s = ldns_dane_match_cert_with_data(cert,
selector, matching_type, data);
- return ldns_dane_pkix_validate(cert, extra_certs,
- pkix_validation_store);
+ if (s == LDNS_STATUS_OK) {
+ return ldns_dane_pkix_validate(cert, extra_certs,
+ pkix_validation_store);
+ }
+ return s;
break;
case LDNS_TLSA_USAGE_TRUST_ANCHOR_ASSERTION:
static int
read_line(FILE *input, char *line, size_t len)
{
- size_t i;
+ int i;
char c;
for (i = 0; i < len-1; i++) {
.IP -6
TLS connect IPv6 only
.IP "-a \fIaddress\fR"
-Don't try to resolve \fIname\fR, but connect to \fIaddress\fR in stead.
+Don't try to resolve \fIname\fR, but connect to \fIaddress\fR instead.
This option may be given more than once.
.IP -b
-print "\fIname\fR\. TYPE52 \\# \fIsize\fR \fIhexdata\fR" form in stead
+print "\fIname\fR\. TYPE52 \\# \fIsize\fR \fIhexdata\fR" form instead
of TLSA presentation format.
.IP "-c \fIcertfile\fR"
Do not TLS connect to \fIname\fR:\fIport\fR, but authenticate (or make
-TLSA records) for the certificate (chain) in \fIcertfile\fR in stead.
+TLSA records) for the certificate (chain) in \fIcertfile\fR instead.
.IP -d
Assume DNSSEC validity even when the TLSA records were acquired insecure
or were bogus.
\fItransport\fR are used. Otherwise the owner name of the TLSA record(s)
will be used to determine \fIname\fR, \fIport\fR and \fItransport\fR.
.IP -u
-Use UDP transport in stead of TCP.
+Use UDP transport instead of TCP.
.IP -v
Show version and exit.
* "CA constraint" or "Service Certificate Constraint" to
* validate the certificate and, in case of "CA constraint",
* select the CA.
- * When NULL, validation is explicitely turned off and the
- * behaviour is then the same as for "Trust anchor assertion"
- * and "Domain issued certificate" respectively.
+ * When pkix_validation_store is NULL, validation is explicitely
+ * turned off and the behaviour is then the same as for "Trust
+ * anchor assertion" and "Domain issued certificate" respectively.
* \param[in] cert_usage Which certificate to use and how to validate.
* \param[in] index Used to select the trust anchor when certificate usage
* is "Trust Anchor Assertion". 0 is the last certificate in the