]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
Enclose DLOG with braces 3086/head
authorAki Tuomi <cmouse@desteem.org>
Tue, 12 Jan 2016 14:35:24 +0000 (16:35 +0200)
committerAki Tuomi <cmouse@desteem.org>
Tue, 12 Jan 2016 14:35:24 +0000 (16:35 +0200)
pdns/validate.cc

index 00eb0f04cf9c16b1e3228e40a1d209061b863c02..f3a7645460e3258a9aecff810e10c1444f1ccf33 100644 (file)
@@ -103,8 +103,9 @@ void validateWithKeySet(const cspmap_t& rrsets, cspmap_t& validated, const keyse
          unsigned int now=time(0);
          if(signature->d_siginception < now && signature->d_sigexpire > now)
            isValid = DNSCryptoKeyEngine::makeFromPublicKeyString(l.d_algorithm, l.d_key)->verify(msg, signature->d_signature);
-         else
+         else {
            DLOG(cerr<<"signature is expired/not yet valid"<<endl);
+          }
        }
        catch(std::exception& e) {
          DLOG(cerr<<"Error validating with engine: "<<e.what()<<endl);
@@ -114,8 +115,9 @@ void validateWithKeySet(const cspmap_t& rrsets, cspmap_t& validated, const keyse
          //      cerr<<"valid"<<endl;
          //      cerr<<"! validated "<<i->first.first<<"/"<<DNSRecordContent::NumberToType(signature->d_type)<<endl;
        }
-       else 
+       else {
           DLOG(cerr<<"signature invalid"<<endl);
+        }
        if(signature->d_type != QType::DNSKEY) {
          dotEdge(signature->d_signer,
                  "DNSKEY", signature->d_signer, std::to_string(signature->d_tag),
@@ -284,8 +286,9 @@ vState getKeysFor(DNSRecordOracle& dro, const DNSName& zone, keyset_t &keyset)
             validkeys=tkeys;
             break;
           }
-         else
+         else {
            DLOG(cerr<<"Validation did not succeed!"<<endl);
+          }
         }
        //        if(validkeys.empty()) cerr<<"did not manage to validate DNSKEY set based on DS-validated KSK, only passing KSK on"<<endl;
       }