Yorgos
- - Merge #1070: Fix rtt assignement for low values of
+ - Merge #1070: Fix rtt assignment for low values of
infra-cache-max-rtt.
16 May 2024: Wouter
13 October 2023: George
- Better fix for infinite loop when reading multiple lines of input on
a broken remote control socket, by treating a zero byte line the
- same as transmission end. Addesses #947 and #948.
+ same as transmission end. Addresses #947 and #948.
12 October 2023: Wouter
- Merge #944: Disable EDNS DO.
10 October 2023: George
- Fix infinite loop when reading multiple lines of input on a broken
- remote control socket. Addesses #947 and #948.
+ remote control socket. Addresses #947 and #948.
9 October 2023: Wouter
- Fix edns subnet so that queries with a source prefix of zero cause
- Ignore expired error responses.
11 November 2022: Wouter
- - Fix #779: [doc] Missing documention in ub_resolve_event() for
+ - Fix #779: [doc] Missing documentation in ub_resolve_event() for
callback parameter was_ratelimited.
9 November 2022: George
not hang. removed trailing slashes from configure paths. Moved iOS
tests to allow-failure.
- travis, analyzer disabled on test without debug, that does not
- run anway. Turn off failing tests except one. Update iOS test
+ run anyway. Turn off failing tests except one. Update iOS test
to xcode image 12.2.
22 March 2021: George
- Fix build on Python 3.10.
10 February 2021: Wouter
- - Merge PR #420 from dyunwei: DOH not responsing with
+ - Merge PR #420 from dyunwei: DOH not responding with
"http2_query_read_done failure" logged.
9 February 2021: Wouter
6 August 2020: Wouter
- Merge PR #284 and Fix #246: Remove DLV entirely from Unbound.
- The DLV has been decommisioned and in unbound 1.5.4, in 2015, there
+ The DLV has been decommissioned and in unbound 1.5.4, in 2015, there
was advise to stop using it. The current code base does not contain
DLV code any more. The use of dlv options displays a warning.
3 December 2019: Wouter
- Merge pull request #124 from rmetrich: Changed log lock
from 'quick' to 'basic' because this is an I/O lock.
- - Fix text around serial arithmatic used for RRSIG times to refer
+ - Fix text around serial arithmetic used for RRSIG times to refer
to correct RFC number.
- Fix Assert Causing DoS in synth_cname(),
reported by X41 D-Sec.
- For #52 #53, second context does not close logfile override.
- Fix #52 #53, fix for example fail program.
- Fix to return after failed auth zone http chunk write.
- - Fix to remove unused test for task_probe existance.
+ - Fix to remove unused test for task_probe existence.
- Fix to timeval_add for remaining second in microseconds.
- Check repinfo in worker_handle_request, if null, drop it.
1 February 2018: Wouter
- fix unaligned structure making a false positive in checklock
- unitialised memory.
+ uninitialised memory.
29 January 2018: Ralph
- Use NSEC with longest ce to prove wildcard absence.
- Remove (now unused) event2 include from dnscrypt code.
24 March 2017: George
- - Fix to prevent non-referal query from being cached as referal when the
- no_cache_store flag was set.
+ - Fix to prevent non-referral query from being cached as referral when
+ the no_cache_store flag was set.
23 March 2017: Wouter
- Fix #1239: configure fails to find python distutils if python
7 March 2017: Wouter
- Fix #1230: swig version 2.0.0 is required for pythonmod, with
- 1.3.40 it crashes when running repeatly unbound-control reload.
+ 1.3.40 it crashes when running repeatedly unbound-control reload.
- Response actions based on IP address from Jinmei Tatuya (Infoblox).
6 March 2017: Wouter
known vulns.
27 February 2017: Wouter
- - Fix #1227: Fix that Unbound control allows weak ciphersuits.
+ - Fix #1227: Fix that Unbound control allows weak ciphersuites.
- Fix #1226: provide official 32bit binary for windows.
