• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/contrib/unbound/validator/

Lines Matching defs:reason

338 	uint8_t* sigalg, char** reason, sldns_pkt_section section,
361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
395 char** reason, sldns_pkt_section section, struct module_qstate* qstate)
408 sec = val_verify_rrset(env, ve, rrset, &dnskey, kd->algo, reason,
417 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, char** reason,
449 dnskey_rrset, i, reason, LDNS_SECTION_ANSWER, qstate);
457 reason, "no keys have a DS");
459 *reason = "DS hash mismatches key";
460 else if(!*reason)
461 *reason = "keyset not secured by DNSKEY that matches DS";
485 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
500 *reason = "DNSKEY RRset did not match DS RRset by name";
528 ds_rrset, i, reason, qstate);
552 algo_needs_reason(env, alg, reason, "missing verification of "
561 struct ub_packed_rrset_key* ds_rrset, int downprot, char** reason,
566 dnskey_rrset, ds_rrset, downprot?sigalg:NULL, reason, qstate);
588 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
603 *reason = "DNSKEY RRset did not match DS RRset by name";
611 *reason = "DNSKEY RRset did not match anchor RRset by name";
640 ta_ds, i, reason, qstate);
666 ta_dnskey, i, reason, LDNS_SECTION_ANSWER, qstate);
689 algo_needs_reason(env, alg, reason, "missing verification of "
700 char** reason, struct module_qstate* qstate)
705 downprot?sigalg:NULL, reason, qstate);
1111 int val_has_signed_nsecs(struct reply_info* rep, char** reason)
1127 *reason = "no DNSSEC records";
1129 *reason = "no signatures over NSECs";
1130 else *reason = "no signatures over NSEC3s";