Lines Matching defs:reason
407 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus,
433 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
467 char** reason, sldns_ede_code *reason_bogus,
482 sec = val_verify_rrset(env, ve, rrset, &dnskey, kd->algo, reason,
491 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, char** reason,
536 i, reason, reason_bogus, LDNS_SECTION_ANSWER, qstate);
548 reason, "no keys have a DS", reasonbuf, reasonlen);
551 *reason = "DS hash mismatches key";
552 } else if(!*reason) {
553 *reason = "keyset not secured by DNSKEY that matches DS";
578 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason,
595 *reason = "DNSKEY RRset did not match DS RRset by name";
618 ds_rrset, i, reason, reason_bogus, qstate,
670 algo_needs_reason(alg, reason, "missing verification of "
679 struct ub_packed_rrset_key* ds_rrset, int downprot, char** reason,
685 dnskey_rrset, ds_rrset, downprot?sigalg:NULL, reason,
698 rrset_get_ttl(ds_rrset), *reason_bogus, *reason,
703 BOGUS_KEY_TTL, *reason_bogus, *reason, *env->now);
710 struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason,
727 *reason = "DNSKEY RRset did not match DS RRset by name";
737 *reason = "DNSKEY RRset did not match anchor RRset by name";
763 ta_ds, i, reason, reason_bogus, qstate, &nonechecked,
808 ta_dnskey, i, reason, reason_bogus, LDNS_SECTION_ANSWER, qstate);
844 algo_needs_reason(alg, reason, "missing verification of "
855 char** reason, sldns_ede_code *reason_bogus,
861 downprot?sigalg:NULL, reason, reason_bogus, qstate,
873 rrset_get_ttl(dnskey_rrset), *reason_bogus, *reason,
878 BOGUS_KEY_TTL, *reason_bogus, *reason, *env->now);
1277 int val_has_signed_nsecs(struct reply_info* rep, char** reason)
1293 *reason = "no DNSSEC records";
1295 *reason = "no signatures over NSECs";
1296 else *reason = "no signatures over NSEC3s";