24 February 2017: Wouter
- Fix #674: Do not free pointers given by getenv.
29 May 2015: Wouter
- - Fix that unparseable error responses are ratelimited.
+ - Fix that unparsable error responses are ratelimited.
- SOA negative TTL is capped at minimumttl in its rdata section.
- cache-max-negative-ttl config option, default 3600.
10 May 2015: Wouter
- Change syntax of particular validator error to be easier for
- machine parse, swap rrset and ip adres info so it looks like:
+ machine parse, swap rrset and ip address info so it looks like:
validation failure <www.example.nl. TXT IN>: signature crypto
failed from 2001:DB8:7:bba4::53 for <*.example.nl. NSEC IN>
- fix that --enable-static-exe does not complain about it unknown.
30 June 2011: Wouter
- - tag relase 1.4.11, trunk is 1.4.12 development.
+ - tag release 1.4.11, trunk is 1.4.12 development.
- iana portlist updated.
- fix bug#395: id bits of other query may leak out under conditions
- fix replyaddr count wrong after jostled queries, which leads to
8 June 2009: Wouter
- Removed RFC5011 REVOKE flag support. Partial 5011 support may cause
- inadvertant behaviour.
+ inadvertent behaviour.
- 1.3.0 tarball for release created.
- 1.3.1 development in svn trunk.
- iana portlist updated.
- initgroups(3) is called to drop secondary group permissions, if
applicable.
- configure option --with-ldns-builtin forces the use of the
- inluded ldns package with the unbound source. The -I include
+ included ldns package with the unbound source. The -I include
is put before the others, so it avoids bad include files from
an older ldns install.
- daemon(3) posix call is used when available.
please ranlib, stop file without symbols warning.
- harden referral path now also validates the root after priming.
It looks up the root NS authoritatively as well as the root servers
- and attemps to validate the entries.
+ and attempts to validate the entries.
16 October 2008: Wouter
- Fixup negative TTL values appearing (reported by Attila Nagy).
- please doxygen, put doxygen comment in one place.
- asynclook -b blocking mode and test.
- refactor asynclook, nicer code.
- - fixup race problems from opensll in rand init from library, with
+ - fixup race problems from openssl in rand init from library, with
a mutex around the rand init.
- fix pass async_id=NULL to _async resolve().
- rewrote _wait() routine, so that it is threadsafe.
11 June 2007: Wouter
- replies on TCP queries have the address field set in replyinfo,
for serviced queries, because the initiator does not know that
- a TCP fallback has occured.
+ a TCP fallback has occurred.
- omit DNSSEC types from nonDO replies, except if qtype is ANY or
if qtype directly queries for the type (and then only show that
'unknown type' in the answer section).
# do-ip6: yes
# If running unbound on an IPv6-only host, domains that only have
- # IPv4 servers would become unresolveable. If NAT64 is available in
+ # IPv4 servers would become unresolvable. If NAT64 is available in
# the network, unbound can use NAT64 to reach these servers with
# the following option. This is NOT needed for enabling DNS64 on a
# system that has IPv4 connectivity.
@@UAHL@unbound.conf@ede@@: *<yes or no>*
If enabled, Unbound will respond with Extended DNS Error codes
(:rfc:`8914`).
- These EDEs privide additional information with a response mainly for, but
+ These EDEs provide additional information with a response mainly for, but
not limited to, DNS and DNSSEC errors.
When the :ref:`val-log-level<unbound.conf.val-log-level>` option is also
addrlen_t len;
/** child node this edge is connected to */
struct addrnode *node;
- /** Parent node this ege is connected to */
+ /** Parent node this edge is connected to */
struct addrnode *parent_node;
/** Index of this edge in parent_node */
int parent_index;
/** if true, the delegation point has reached last resort processing
* and the parent side information has been possibly added to the
* delegation point.
