.name = rec->data.cname
};
- if (dns_authorative_for_zone(dns, new_q->name)) {
+ if (dns_authoritative_for_zone(dns, new_q->name)) {
subreq = handle_authoritative_send(
state, ev, dns, forwarder, new_q,
state->answers, state->nsrecs);
DLIST_ADD_END(state->forwarders, f);
}
- if (dns_authorative_for_zone(dns, in->questions[0].name)) {
+ if (dns_authoritative_for_zone(dns, in->questions[0].name)) {
req_state->flags |= DNS_FLAG_AUTHORITATIVE;
bool dns_name_equal(const char *name1, const char *name2);
bool dns_records_match(struct dnsp_DnssrvRpcRecord *rec1,
struct dnsp_DnssrvRpcRecord *rec2);
-bool dns_authorative_for_zone(struct dns_server *dns,
- const char *name);
+bool dns_authoritative_for_zone(struct dns_server *dns,
+ const char *name);
const char *dns_get_authoritative_zone(struct dns_server *dns,
const char *name);
WERROR dns_lookup_records(struct dns_server *dns,
needs_add, dwSerial, records, rec_count);
}
-bool dns_authorative_for_zone(struct dns_server *dns,
- const char *name)
+bool dns_authoritative_for_zone(struct dns_server *dns,
+ const char *name)
{
const struct dns_server_zone *z;
size_t host_part_len = 0;