Lines Matching defs:ve

94 fill_nsec3_iter(struct val_env* ve, char* s, int c)
98 free(ve->nsec3_keysize);
99 free(ve->nsec3_maxiter);
100 ve->nsec3_keysize = (size_t*)calloc(sizeof(size_t), (size_t)c);
101 ve->nsec3_maxiter = (size_t*)calloc(sizeof(size_t), (size_t)c);
102 if(!ve->nsec3_keysize || !ve->nsec3_maxiter) {
107 ve->nsec3_keysize[i] = (size_t)strtol(s, &e, 10);
113 ve->nsec3_maxiter[i] = (size_t)strtol(s, &e, 10);
119 if(i>0 && ve->nsec3_keysize[i-1] >= ve->nsec3_keysize[i]) {
121 (int)ve->nsec3_keysize[i-1],
122 (int)ve->nsec3_keysize[i]);
126 (int)ve->nsec3_keysize[i], (int)ve->nsec3_maxiter[i]);
630 * @param ve: validator env for verify.
641 struct module_env* env, struct val_env* ve,
685 sec = val_verify_rrset_entry(env, ve, s, key_entry, &reason,
730 sec = val_verify_rrset_entry(env, ve, s, key_entry, &reason,
776 (void)val_verify_rrset_entry(env, ve, s, key_entry,
957 * @param ve: validator env for verify.
969 validate_positive_response(struct module_env* env, struct val_env* ve,
1035 enum sec_status sec = nsec3_prove_wildcard(env, ve,
1076 * @param ve: validator env for verify.
1088 validate_nodata_response(struct module_env* env, struct val_env* ve,
1149 enum sec_status sec = nsec3_prove_nodata(env, ve,
1189 * @param ve: validator env for verify.
1202 validate_nameerror_response(struct module_env* env, struct val_env* ve,
1250 chase_reply->security = nsec3_prove_nameerror(env, ve,
1269 validate_nodata_response(env, ve, qchase, chase_reply, kkey,
1285 validate_nodata_response(env, ve, qchase, chase_reply, kkey,
1351 * @param ve: validator env for verify.
1363 validate_any_response(struct module_env* env, struct val_env* ve,
1435 enum sec_status sec = nsec3_prove_wildcard(env, ve,
1478 * @param ve: validator env for verify.
1490 validate_cname_response(struct module_env* env, struct val_env* ve,
1568 enum sec_status sec = nsec3_prove_wildcard(env, ve,
1608 * @param ve: validator env for verify.
1620 validate_cname_noanswer_response(struct module_env* env, struct val_env* ve,
1706 enum sec_status sec = nsec3_prove_nxornodata(env, ve,
1756 * @param ve: validator shared global environment.
1763 struct val_env* ve, int id)
1771 if(vq->restart_count > ve->max_restart) {
1869 vq->key_entry = key_cache_obtain(ve->kcache, lookup_name, lookup_len,
1931 vq->restart_count = ve->max_restart;
2128 * @param ve: validator shared global environment.
2135 struct val_env* ve, int id)
2155 key_cache_insert(ve->kcache, vq->key_entry,
2169 if(vq->restart_count >= ve->max_restart)
2170 key_cache_insert(ve->kcache, vq->key_entry,
2195 if(!validate_msg_signatures(qstate, vq, qstate->env, ve,
2230 validate_positive_response(qstate->env, ve,
2246 validate_nodata_response(qstate->env, ve,
2263 validate_nameerror_response(qstate->env, ve,
2281 validate_cname_response(qstate->env, ve,
2298 validate_cname_noanswer_response(qstate->env, ve,
2323 validate_any_response(qstate->env, ve, &vq->qchase,
2357 * @param ve: validator shared global environment.
2364 struct val_env* ve, int id)
2439 if(vq->restart_count < ve->max_restart) {
2452 vq->orig_msg->rep->ttl = ve->bogus_ttl;
2547 * @param ve: validator shared global environment.
2552 struct val_env* ve, int id)
2560 cont = processInit(qstate, vq, ve, id);
2566 cont = processValidate(qstate, vq, ve, id);
2569 cont = processFinished(qstate, vq, ve, id);
2584 struct val_env* ve = (struct val_env*)qstate->env->modinfo[id];
2648 val_handle(qstate, vq, ve, id);
2654 val_handle(qstate, vq, ve, id);
2682 struct val_env* ve = (struct val_env*)qstate->env->modinfo[id];
2718 kkey = val_verify_new_DNSKEYs_with_ta(qstate->region, qstate->env, ve,
2788 struct val_env* ve = (struct val_env*)qstate->env->modinfo[id];
2831 sec = val_verify_rrset_entry(qstate->env, ve, ds,
2883 qstate->env, ve, qinfo, msg->rep, vq->key_entry,
2919 sec = nsec3_prove_nods(qstate->env, ve,
2988 sec = val_verify_rrset_entry(qstate->env, ve, cname,
3050 struct val_env* ve = (struct val_env*)qstate->env->modinfo[id];
3099 && vq->restart_count < ve->max_restart) {
3141 struct val_env* ve = (struct val_env*)qstate->env->modinfo[id];
3159 if(vq->restart_count < ve->max_restart) {
3195 ve, dnskey, vq->ds_rrset, downprot, &reason, &reason_bogus,
3207 if(vq->restart_count < ve->max_restart) {
3229 key_cache_insert(ve->kcache, vq->key_entry,
3254 struct val_env* ve = (struct val_env*)qstate->env->modinfo[id];
3276 if(!autr_process_prime(qstate->env, ve, ta, dnskey_rrset,
3289 && vq->restart_count < ve->max_restart) {
3302 key_cache_insert(ve->kcache, vq->key_entry,
3389 struct val_env* ve = (struct val_env*)env->modinfo[id];
3390 if(!ve)
3392 return sizeof(*ve) + key_cache_get_mem(ve->kcache) +
3393 val_neg_get_mem(ve->neg_cache) +
3394 sizeof(size_t)*2*ve->nsec3_keyiter_count;