- * For now this singals that further target lookups will ignore
+ * For now this signals that further target lookups will ignore
* the configured target-fetch-policy and only resolve on
* demand to try and avoid triggering limits at this stage (.i.e, it
* is very likely that the A/AAAA queries for the newly added name
# to NONDIR_REPLACEMENT.
# value returned in "$func_dirname_result"
# basename: Compute filename of FILE.
-# value retuned in "$func_basename_result"
+# value returned in "$func_basename_result"
# For efficiency, we do not delegate to the functions above but instead
# duplicate the functionality here.
eval 'func_dirname_and_basename ()
case " $hookable_fns " in
*" $1 "*) ;;
- *) func_fatal_error "'$1' does not support hook funcions.n" ;;
+ *) func_fatal_error "'$1' does not support hook functions.n" ;;
esac
eval _G_hook_fns=\$$1_hooks; shift
# }
# func_add_hook func_validate_options my_option_validation
#
-# You'll alse need to manually amend $usage_message to reflect the extra
+# You'll also need to manually amend $usage_message to reflect the extra
# options you parse. It's preferable to append if you can, so that
# multiple option parsing hooks can be added safely.
# All initialisations required before starting the option parse loop.
# Note that when calling hook functions, we pass through the list of
# positional parameters. If a hook function modifies that list, and
-# needs to propogate that back to rest of this script, then the complete
+# needs to propagate that back to rest of this script, then the complete
# modified list must be put in 'func_run_hooks_result' before
# returning.
func_hookable func_options_prep
{
/* however, if there is an option in the LTWRAPPER_OPTION_PREFIX
namespace, but it is not one of the ones we know about and
- have already dealt with, above (inluding dump-script), then
+ have already dealt with, above (including dump-script), then
report an error. Otherwise, targets might begin to believe
they are allowed to use options in the LTWRAPPER_OPTION_PREFIX
namespace. The first time any user complains about this, we'll
-wxp expat.xx.tar.gz Also build expat from tarball for windows dist.
-wdir directory Build openssl and expat in a persistent directory for
windows dist. If builds are already in that directory
- they are used right away. Useful when debuggin windows
+ they are used right away. Useful when debugging windows
builds.
-w32 32bit windows compile.
-w ... Build windows binary dist. last args passed to configure.
* @param addrlen: length of addr.
* @param net: netblock to lookup.
* @param create: create node if it does not exist when 1.
- * @param ipstr: human redable ip string, for logging.
+ * @param ipstr: human readable ip string, for logging.
* @return newly created of found node, not holding lock.
*/
struct resp_addr*
against IP spoofing attacks as suggested in RFC7413 */
#ifdef __APPLE__
/* OS X implementation only supports qlen of 1 via this call. Actual
- value is configured by the net.inet.tcp.fastopen_backlog kernel parm. */
+ value is configured by the net.inet.tcp.fastopen_backlog kernel param. */
qlen = 1;
#else
/* 5 is recommended on linux */
front->udp_buff, ports->pp2_enabled, cb,
cb_arg, ports->socket);
#else
- log_warn("This system does not support UDP ancilliary data.");
+ log_warn("This system does not support UDP ancillary data.");
#endif
}
if(!cp) {
return 0;
}
/* Content type is a SHOULD (rfc7231#section-3.1.1.5) when using POST,
- * and not needed when using GET. Don't enfore.
+ * and not needed when using GET. Don't enforce.
* If set only allow lowercase "application/dns-message".
*
* Clients SHOULD (rfc8484#section-4.1) set an accept header, but MUST
qlen = h2_stream->content_length;
} else if(len <= h2_session->c->http2_stream_max_qbuffer_size) {
/* setting this to msg-buffer-size can result in a lot
- * of memory consuption. Most queries should fit in a
+ * of memory consumption. Most queries should fit in a
* single DATA frame, and most POST queries will
* contain content-length which does not impose this
* limit. */
if(!h2_stream->qbuffer ||
sldns_buffer_remaining(h2_stream->qbuffer) < len) {
- verbose(VERB_ALGO, "http2 data_chunck_recv failed. Not enough "
+ verbose(VERB_ALGO, "http2 data_chunk_recv failed. Not enough "
"buffer space for POST query. Can happen on multi "
"frame requests without content-length header");
h2_stream->query_too_large = 1;
void modstack_free(struct module_stack* stack);
/**
- * Initialises modules and assignes ids. Calls module_startup().
