Lines Matching defs:chase_reply

270 	vq->chase_reply = regional_alloc_init(qstate->region, 
273 if(!vq->chase_reply)
279 vq->chase_reply->rrsets = regional_alloc(qstate->region,
283 if(!vq->chase_reply->rrsets)
285 memmove(vq->chase_reply->rrsets, vq->orig_msg->rep->rrsets,
631 * @param chase_reply: answer to validate.
642 struct reply_info* chase_reply, struct key_entry_key* key_entry,
661 for(i=0; i<chase_reply->an_numrrsets; i++) {
664 s = chase_reply->rrsets[i];
669 if(i>0 && ntohs(chase_reply->rrsets[i-1]->rk.type) ==
672 ((struct packed_rrset_data*)chase_reply->rrsets[i-1]->entry.data)->security == sec_status_secure &&
673 dname_strict_subdomain_c(s->rk.dname, chase_reply->rrsets[i-1]->rk.dname)
700 chase_reply->security = sec_status_bogus;
701 update_reason_bogus(chase_reply, reason_bogus);
709 chase_reply->an_numrrsets+chase_reply->ns_numrrsets:
710 chase_reply->rrset_count)) {
725 for(i=chase_reply->an_numrrsets; i<chase_reply->an_numrrsets+
726 chase_reply->ns_numrrsets; i++) {
729 s = chase_reply->rrsets[i];
742 chase_reply->security = sec_status_bogus;
743 update_reason_bogus(chase_reply, reason_bogus);
749 chase_reply->an_numrrsets+chase_reply->ns_numrrsets:
750 chase_reply->rrset_count)) {
765 for(i=chase_reply->an_numrrsets+chase_reply->ns_numrrsets;
766 i<chase_reply->rrset_count; i++) {
769 s = chase_reply->rrsets[i];
784 i+1 < chase_reply->rrset_count) {
902 * @param chase_reply: the chased reply, we have a key for this contents,
910 remove_spurious_authority(struct reply_info* chase_reply,
916 if(chase_reply->an_numrrsets == 0 && chase_reply->ns_numrrsets == 1)
919 for(i = chase_reply->an_numrrsets;
920 i < chase_reply->an_numrrsets+chase_reply->ns_numrrsets; i++) {
922 chase_reply->rrsets[i]->entry.data;
923 if(ntohs(chase_reply->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS
933 "(likely inserted by forwarder)", chase_reply->rrsets[found]);
940 chase_reply->rrsets[found]->rk.dname) == 0) {
946 /* remove rrset from chase_reply */
947 val_reply_remove_auth(chase_reply, found);
959 * @param chase_reply: answer to that query to validate.
970 struct query_info* qchase, struct reply_info* chase_reply,
984 for(i=0; i<chase_reply->an_numrrsets; i++) {
985 s = chase_reply->rrsets[i];
994 chase_reply->security = sec_status_bogus;
995 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1008 for(i=chase_reply->an_numrrsets; i<chase_reply->an_numrrsets+
1009 chase_reply->ns_numrrsets; i++) {
1010 s = chase_reply->rrsets[i];
1036 chase_reply->rrsets+chase_reply->an_numrrsets,
1037 chase_reply->ns_numrrsets, qchase, kkey, wc,
1042 chase_reply->security = sec_status_insecure;
1058 chase_reply->security = sec_status_bogus;
1059 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1064 chase_reply->security = sec_status_secure;
1078 * @param chase_reply: answer to that query to validate.
1089 struct query_info* qchase, struct reply_info* chase_reply,
1110 for(i=chase_reply->an_numrrsets; i<chase_reply->an_numrrsets+
1111 chase_reply->ns_numrrsets; i++) {
1112 s = chase_reply->rrsets[i];
1126 chase_reply->security = sec_status_insecure;
1150 chase_reply->rrsets+chase_reply->an_numrrsets,
1151 chase_reply->ns_numrrsets, qchase, kkey,
1155 chase_reply->security = sec_status_insecure;
1170 log_dns_msg("Failed NODATA", qchase, chase_reply);
1171 chase_reply->security = sec_status_bogus;
1172 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1177 chase_reply->security = sec_status_secure;
1191 * @param chase_reply: answer to that query to validate.
