dst_key_free(&dstkey);
return ISC_R_QUOTA;
}
+ consume_validation(val);
+
result = dns_dnssec_verify(name, rdataset,
dstkey, true, mctx,
&sigrdata, NULL);
case DNS_R_SIGEXPIRED:
/*
* Temporal errors don't count towards
- * max validations nor max fails.
+ * max fails.
*/
break;
case ISC_R_SUCCESS:
- consume_validation(val);
/*
* The key with the REVOKE flag has
* self signed the RRset so it is no
dns_view_untrust(val->view, name, &key);
break;
default:
- consume_validation(val);
if (over_max_fails(val)) {
dst_key_free(&dstkey);
return ISC_R_QUOTA;
isc_result_t result;
dns_fixedname_t fixed;
bool ignore = false;
- dns_name_t *wild;
+ dns_name_t *wild = dns_fixedname_initname(&fixed);
if (DNS_TRUST_SECURE(val->rdataset->trust)) {
/*
if (over_max_validations(val)) {
return ISC_R_QUOTA;
}
- wild = dns_fixedname_initname(&fixed);
+ consume_validation(val);
again:
result = dns_dnssec_verify(val->name, val->rdataset, key, ignore,
case DNS_R_SIGFUTURE:
case DNS_R_SIGEXPIRED:
/*
- * Temporal errors don't count towards max validations nor max
- * fails.
+ * Temporal errors don't count towards max fails.
*/
validator_addede(val,
result == DNS_R_SIGEXPIRED
NULL);
break;
case ISC_R_SUCCESS:
- consume_validation(val);
break;
default:
- consume_validation(val);
if (over_max_fails(val)) {
result = ISC_R_QUOTA;
break;