* Mark the RRsets in val->vstat with trust level secure.
*/
static void
-marksecure(dns_validator_t *val) {
+marksecure(dns_validator_t *val, const char *where) {
+ validator_log(val, ISC_LOG_DEBUG(3), "marking as secure (%s)", where);
dns_rdataset_settrust(val->rdataset, dns_trust_secure);
if (val->sigrdataset != NULL) {
dns_rdataset_settrust(val->sigrdataset, dns_trust_secure);
}
if (val->result == ISC_R_SUCCESS) {
- marksecure(val);
- validator_log(val, ISC_LOG_DEBUG(3),
- "marking as secure, noqname proof not needed");
+ marksecure(val, "noqname proof not needed");
validate_async_done(val, val->result);
return;
}
/* Abort, abort, abort! */
break;
case ISC_R_SUCCESS:
- marksecure(val);
- validator_log(val, ISC_LOG_DEBUG(3), "marking as secure (DS)");
+ marksecure(val, "validate_dnskey (DS)");
break;
case ISC_R_NOMORE:
if (val->unsupported_algorithm != 0 ||
if (FOUNDNOQNAME(val) && FOUNDCLOSEST(val) && !FOUNDOPTOUT(val))
{
- validator_log(val, ISC_LOG_DEBUG(3),
- "marking as secure, noqname proof found");
- marksecure(val);
+ marksecure(val, "validate_nx (noqname proof found)");
return ISC_R_SUCCESS;
} else if (FOUNDOPTOUT(val) &&
dns_name_countlabels(
validator_log(val, ISC_LOG_DEBUG(3),
"nonexistence proof(s) found");
if (val->message == NULL) {
- marksecure(val);
+ marksecure(val,
+ "validate_nx (nonexistence proofs found)");
} else {
val->secure = true;
}