task->addrlist = NULL;
task->addrlist_count = 0;
task->addrlist_turn = 0;
+ task->req.has_tls = (task->session && task->session->has_tls);
int state = kr_resolve_consume(&task->req, packet_source, packet);
- while (state == KNOT_STATE_PRODUCE) {
+ while (state == KR_STATE_PRODUCE) {
state = kr_resolve_produce(&task->req, &task->addrlist, &sock_type, task->pktbuf);
if (unlikely(++task->iter_count > KR_ITER_LIMIT || task->timeouts >= KR_TIMEOUT_LIMIT)) {
- return qr_task_finalize(task, KNOT_STATE_FAIL);
+ return qr_task_finalize(task, KR_STATE_FAIL);
}
}
knot_pkt_t *answer = request->answer;
/* Always set SERVFAIL for bogus answers. */
- if (state == KNOT_STATE_FAIL && rplan->pending.len > 0) {
+ if (state == KR_STATE_FAIL && rplan->pending.len > 0) {
struct kr_query *last = array_tail(rplan->pending);
if ((last->flags & QUERY_DNSSEC_WANT) && (last->flags & QUERY_DNSSEC_BOGUS)) {
- return answer_fail(answer);
+ return answer_fail(request);
}
}