• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/contrib/unbound/validator/

Lines Matching refs:key_entry

578  * @param key_entry: the key entry, which is trusted, and which matches
586 struct reply_info* chase_reply, struct key_entry_key* key_entry)
614 sec = val_verify_rrset_entry(env, ve, s, key_entry, &reason,
644 sec = val_verify_rrset_entry(env, ve, s, key_entry, &reason,
671 if(sname && query_dname_compare(sname, key_entry->name)==0)
672 (void)val_verify_rrset_entry(env, ve, s, key_entry,
1525 vq->key_entry = NULL;
1583 vq->key_entry = key_cache_obtain(ve->kcache, lookup_name, lookup_len,
1587 if(vq->key_entry == NULL && anchor == NULL) {
1596 else if(vq->key_entry == NULL || (anchor &&
1597 dname_strict_subdomain_c(anchor->name, vq->key_entry->name))) {
1624 if(key_entry_isnull(vq->key_entry)) {
1629 val_mark_insecure(vq->chase_reply, vq->key_entry->name,
1634 } else if(key_entry_isbad(vq->key_entry)) {
1636 errinf_dname(qstate, "key for validation", vq->key_entry->name);
1638 if(key_entry_get_reason(vq->key_entry)) {
1640 errinf(qstate, key_entry_get_reason(vq->key_entry));
1676 /* We know that state.key_entry is not 0 or bad key -- if it were,
1681 log_assert(vq->key_entry && !key_entry_isbad(vq->key_entry));
1682 if(key_entry_isnull(vq->key_entry)) {
1699 current_key_name = vq->key_entry->name;
1754 vq->key_entry->name) != 0) {
1778 vq->key_entry->name)) ) {
1826 if(!vq->key_entry) {
1835 if(key_entry_isnull(vq->key_entry)) {
1839 val_mark_insecure(vq->chase_reply, vq->key_entry->name,
1841 key_cache_insert(ve->kcache, vq->key_entry, qstate);
1845 if(key_entry_isbad(vq->key_entry)) {
1847 "of trust to keys for", vq->key_entry->name,
1848 LDNS_RR_TYPE_DNSKEY, vq->key_entry->key_class);
1852 key_cache_insert(ve->kcache, vq->key_entry, qstate);
1876 vq->chase_reply, vq->key_entry)) {
1905 &vq->qchase, vq->chase_reply, vq->key_entry);
1914 &vq->qchase, vq->chase_reply, vq->key_entry);
1924 &vq->qchase, vq->chase_reply, vq->key_entry, &rcode);
1935 &vq->qchase, vq->chase_reply, vq->key_entry);
1945 &vq->qchase, vq->chase_reply, vq->key_entry);
1963 vq->chase_reply, vq->key_entry);
2419 vq->key_entry, &reason, LDNS_SECTION_ANSWER, qstate);
2465 qstate->env, ve, qinfo, msg->rep, vq->key_entry,
2494 msg->rep->ns_numrrsets, qinfo, vq->key_entry, &reason,
2556 vq->key_entry, &reason, LDNS_SECTION_ANSWER, qstate);
2613 vq->key_entry = NULL; /* make it error */
2622 vq->key_entry = NULL; /* make it error */
2634 vq->key_entry = NULL; /* make it error */
2654 vq->key_entry = dske;
2682 struct key_entry_key* old = vq->key_entry;
2701 vq->key_entry = key_entry_create_bad(qstate->region,
2704 if(!vq->key_entry) {
2706 /* key_entry is NULL for failure in Validate */
2716 vq->key_entry = NULL;
2721 vq->key_entry = val_verify_new_DNSKEYs(qstate->region, qstate->env,
2724 if(!vq->key_entry) {
2731 if(!key_entry_isgood(vq->key_entry)) {
2732 if(key_entry_isbad(vq->key_entry)) {
2738 vq->key_entry = old;
2755 key_cache_insert(ve->kcache, vq->key_entry, qstate);
2806 vq->key_entry = primeResponseToKE(dnskey_rrset, ta, qstate, id);
2808 if(vq->key_entry) {
2809 if(key_entry_isbad(vq->key_entry)
2815 vq->key_entry = NULL;
2823 key_cache_insert(ve->kcache, vq->key_entry, qstate);
2827 if(!vq->key_entry || key_entry_isnull(vq->key_entry) ||
2828 key_entry_isbad(vq->key_entry)) {