+ * Initialises modules and assigns ids. Calls module_startup().
* @param stack: Expected empty, filled according to module_conf
* @param module_conf: string what modules to initialize
* @param env: module environment which is inited by the modules.
return NULL;
}
if (!DSA_set0_key(dsa, Y, NULL)) {
- /* QPG attached, cleaned up by DSA_fre() */
+ /* QPG attached, cleaned up by DSA_free() */
DSA_free(dsa);
BN_free(Y);
return NULL;
* @param pkt: packet for decompression, if NULL no decompression.
* @param pktlen: length of packet buffer.
* @param comprloop: inout bool, that is set true if compression loop failure
- * happens. Pass in 0, if passsed in as true, a lower bound is set
+ * happens. Pass in 0, if passed in as true, a lower bound is set
* on compression loops to stop arbitrary long packet parse times.
* This is meant so you can set it to 0 at the start of a list of dnames,
* and then scan all of them in sequence, if a loop happens, it becomes
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
- nonexistant.com. IN A
+ nonexistent.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
- nonexistant.com. IN A
+ nonexistent.com. IN A
SECTION AUTHORITY
- nonexistant.com. IN NS ns.example.com.
+ nonexistent.com. IN NS ns.example.com.
SECTION ADDITIONAL
ns.example.com. 10 IN A 1.2.3.4
ENTRY_END
SECTION QUESTION
example.com. IN NS
SECTION ANSWER
- example.com. IN NS ns1.nonexistant.com.
- example.com. IN NS ns2.nonexistant.com.
- example.com. IN NS ns3.nonexistant.com.
- example.com. IN NS ns4.nonexistant.com.
- example.com. IN NS ns5.nonexistant.com.
- example.com. IN NS ns6.nonexistant.com.
- example.com. IN NS ns7.nonexistant.com.
- example.com. IN NS ns8.nonexistant.com.
- example.com. IN NS ns9.nonexistant.com.
- example.com. IN NS ns10.nonexistant.com.
- example.com. IN NS ns11.nonexistant.com.
- example.com. IN NS ns12.nonexistant.com.
+ example.com. IN NS ns1.nonexistent.com.
+ example.com. IN NS ns2.nonexistent.com.
+ example.com. IN NS ns3.nonexistent.com.
+ example.com. IN NS ns4.nonexistent.com.
+ example.com. IN NS ns5.nonexistent.com.
+ example.com. IN NS ns6.nonexistent.com.
+ example.com. IN NS ns7.nonexistent.com.
+ example.com. IN NS ns8.nonexistent.com.
+ example.com. IN NS ns9.nonexistent.com.
+ example.com. IN NS ns10.nonexistent.com.
+ example.com. IN NS ns11.nonexistent.com.
+ example.com. IN NS ns12.nonexistent.com.
ENTRY_END
ENTRY_BEGIN
ADJUST copy_id copy_query
REPLY QR NXDOMAIN
SECTION QUESTION
- nonexistant.com. IN A
+ nonexistent.com. IN A
ENTRY_END
ENTRY_BEGIN
SECTION ANSWER
a.example.com. IN A 10.20.30.40
SECTION AUTHORITY
- example.com. IN NS ns1.nonexistant.com.
- example.com. IN NS ns2.nonexistant.com.
- example.com. IN NS ns3.nonexistant.com.
- example.com. IN NS ns4.nonexistant.com.
- example.com. IN NS ns5.nonexistant.com.
- example.com. IN NS ns6.nonexistant.com.
- example.com. IN NS ns7.nonexistant.com.
- example.com. IN NS ns8.nonexistant.com.
- example.com. IN NS ns9.nonexistant.com.
- example.com. IN NS ns10.nonexistant.com.