1203 struct query_info* qchase, struct reply_info* chase_reply,
1218 for(i=chase_reply->an_numrrsets; i<chase_reply->an_numrrsets+
1219 chase_reply->ns_numrrsets; i++) {
1220 s = chase_reply->rrsets[i];
1239 chase_reply->security = sec_status_insecure;
1250 chase_reply->security = nsec3_prove_nameerror(env, ve,
1251 chase_reply->rrsets, chase_reply->an_numrrsets+
1252 chase_reply->ns_numrrsets, qchase, kkey,
1254 if(chase_reply->security == sec_status_unchecked) {
1257 } else if(chase_reply->security != sec_status_secure) {
1260 chase_reply->security));
1269 validate_nodata_response(env, ve, qchase, chase_reply, kkey,
1275 if(chase_reply->security == sec_status_secure) {
1278 chase_reply->security = sec_status_bogus;
1279 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1285 validate_nodata_response(env, ve, qchase, chase_reply, kkey,
1291 if (chase_reply->security == sec_status_secure) {
1294 chase_reply->security = sec_status_bogus;
1295 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1302 chase_reply->security = sec_status_secure;
1313 * @param chase_reply: answer to validate.
1316 validate_referral_response(struct reply_info* chase_reply)
1321 chase_reply->security = sec_status_secure;
1322 for(i=0; i<chase_reply->rrset_count; i++) {
1323 s = ((struct packed_rrset_data*)chase_reply->rrsets[i]
1325 if(s < chase_reply->security)
1326 chase_reply->security = s;
1329 sec_status_to_string(chase_reply->security));
1353 * @param chase_reply: answer to that query to validate.
1364 struct query_info* qchase, struct reply_info* chase_reply,
1381 chase_reply->security = sec_status_bogus;
1382 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1387 for(i=0; i<chase_reply->an_numrrsets; i++) {
1388 s = chase_reply->rrsets[i];
1398 chase_reply->security = sec_status_bogus;
1399 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1407 for(i=0; i<chase_reply->an_numrrsets+chase_reply->ns_numrrsets;
1409 s = chase_reply->rrsets[i];
1436 chase_reply->rrsets,
1437 chase_reply->an_numrrsets+chase_reply->ns_numrrsets,
1443 chase_reply->security = sec_status_insecure;
1459 chase_reply->security = sec_status_bogus;
1460 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1465 chase_reply->security = sec_status_secure;
1480 * @param chase_reply: answer to that query to validate.
1491 struct query_info* qchase, struct reply_info* chase_reply,
1504 for(i=0; i<chase_reply->an_numrrsets; i++) {
1505 s = chase_reply->rrsets[i];
1514 chase_reply->security = sec_status_bogus;
1515 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1527 chase_reply->security = sec_status_bogus;
1528 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1541 for(i=chase_reply->an_numrrsets; i<chase_reply->an_numrrsets+
1542 chase_reply->ns_numrrsets; i++) {
1543 s = chase_reply->rrsets[i];
1569 chase_reply->rrsets+chase_reply->an_numrrsets,
1570 chase_reply->ns_numrrsets, qchase, kkey, wc,
1575 chase_reply->security = sec_status_insecure;
1591 chase_reply->security = sec_status_bogus;
1592 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1597 chase_reply->security = sec_status_secure;
1610 * @param chase_reply: answer to that query to validate.
