CASE(SIZE, size);
CASE(CCERT_SUBJECT, ccert_subject);
CASE(CCERT_ISSUER, ccert_issuer);
CASE(SIZE, size);
CASE(CCERT_SUBJECT, ccert_subject);
CASE(CCERT_ISSUER, ccert_issuer);
CASE(ENCRYPTION_PROTOCOL, encryption_protocol);
CASE(ENCRYPTION_CIPHER, encryption_cipher);
CASE(ENCRYPTION_KEYSIZE, encryption_keysize);
CASE(ETRN_DOMAIN, etrn_domain);
CASE(ENCRYPTION_PROTOCOL, encryption_protocol);
CASE(ENCRYPTION_CIPHER, encryption_cipher);
CASE(ENCRYPTION_KEYSIZE, encryption_keysize);
CASE(ETRN_DOMAIN, etrn_domain);
default:
syslog(LOG_WARNING, "unexpected key, skipped: %.*s", klen, k);
default:
syslog(LOG_WARNING, "unexpected key, skipped: %.*s", klen, k);
va_start(args, fmt);
buffer_addvf(&pcy->obuf, fmt, args);
va_end(args);
buffer_addstr(&pcy->obuf, "\n\n");
va_start(args, fmt);
buffer_addvf(&pcy->obuf, fmt, args);
va_end(args);
buffer_addstr(&pcy->obuf, "\n\n");
- policy_answer(pcy, "DUNNO");
+ const query_t* query = pcy->data;
+ if (!policy_run_filter(query, NULL, NULL)) {
+ policy_answer(pcy, "DUNNO");
+ }
ssize_t search_offs = MAX(0, pcy->ibuf.len - 1);
int nb = buffer_read(&pcy->ibuf, pcy->fd, -1);
const char *eoq;
ssize_t search_offs = MAX(0, pcy->ibuf.len - 1);
int nb = buffer_read(&pcy->ibuf, pcy->fd, -1);
const char *eoq;