- example.com. IN NS ns11.nonexistant.com.
- example.com. IN NS ns12.nonexistant.com.
+ example.com. IN NS ns1.nonexistent.com.
+ example.com. IN NS ns2.nonexistent.com.
+ example.com. IN NS ns3.nonexistent.com.
+ example.com. IN NS ns4.nonexistent.com.
+ example.com. IN NS ns5.nonexistent.com.
+ example.com. IN NS ns6.nonexistent.com.
+ example.com. IN NS ns7.nonexistent.com.
+ example.com. IN NS ns8.nonexistent.com.
+ example.com. IN NS ns9.nonexistent.com.
+ example.com. IN NS ns10.nonexistent.com.
+ example.com. IN NS ns11.nonexistent.com.
+ example.com. IN NS ns12.nonexistent.com.
ENTRY_END
ENTRY_BEGIN
SECTION ANSWER
b.example.com. IN A 10.20.30.40
SECTION AUTHORITY
- example.com. IN NS ns1.nonexistant.com.
- example.com. IN NS ns2.nonexistant.com.
- example.com. IN NS ns3.nonexistant.com.
- example.com. IN NS ns4.nonexistant.com.
- example.com. IN NS ns5.nonexistant.com.
- example.com. IN NS ns6.nonexistant.com.
- example.com. IN NS ns7.nonexistant.com.
- example.com. IN NS ns8.nonexistant.com.
- example.com. IN NS ns9.nonexistant.com.
- example.com. IN NS ns10.nonexistant.com.
- example.com. IN NS ns11.nonexistant.com.
- example.com. IN NS ns12.nonexistant.com.
+ example.com. IN NS ns1.nonexistent.com.
+ example.com. IN NS ns2.nonexistent.com.
+ example.com. IN NS ns3.nonexistent.com.
+ example.com. IN NS ns4.nonexistent.com.
+ example.com. IN NS ns5.nonexistent.com.
+ example.com. IN NS ns6.nonexistent.com.
+ example.com. IN NS ns7.nonexistent.com.
+ example.com. IN NS ns8.nonexistent.com.
+ example.com. IN NS ns9.nonexistent.com.
+ example.com. IN NS ns10.nonexistent.com.
+ example.com. IN NS ns11.nonexistent.com.
+ example.com. IN NS ns12.nonexistent.com.
ENTRY_END
ENTRY_BEGIN
SECTION ANSWER
c.example.com. IN A 10.20.30.40
SECTION AUTHORITY
- example.com. IN NS ns1.nonexistant.com.
- example.com. IN NS ns2.nonexistant.com.
- example.com. IN NS ns3.nonexistant.com.
- example.com. IN NS ns4.nonexistant.com.
- example.com. IN NS ns5.nonexistant.com.
- example.com. IN NS ns6.nonexistant.com.
- example.com. IN NS ns7.nonexistant.com.
- example.com. IN NS ns8.nonexistant.com.
- example.com. IN NS ns9.nonexistant.com.
- example.com. IN NS ns10.nonexistant.com.
- example.com. IN NS ns11.nonexistant.com.
- example.com. IN NS ns12.nonexistant.com.
+ example.com. IN NS ns1.nonexistent.com.
+ example.com. IN NS ns2.nonexistent.com.
+ example.com. IN NS ns3.nonexistent.com.
+ example.com. IN NS ns4.nonexistent.com.
+ example.com. IN NS ns5.nonexistent.com.
+ example.com. IN NS ns6.nonexistent.com.
+ example.com. IN NS ns7.nonexistent.com.
+ example.com. IN NS ns8.nonexistent.com.
+ example.com. IN NS ns9.nonexistent.com.
+ example.com. IN NS ns10.nonexistent.com.
+ example.com. IN NS ns11.nonexistent.com.
+ example.com. IN NS ns12.nonexistent.com.
ENTRY_END
ENTRY_BEGIN
SECTION ANSWER
d.example.com. IN A 10.20.30.40
SECTION AUTHORITY
- example.com. IN NS ns1.nonexistant.com.
