@@ -1092,7 +1092,7 @@ auth_zone_delegpt(struct module_qstate* qstate, struct iter_qstate* iq,
1092
1092
/* cache is blacklisted and fallback, and we
1093
1093
* already have an auth_zone dp */
1094
1094
if (verbosity >=VERB_ALGO ) {
1095
- char buf [255 + 1 ];
1095
+ char buf [LDNS_MAX_DOMAINLEN ];
1096
1096
dname_str (z -> name , buf );
1097
1097
verbose (VERB_ALGO , "auth_zone %s "
1098
1098
"fallback because cache blacklisted" ,
@@ -1109,7 +1109,7 @@ auth_zone_delegpt(struct module_qstate* qstate, struct iter_qstate* iq,
1109
1109
* validation failure, and the zone allows
1110
1110
* fallback to the internet, query there. */
1111
1111
if (verbosity >=VERB_ALGO ) {
1112
- char buf [255 + 1 ];
1112
+ char buf [LDNS_MAX_DOMAINLEN ];
1113
1113
dname_str (z -> name , buf );
1114
1114
verbose (VERB_ALGO , "auth_zone %s "
1115
1115
"fallback because cache blacklisted" ,
@@ -2033,15 +2033,15 @@ query_for_targets(struct module_qstate* qstate, struct iter_qstate* iq,
2033
2033
return 1 ;
2034
2034
if (iq -> depth > 0 && iq -> target_count &&
2035
2035
iq -> target_count [TARGET_COUNT_QUERIES ] > MAX_TARGET_COUNT ) {
2036
- char s [LDNS_MAX_DOMAINLEN + 1 ];
2036
+ char s [LDNS_MAX_DOMAINLEN ];
2037
2037
dname_str (qstate -> qinfo .qname , s );
2038
2038
verbose (VERB_QUERY , "request %s has exceeded the maximum "
2039
2039
"number of glue fetches %d" , s ,
2040
2040
iq -> target_count [TARGET_COUNT_QUERIES ]);
2041
2041
return 2 ;
2042
2042
}
2043
2043
if (iq -> dp_target_count > MAX_DP_TARGET_COUNT ) {
2044
- char s [LDNS_MAX_DOMAINLEN + 1 ];
2044
+ char s [LDNS_MAX_DOMAINLEN ];
2045
2045
dname_str (qstate -> qinfo .qname , s );
2046
2046
verbose (VERB_QUERY , "request %s has exceeded the maximum "
2047
2047
"number of glue fetches %d to a single delegation point" ,
@@ -2252,7 +2252,7 @@ processLastResort(struct module_qstate* qstate, struct iter_qstate* iq,
2252
2252
}
2253
2253
if (iq -> depth > 0 && iq -> target_count &&
2254
2254
iq -> target_count [TARGET_COUNT_QUERIES ] > MAX_TARGET_COUNT ) {
2255
- char s [LDNS_MAX_DOMAINLEN + 1 ];
2255
+ char s [LDNS_MAX_DOMAINLEN ];
2256
2256
dname_str (qstate -> qinfo .qname , s );
2257
2257
verbose (VERB_QUERY , "request %s has exceeded the maximum "
2258
2258
"number of glue fetches %d" , s ,
@@ -3044,7 +3044,7 @@ processQueryTargets(struct module_qstate* qstate, struct iter_qstate* iq,
3044
3044
target_count_increase_global_quota (iq , 1 );
3045
3045
if (iq -> target_count && iq -> target_count [TARGET_COUNT_GLOBAL_QUOTA ]
3046
3046
> MAX_GLOBAL_QUOTA ) {
3047
- char s [LDNS_MAX_DOMAINLEN + 1 ];
3047
+ char s [LDNS_MAX_DOMAINLEN ];
3048
3048
dname_str (qstate -> qinfo .qname , s );
3049
3049
verbose (VERB_QUERY , "request %s has exceeded the maximum "
3050
3050
"global quota on number of upstream queries %d" , s ,
0 commit comments