Lines Matching defs:reason

544  * @param reason: if bogus, a string returned, fixed or alloced in scratch.
545 * @param reason_bogus: EDE (RFC8914) code paired with the reason of failure.
559 char** reason, sldns_ede_code *reason_bogus,
590 sig_idx, sortree, &buf_canon, reason, reason_bogus,
597 *reason = "too many RRSIG validations";
605 *reason = "signatures from unknown keys";
612 *reason = "unsupported algorithm by crypto library";
625 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
640 *reason = "no signatures";
650 *reason = "zone has no known algorithms";
658 dnskey, i, &sortree, reason, reason_bogus,
673 *reason = "too many RRSIG validations";
683 algo_needs_reason(env, alg, reason, "no signatures");
691 void algo_needs_reason(struct module_env* env, int alg, char** reason, char* s)
699 *reason = regional_strdup(env->scratch, buf);
700 if(!*reason)
701 *reason = s;
707 size_t dnskey_idx, char** reason, sldns_ede_code *reason_bogus,
722 *reason = "no signatures";
735 dnskey, dnskey_idx, i, &sortree, &buf_canon, reason,
745 *reason = "too many RRSIG validations";
753 *reason = "signature for expected key and algorithm missing";
761 *reason = "algorithm refused by cryptolib";
831 * The reason to first read the byte, then setup the rdf,
1416 uint8_t* incep_p, char** reason, sldns_ede_code *reason_bogus)
1439 *reason = "signature inception after expiration";
1458 *reason = "signature before inception date";
1473 *reason = "signature expired";
1540 char** reason, sldns_ede_code *reason_bogus,
1558 *reason = "signature too short";
1566 *reason = "dnskey without ZSK flag";
1575 *reason = "dnskey has wrong protocolnumber";
1586 *reason = "signer name malformed";
1593 *reason = "signer name off-tree";
1601 *reason = "signature too short, no signature data";
1615 *reason = "signer name mismatches key name";
1625 *reason = "signature covers wrong type";
1633 *reason = "signature has wrong algorithm";
1641 *reason = "signature has wrong keytag";
1650 *reason = "signature labelcount out of range";
1678 sigblock, sigblock_len, key, keylen, reason);
1688 reason, reason_bogus)) {