From ab91ece513778d3b13d2b0cbe5554292e14adf91 Mon Sep 17 00:00:00 2001 From: Mark Andrews Date: Fri, 21 Dec 2012 12:58:58 +1100 Subject: [PATCH] sign_tcp_continuation doesn't work with the newer versions of Net:DNS. Code has been submitted so we don't need to use the sign_tcp_continuation hack in future. --- bin/tests/system/ans.pl | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/bin/tests/system/ans.pl b/bin/tests/system/ans.pl index 2a5c535fb6..d840c1d921 100644 --- a/bin/tests/system/ans.pl +++ b/bin/tests/system/ans.pl @@ -322,6 +322,7 @@ sub handleTCP { # get the existing signature if any, and clear the additional section my $prev_tsig; my $signer; + my $continuation = 0; while (my $rr = $request->pop("additional")) { if ($rr->type eq "TSIG") { $prev_tsig = $rr; @@ -371,8 +372,12 @@ sub handleTCP { } $tsig->sign_func($signer) if defined($signer); + $tsig->continuation($continuation) + if ($Net::DNS::VERSION >= 0.71); $packet->sign_tsig($tsig); - $signer = \&sign_tcp_continuation; + $signer = \&sign_tcp_continuation + if ($Net::DNS::VERSION < 0.70); + $continuation = 1; my $copy = Net::DNS::Packet->new(\($packet->data));