ldns_pkt.safe_push_rr_list(), ldns_pkt.set_additional(),
ldns_pkt.set_answer(), ldns_pkt.set_answerfrom(),
ldns_pkt.set_authority(), ldns_pkt.set_edns_data(),
- ldns_pkt.set_question(), ldns_pkt.set_tsig().
+ ldns_pkt.set_question(), ldns_pkt.set_tsig(),
+ ldns_resolver.set_dnssec_anchors().
* Added pull cloning for ldns_pkt.answerfrom(), ldns_pkt.edns_data(),
- ldns_pkt.tsig(), ldns_resolver.axfr_last_pkt().
+ ldns_pkt.tsig(), ldns_resolver.axfr_last_pkt(),
+ ldns_resolver.dnssec_anchors().
* Method ldns_rdf.reverse() now throws an exception when not applied
on dname rdfs. This is to prevent assertion fails in ldns' C code.
}
%}
+%newobject _ldns_resolver_dnssec_anchors;
+%rename(__ldns_resolver_dnssec_anchors) ldns_resolver_dnssec_anchors;
+%inline
+%{
+ ldns_rr_list * _ldns_resolver_dnssec_anchors(const ldns_resolver *res)
+ {
+ return ldns_rr_list_clone(ldns_resolver_dnssec_anchors(res));
+ }
+%}
+
/* End of pull cloning. */
/* Clone data on push. */
+%rename(__ldns_resolver_set_dnssec_anchors) ldns_resolver_set_dnssec_anchors;
+%inline
+%{
+ void _ldns_resolver_set_dnssec_anchors(ldns_resolver *res,
+ ldns_rr_list * rrl)
+ {
+ ldns_rr_list *rrl_clone = NULL;
+ if (rrl != NULL) {
+ rrl_clone = ldns_rr_list_clone(rrl);
+ }
+ /* May leak memory, when overwriting pointer value. */
+ ldns_resolver_set_dnssec_anchors(res, rrl_clone);
+ }
+%}
+
/* End of push cloning. */
#retvals: bool
def dec_nameserver_count(self):
- """Decrement the resolver's nameserver count.
+ """
+ Decrement the resolver's name server count.
"""
_ldns.ldns_resolver_dec_nameserver_count(self)
#parameters: ldns_resolver *,
#retvals:
def defnames(self):
+ """
+ Does the resolver apply default domain name.
+
+ :return: (bool)
+ """
return _ldns.ldns_resolver_defnames(self)
#parameters: const ldns_resolver *,
#retvals: bool
def dnsrch(self):
+ """
+ Does the resolver apply search list.
+
+ :return: (bool)
+ """
return _ldns.ldns_resolver_dnsrch(self)
#parameters: const ldns_resolver *,
#retvals: bool
def dnssec(self):
- """Does the resolver do DNSSEC.
+ """
+ Does the resolver do DNSSEC.
- :return: (bool) true: yes, false: no
+ :return: (bool) True: yes, False: no.
"""
return _ldns.ldns_resolver_dnssec(self)
#parameters: const ldns_resolver *,
#retvals: bool
def dnssec_anchors(self):
- """Get the resolver's DNSSEC anchors.
+ """
+ Get the resolver's DNSSEC anchors.
- :return: (ldns_rr_list \*) an rr_list containg trusted DNSSEC anchors
+ :return: (:class:`ldns_rr_list`) An rr list containing trusted
+ DNSSEC anchors.
"""
- return _ldns.ldns_resolver_dnssec_anchors(self)
+ return _ldns._ldns_resolver_dnssec_anchors(self)
#parameters: const ldns_resolver *,
#retvals: ldns_rr_list *
#parameters: ldns_resolver *,bool,
#retvals:
- def set_dnssec_anchors(self,l):
- """Set the resolver's DNSSEC anchor list directly.
-
+ def set_dnssec_anchors(self, l):
+ """
+ Set the resolver's DNSSEC anchor list directly.
RRs should be of type DS or DNSKEY.
- :param l:
- the list of RRs to use as trust anchors
+ :param l: The list of RRs to use as trust anchors.
+ :type l: :class:`ldns_rr_list`
+ :throws TypeError: When arguments of inappropriate types.
"""
- _ldns.ldns_resolver_set_dnssec_anchors(self,l)
+ _ldns._ldns_resolver_set_dnssec_anchors(self, l)
#parameters: ldns_resolver *,ldns_rr_list *,
#retvals: