the server was shutdown during a zone tranfer.
[RT #830]
+ 712. [bug] Sending a large signed update message caused an
+ assertion failure. [RT #718]
+
669. [bug] dnssec-keygen now makes the public key file
non-world-readable for symmetric keys. [RT #403]
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
-/* $Id: message.c,v 1.164.2.5 2001/04/19 18:54:26 gson Exp $ */
+/* $Id: message.c,v 1.164.2.6 2001/06/14 14:36:04 gson Exp $ */
/***
*** Imports
}
}
}
+ if (msg->tsigname != NULL)
+ dns_message_puttempname(msg, &msg->tsigname);
+ if (msg->tsig != NULL) {
+ dns_rdataset_disassociate(msg->tsig);
+ dns_message_puttemprdataset(msg, &msg->tsig);
+ }
+ if (msg->sig0 != NULL) {
+ dns_rdataset_disassociate(msg->sig0);
+ dns_message_puttemprdataset(msg, &msg->sig0);
+ }
}
isc_result_t
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
-/* $Id: request.c,v 1.45.2.3 2001/01/09 22:44:10 bwelling Exp $ */
+/* $Id: request.c,v 1.45.2.4 2001/06/14 14:36:05 gson Exp $ */
#include <config.h>
isc_time_t expires;
unsigned int attrs;
dns_acl_t *blackhole = NULL;
+ isc_boolean_t setkey = ISC_TRUE;
REQUIRE(VALID_REQUESTMGR(requestmgr));
REQUIRE(message != NULL);
goto cleanup;
message->id = id;
- dns_message_settsigkey(message, request->tsigkey);
+ if (setkey)
+ dns_message_settsigkey(message, request->tsigkey);
result = req_render(message, &request->query, options, mctx);
if (result == DNS_R_USETCP &&
(options & DNS_REQUESTOPT_TCP) == 0) {
dns_dispatch_detach(&request->dispatch);
socket = NULL;
options |= DNS_REQUESTOPT_TCP;
+ setkey = ISC_FALSE;
goto use_tcp;
}
if (result != ISC_R_SUCCESS)