- example.com. IN NS ns2.nonexistant.com.
- example.com. IN NS ns3.nonexistant.com.
- example.com. IN NS ns4.nonexistant.com.
- example.com. IN NS ns5.nonexistant.com.
- example.com. IN NS ns6.nonexistant.com.
- example.com. IN NS ns7.nonexistant.com.
- example.com. IN NS ns8.nonexistant.com.
- example.com. IN NS ns9.nonexistant.com.
- example.com. IN NS ns10.nonexistant.com.
- example.com. IN NS ns11.nonexistant.com.
- example.com. IN NS ns12.nonexistant.com.
+ example.com. IN NS ns1.nonexistent.com.
+ example.com. IN NS ns2.nonexistent.com.
+ example.com. IN NS ns3.nonexistent.com.
+ example.com. IN NS ns4.nonexistent.com.
+ example.com. IN NS ns5.nonexistent.com.
+ example.com. IN NS ns6.nonexistent.com.
+ example.com. IN NS ns7.nonexistent.com.
+ example.com. IN NS ns8.nonexistent.com.
+ example.com. IN NS ns9.nonexistent.com.
+ example.com. IN NS ns10.nonexistent.com.
+ example.com. IN NS ns11.nonexistent.com.
+ example.com. IN NS ns12.nonexistent.com.
ENTRY_END
RANGE_END
SECTION ANSWER
a.example.com. IN A 10.20.30.40
SECTION AUTHORITY
-example.com. IN NS ns1.nonexistant.com.
-example.com. IN NS ns2.nonexistant.com.
-example.com. IN NS ns3.nonexistant.com.
-example.com. IN NS ns4.nonexistant.com.
-example.com. IN NS ns5.nonexistant.com.
-example.com. IN NS ns6.nonexistant.com.
-example.com. IN NS ns7.nonexistant.com.
-example.com. IN NS ns8.nonexistant.com.
-example.com. IN NS ns9.nonexistant.com.
-example.com. IN NS ns10.nonexistant.com.
-example.com. IN NS ns11.nonexistant.com.
-example.com. IN NS ns12.nonexistant.com.
+example.com. IN NS ns1.nonexistent.com.
+example.com. IN NS ns2.nonexistent.com.
+example.com. IN NS ns3.nonexistent.com.
+example.com. IN NS ns4.nonexistent.com.
+example.com. IN NS ns5.nonexistent.com.
+example.com. IN NS ns6.nonexistent.com.
+example.com. IN NS ns7.nonexistent.com.
+example.com. IN NS ns8.nonexistent.com.
+example.com. IN NS ns9.nonexistent.com.
+example.com. IN NS ns10.nonexistent.com.
+example.com. IN NS ns11.nonexistent.com.
+example.com. IN NS ns12.nonexistent.com.
ENTRY_END
; The child side nameservers are now known to Unbound
SECTION ANSWER
b.example.com. IN A 10.20.30.40
SECTION AUTHORITY
-example.com. IN NS ns1.nonexistant.com.
-example.com. IN NS ns2.nonexistant.com.
-example.com. IN NS ns3.nonexistant.com.
-example.com. IN NS ns4.nonexistant.com.
-example.com. IN NS ns5.nonexistant.com.
-example.com. IN NS ns6.nonexistant.com.
-example.com. IN NS ns7.nonexistant.com.
-example.com. IN NS ns8.nonexistant.com.
-example.com. IN NS ns9.nonexistant.com.
-example.com. IN NS ns10.nonexistant.com.
-example.com. IN NS ns11.nonexistant.com.
-example.com. IN NS ns12.nonexistant.com.
+example.com. IN NS ns1.nonexistent.com.
+example.com. IN NS ns2.nonexistent.com.
+example.com. IN NS ns3.nonexistent.com.
+example.com. IN NS ns4.nonexistent.com.
+example.com. IN NS ns5.nonexistent.com.
+example.com. IN NS ns6.nonexistent.com.