1621 struct query_info* qchase, struct reply_info* chase_reply,
1640 for(i=chase_reply->an_numrrsets; i<chase_reply->an_numrrsets+
1641 chase_reply->ns_numrrsets; i++) {
1642 s = chase_reply->rrsets[i];
1671 chase_reply->security = sec_status_insecure;
1699 chase_reply->security = sec_status_bogus;
1700 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1707 chase_reply->rrsets+chase_reply->an_numrrsets,
1708 chase_reply->ns_numrrsets, qchase, kkey, &nodata,
1713 chase_reply->security = sec_status_insecure;
1729 log_dns_msg("Failed CNAMEnoanswer", qchase, chase_reply);
1730 chase_reply->security = sec_status_bogus;
1731 update_reason_bogus(chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1740 chase_reply->security = sec_status_secure;
1777 update_reason_bogus(vq->chase_reply, LDNS_EDE_DNSSEC_BOGUS);
1808 val_mark_indeterminate(vq->chase_reply, qstate->env->anchors,
1843 vq->chase_reply->security = sec_status_indeterminate;
1844 update_reason_bogus(vq->chase_reply, LDNS_EDE_DNSSEC_INDETERMINATE);
1859 /* extract this part of orig_msg into chase_reply for
1861 val_fill_reply(vq->chase_reply, vq->orig_msg->rep,
1866 vq->chase_reply);
1875 vq->chase_reply->security = sec_status_indeterminate;
1876 update_reason_bogus(vq->chase_reply, LDNS_EDE_DNSSEC_INDETERMINATE);
1887 vq->chase_reply->security = sec_status_insecure;
1888 val_mark_insecure(vq->chase_reply, anchor->name,
1915 vq->chase_reply->security = sec_status_insecure;
1916 val_mark_insecure(vq->chase_reply, vq->key_entry->name,
1932 vq->chase_reply->security = sec_status_bogus;
1933 update_reason_bogus(vq->chase_reply, ede);
2006 vq->chase_reply->security = sec_status_bogus;
2007 update_reason_bogus(vq->chase_reply, LDNS_EDE_RRSIGS_MISSING);
2021 vq->chase_reply->security = sec_status_bogus;
2152 vq->chase_reply->security = sec_status_insecure;
2153 val_mark_insecure(vq->chase_reply, vq->key_entry->name,
2164 vq->chase_reply->security = sec_status_bogus;
2165 update_reason_bogus(vq->chase_reply,
2184 vq->chase_reply->security = sec_status_bogus;
2185 update_reason_bogus(vq->chase_reply, LDNS_EDE_RRSIGS_MISSING);
2191 remove_spurious_authority(vq->chase_reply, vq->orig_msg->rep);
2196 vq->chase_reply, vq->key_entry, &suspend)) {
2214 vq->chase_reply->ns_numrrsets = 0;
2215 vq->chase_reply->ar_numrrsets = 0;
2216 vq->chase_reply->rrset_count =
2217 vq->chase_reply->an_numrrsets;
2231 &vq->qchase, vq->chase_reply, vq->key_entry,
2241 vq->chase_reply->security));
2247 &vq->qchase, vq->chase_reply, vq->key_entry,
2257 vq->chase_reply->security));
2264 &vq->qchase, vq->chase_reply, vq->key_entry, &rcode,
2274 vq->chase_reply->security));
2276 FLAGS_SET_RCODE(vq->chase_reply->flags, rcode);
2282 &vq->qchase, vq->chase_reply, vq->key_entry,
2292 vq->chase_reply->security));
2299 &vq->qchase, vq->chase_reply, vq->key_entry,
2309 vq->chase_reply->security));
2314 validate_referral_response(vq->chase_reply);
2317 vq->chase_reply->security));
2324 vq->chase_reply, vq->key_entry, qstate, vq,
2334 vq->chase_reply->security));
2341 if(vq->chase_reply->security == sec_status_bogus) {
2372 vq->orig_msg->rep->security = vq->chase_reply->security;
2373 update_reason_bogus(vq->orig_msg->rep, vq->chase_reply->reason_bogus);
2380 if(vq->chase_reply->security < vq->orig_msg->rep->security) {
2382 vq->chase_reply->security;
2383 update_reason_bogus(vq->orig_msg->rep, vq->chase_reply->reason_bogus);
2394 vq->chase_reply->security = sec_status_unchecked;
2400 if(vq->chase_reply->security != sec_status_bogus &&
2412 vq->chase_reply->security = sec_status_unchecked;