Home | History | Annotate | Download | only in isctest

Lines Matching defs:dnskey

62         config["dnskey-ttl"]
69 ttl1 = config["dnskey-ttl"] + config["publish-safety"]
75 # dnskey-ttl, and no publish-safety (because we are looking at
446 def dnskey(self) -> dns.rrset.RRset:
458 dnskey_rr.rdtype == dns.rdatatype.DNSKEY
459 ), f"DNSKEY not found in {self.keyfile}"
463 dnskey = self.dnskey
465 ds = dns.dnssec.make_ds(dnskey.name, dnskey[0], dsdigest)
469 parts = str(dnskey).split()
473 return TrustAnchor(str(dnskey.name), ta_type, contents)
487 dnskey = value.split()
491 assert dnskey[3] == "CDNSKEY"
492 dnskey[3] = "DNSKEY"
495 rdata = " ".join(dnskey[:7])
503 pubkey_fromwire = "".join(dnskey[7:])
599 dnskey = f"{zone}. {ttl} IN DNSKEY {flags} 3 {alg}"
600 if not isctest.util.file_contents_contain(self.keyfile, dnskey):
601 isctest.log.debug(f"{self.name} DNSKEY MISMATCH: expected '{dnskey}'")
867 if covers in [dns.rdatatype.DNSKEY, dns.rdatatype.CDNSKEY, dns.rdatatype.CDS]:
979 for dnskey in dnskeys:
980 assert not key.dnskey_equals(dnskey, cdnskey=cdnskey)
984 for dnskey in dnskeys:
985 if key.dnskey_equals(dnskey, cdnskey=cdnskey):
1000 # Check if the correct DNSKEY records are published. If the current time
1002 # a DNSKEY record published. If 'cdnskey' is True, check against CDNSKEY
1011 dnskey = f"{rr.name} {rr.ttl} {rdclass} {rdtype} {rdata}"
1012 dnskeys.append(dnskey)
1127 # Test the apex of a zone. This checks that the SOA and DNSKEY RRsets
1134 # test dnskey query
1135 dnskeys, rrsigs = _query_rrset(server, fqdn, dns.rdatatype.DNSKEY, tsig=tsig)
1138 rrsigs, dns.rdatatype.DNSKEY, fqdn, ksks, zsks, offline_ksk=offline_ksk
1246 ttl = int(config["dnskey-ttl"].total_seconds())
1535 - "goal", "dnskey", "krrsig", "zrrsig", "ds", followed by a value,
1577 elif line[i].startswith("dnskey:"):