+example.com. IN NS ns7.nonexistent.com.
+example.com. IN NS ns8.nonexistent.com.
+example.com. IN NS ns9.nonexistent.com.
+example.com. IN NS ns10.nonexistent.com.
+example.com. IN NS ns11.nonexistent.com.
+example.com. IN NS ns12.nonexistent.com.
ENTRY_END
; Query a third time, this will get the cached NXDOMAINs (no NX counter for
SECTION ANSWER
c.example.com. IN A 10.20.30.40
SECTION AUTHORITY
-example.com. IN NS ns1.nonexistant.com.
-example.com. IN NS ns2.nonexistant.com.
-example.com. IN NS ns3.nonexistant.com.
-example.com. IN NS ns4.nonexistant.com.
-example.com. IN NS ns5.nonexistant.com.
-example.com. IN NS ns6.nonexistant.com.
-example.com. IN NS ns7.nonexistant.com.
-example.com. IN NS ns8.nonexistant.com.
-example.com. IN NS ns9.nonexistant.com.
-example.com. IN NS ns10.nonexistant.com.
-example.com. IN NS ns11.nonexistant.com.
-example.com. IN NS ns12.nonexistant.com.
+example.com. IN NS ns1.nonexistent.com.
+example.com. IN NS ns2.nonexistent.com.
+example.com. IN NS ns3.nonexistent.com.
+example.com. IN NS ns4.nonexistent.com.
+example.com. IN NS ns5.nonexistent.com.
+example.com. IN NS ns6.nonexistent.com.
+example.com. IN NS ns7.nonexistent.com.
+example.com. IN NS ns8.nonexistent.com.
+example.com. IN NS ns9.nonexistent.com.
+example.com. IN NS ns10.nonexistent.com.
+example.com. IN NS ns11.nonexistent.com.
+example.com. IN NS ns12.nonexistent.com.
ENTRY_END
; Allow for the nameserver glue to expire
SECTION ANSWER
d.example.com. IN A 10.20.30.40
SECTION AUTHORITY
-example.com. IN NS ns1.nonexistant.com.
-example.com. IN NS ns2.nonexistant.com.
-example.com. IN NS ns3.nonexistant.com.
-example.com. IN NS ns4.nonexistant.com.
-example.com. IN NS ns5.nonexistant.com.
-example.com. IN NS ns6.nonexistant.com.
-example.com. IN NS ns7.nonexistant.com.
-example.com. IN NS ns8.nonexistant.com.
-example.com. IN NS ns9.nonexistant.com.
-example.com. IN NS ns10.nonexistant.com.
-example.com. IN NS ns11.nonexistant.com.
-example.com. IN NS ns12.nonexistant.com.
+example.com. IN NS ns1.nonexistent.com.
+example.com. IN NS ns2.nonexistent.com.
+example.com. IN NS ns3.nonexistent.com.
+example.com. IN NS ns4.nonexistent.com.
+example.com. IN NS ns5.nonexistent.com.
+example.com. IN NS ns6.nonexistent.com.
+example.com. IN NS ns7.nonexistent.com.
+example.com. IN NS ns8.nonexistent.com.
+example.com. IN NS ns9.nonexistent.com.
+example.com. IN NS ns10.nonexistent.com.
+example.com. IN NS ns11.nonexistent.com.
+example.com. IN NS ns12.nonexistent.com.
ENTRY_END
SCENARIO_END
ADJUST copy_id copy_query
REPLY QR NOERROR
SECTION QUESTION
- nonexistant.com. IN A
+ nonexistent.com. IN A
SECTION AUTHORITY
com. IN NS a.gtld-servers.net.
SECTION ADDITIONAL
SECTION QUESTION
example.com. IN A
SECTION AUTHORITY
- example.com. IN NS ns1.nonexistant.com.
- example.com. IN NS ns2.nonexistant.com.
- example.com. IN NS ns3.nonexistant.com.
- example.com. IN NS ns4.nonexistant.com.
