]> git.ipfire.org Git - thirdparty/ldns.git/commitdiff
Fix #48: Missing UNSIGNED legend with drill. Thanks reedjc
authorWillem Toorop <willem@nlnetlabs.nl>
Mon, 8 Nov 2021 13:43:09 +0000 (14:43 +0100)
committerWillem Toorop <willem@nlnetlabs.nl>
Mon, 8 Nov 2021 13:43:09 +0000 (14:43 +0100)
Changelog
drill/securetrace.c

index a47714914c421af8ccd1082074eaddb152736fac..8d35faf4f7e56831b6657146c4ca3b829b35f266 100644 (file)
--- a/Changelog
+++ b/Changelog
@@ -53,6 +53,7 @@
          strict-aliasing. Thanks Stanislav Levin
        * Fix #130: Unless $TLL is defined, ttl defaults to the last
          explicitly stated value. Thanks Benno
+       * Fix #48: Missing UNSIGNED legend with drill. Thanks reedjc
 
 1.7.1  2019-07-26
        * bugfix: Manage verification paths for OpenSSL >= 1.1.0
index 94fff8edbeac82056253f5b18c78e6790f749cf7..90014b4e30075a2c69c015fdf177e6710d9796f7 100644 (file)
@@ -520,8 +520,8 @@ do_secure_trace(ldns_resolver *local_res, ldns_rdf *name, ldns_rr_type t,
                                                        labels[i-1]);
                                                printf(", but valid CNAME");
                                        } else {
-                                               printf("[B] Unable to verify de"
-                                                      "nial of existence for ");
+                                               printf(BOGUS " Unable to verify "
+                                                      "denial of existence for ");
                                                ldns_rdf_print(stdout,
                                                        labels[i-1]);
                                                printf(", because of BOGUS CNAME");
@@ -644,7 +644,7 @@ do_secure_trace(ldns_resolver *local_res, ldns_rdf *name, ldns_rr_type t,
                                                        printf(";; No DS for ");
                                                        ldns_rdf_print(stdout, labels[i - 1]);
                                                } else {
-                                                       printf("[B] Unable to verify denial of existence for ");
+                                                       printf(BOGUS " Unable to verify denial of existence for ");
                                                        ldns_rdf_print(stdout, labels[i - 1]);
                                                        printf(" DS: %s\n", ldns_get_errorstr_by_id(status));
                                                }
@@ -748,7 +748,7 @@ do_secure_trace(ldns_resolver *local_res, ldns_rdf *name, ldns_rr_type t,
                                                }
                                                printf("\n");
                                        } else {
-                                               printf("[B] Unable to verify denial of existence for ");
+                                               printf(BOGUS " Unable to verify denial of existence for ");
                                                ldns_rdf_print(stdout, name);
                                                printf(" type ");
                                                if (descriptor && descriptor->_name) {
@@ -774,7 +774,7 @@ do_secure_trace(ldns_resolver *local_res, ldns_rdf *name, ldns_rr_type t,
                ldns_rr_list_deep_free(ds_sig_list);
                ds_sig_list = NULL;
        }
-       printf(";;" SELF " self sig OK; " BOGUS " bogus; " TRUST " trusted\n");
+       printf(";;" SELF " self sig OK; " BOGUS " bogus; " TRUST " trusted; " UNSIGNED " unsigned\n");
        /* verbose mode?
        printf("Trusted keys:\n");
        ldns_rr_list_print(stdout, trusted_keys);