- example.com. IN NS ns5.nonexistant.com.
- example.com. IN NS ns6.nonexistant.com.
- example.com. IN NS ns7.nonexistant.com.
- example.com. IN NS ns8.nonexistant.com.
+ example.com. IN NS ns1.nonexistent.com.
+ example.com. IN NS ns2.nonexistent.com.
+ example.com. IN NS ns3.nonexistent.com.
+ example.com. IN NS ns4.nonexistent.com.
+ example.com. IN NS ns5.nonexistent.com.
+ example.com. IN NS ns6.nonexistent.com.
+ example.com. IN NS ns7.nonexistent.com.
+ example.com. IN NS ns8.nonexistent.com.
ENTRY_END
ENTRY_BEGIN
ADJUST copy_id copy_query
REPLY QR NXDOMAIN
SECTION QUESTION
- nonexistant.com. IN A
+ nonexistent.com. IN A
ENTRY_END
RANGE_END
HEX_EDNSDATA_END
ENTRY_END
-; This answer was cached but a prefetch was triggerred
+; This answer was cached but a prefetch was triggered
STEP 12 CHECK_ANSWER
ENTRY_BEGIN
MATCH opcode qtype qname
stub-addr: 193.0.14.129 # K.ROOT-SERVERS.NET.
CONFIG_END
-SCENARIO_BEGIN Test validator with failure for chaing of trust lookup.
+SCENARIO_BEGIN Test validator with failure for chain of trust lookup.
; The error message that is created, also for EDE is more extensive.
; K.ROOT-SERVERS.NET.
/** return true if type needs domain name compression in rdata */
static const sldns_rr_descriptor*
-type_rdata_compressable(struct ub_packed_rrset_key* key)
+type_rdata_compressible(struct ub_packed_rrset_key* key)
{
uint16_t t = ntohs(key->rk.type);
if(sldns_rr_descript(t) &&
adjust = SERVE_ORIGINAL_TTL ? data->ttl_add : timenow;
if(do_data) {
- const sldns_rr_descriptor* c = type_rdata_compressable(key);
+ const sldns_rr_descriptor* c = type_rdata_compressible(key);
for(i=0; i<data->count; i++) {
/* rrset roundrobin */
j = (i + rr_offset) % data->count;
uint16_t calc_edns_option_size(struct edns_data* edns, uint16_t code);
/**
- * Calculate the size of the EDE option(s) in packet. Also calculate seperately
+ * Calculate the size of the EDE option(s) in packet. Also calculate separately
* the size of the EXTRA-TEXT field(s) in case we can trim them to fit.
* In this case include any LDNS_EDE_OTHER options in their entirety since they
* are useless without extra text.
}
#ifdef HAVE_SSL
-/** Print crypt erro with SSL_get_error want code and err_get_error code */
+/** Print crypt error with SSL_get_error want code and err_get_error code */
static void log_crypto_err_io_code_arg(const char* str, int r,
unsigned long err, int err_present)
{
struct module_qstate* sub_qstate);
-/* Updates the suplied EDE (RFC8914) code selectively so we don't lose
+/* Updates the supplied EDE (RFC8914) code selectively so we don't lose
* a more specific code */
static void
update_reason_bogus(struct reply_info* rep, sldns_ede_code reason_bogus)
struct ub_packed_rrset_key* ds;
enum sec_status sec;
ds = reply_find_answer_rrset(qinfo, msg->rep);
- /* If there was no DS rrset, then we have mis-classified
+ /* If there was no DS rrset, then we have misclassified
* this message. */
if(!ds) {
log_warn("internal error: POSITIVE DS response was "
if(suspend) {
/* deep copy the return_msg to vq->sub_ds_msg; it will
* be resumed later in the super state with the caveat
- * that the initial calculations will be re-caclulated
+ * that the initial calculations will be re-calculated
* and re-suspended there before continuing. */
vq->sub_ds_msg = dns_msg_deepcopy_region(
qstate->return_msg, super->region);