| /src/external/mpl/bind/dist/tests/dns/ |
| rdataset_test.c | 38 dns_rdata_rrsig_t rrsig; local 51 rrsig.timeexpire = ttltimeexpire; 52 rrsig.originalttl = 1000; 54 dns_rdataset_trimttl(&rdataset, &sigrdataset, &rrsig, ttltimenow, true); 60 rrsig.timeexpire = ttltimenow - 200; 61 rrsig.originalttl = 1000; 63 dns_rdataset_trimttl(&rdataset, &sigrdataset, &rrsig, ttltimenow, true); 69 rrsig.timeexpire = ttltimenow - 200; 70 rrsig.originalttl = 1000; 72 dns_rdataset_trimttl(&rdataset, &sigrdataset, &rrsig, ttltimenow [all...] |
| sigs_test.c | 114 dns_rdata_rrsig_t rrsig; local 165 * Found tuple must be of type RRSIG. 174 result = dns_rdata_tostruct(&found->rdata, &rrsig, NULL); 177 result = dns_rdatatype_totext(rrsig.covered, &typebuf); 179 assert_int_equal(expected_type, rrsig.covered);
|
| /src/external/bsd/nsd/dist/ |
| packet.c | 123 rrset_type *rrsig; local 156 (rrsig = domain_find_rrset(owner, rrset->zone, TYPE_RRSIG))) 158 for (i = 0; i < rrsig->rr_count; ++i) { 159 if (rr_rrsig_type_covered(rrsig->rrs[i]) 163 rrsig->rrs[i], 164 rrset_rrtype(rrset)==TYPE_SOA?rrset->rrs[0]->ttl:rrsig->rrs[i]->ttl))
|
| /src/external/mpl/bind/dist/lib/dns/ |
| skr.c | 161 dns_rdata_rrsig_t rrsig; local 169 result = dns_rdata_tostruct(&tuple->rdata, &rrsig, NULL); 178 if (rrsig.covered == covering_type && 179 rrsig.keyid == dst_key_id(key))
|
| ncache.c | 596 dns_rdata_rrsig_t rrsig; local 654 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL); 655 if (rrsig.covered == covers) { 696 dns_rdata_rrsig_t rrsig; local 725 * Extract covers from RRSIG. 737 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL); 738 covers = rrsig.covered;
|
| update.c | 564 * Return true if the record is a RRSIG. 683 * Check whether there is an rrset other than a NSEC or RRSIG NSEC, 997 * Add RRSIG records for an RRset, recording the change in "diff". 1140 /* Calculate the signature, creating a RRSIG RDATA. */ 1155 /* Update the database and journal with the RRSIG. */ 1199 dns_rdata_rrsig_t rrsig; local 1224 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 1228 if (rrsig.keyid == dst_key_id(keys[i])) { 1247 * If there is not a matching DNSKEY then delete the RRSIG. 1345 * Update RRSIG, NSEC and NSEC3 records affected by an update. The origina [all...] |
| keymgr.c | 997 * least one key with the same algorithm that has its RRSIG 1136 * Check for existence of RRSIG (zsk), or a good RRSIG state. 1137 * See equations what are good RRSIG states. 1245 * in that case allow publishing the RRSIG records before the 1326 * Rule 3: There must be RRSIG records at all times. Again, 1374 * publication of a DNSKEY (plus RRSIG (KSK)) before 1418 * dependent information (RRSIG ZSK) to be purged from 1426 * TTLsig is the maximum TTL of all zone RRSIG 2621 int rrsig, active, retire local [all...] |
| resolver.c | 797 * ANY if qtype was SIG or RRSIG) */ 5163 * typemap with just RRSIG(46) and NSEC(47) bits set. 5650 * Don't cache NSEC if missing NSEC or RRSIG types. 5819 dns_rdata_rrsig_t rrsig; local 5860 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 5862 /* Wildcard has rrsig.labels < labels - 1. */ 5863 if (rrsig.labels + 1U >= labels) { 6012 * If this is an ANY, SIG or RRSIG query, we're 8034 * There can be multiple RRSIG and SIG records at a name so 9197 * NS or RRSIG NS [all...] |
| zone.c | 6711 "DNSKEY RRSIG(s) have expired"); 6718 "DNSKEY RRSIG(s) will expire within 7 days: %s", 6789 * Deleting the SOA RRSIG is always okay. 6837 dns_rdata_rrsig_t rrsig; local 6878 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 6883 if (delsig_ok(&rrsig, keys, nkeys, kasp != NULL, &warn)) 6896 * At this point, we've got an RRSIG, 6900 * keep the old RRSIG. Marking the key as 6922 dns_secalg_format(rrsig.algorithm, 6931 rrsig.keyid) 7542 dns_rdata_rrsig_t rrsig; local 9318 dns_rdata_rrsig_t rrsig; local 20928 dns_rdata_rrsig_t rrsig; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| ncache.c | 611 dns_rdata_rrsig_t rrsig; local 669 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL); 670 if (rrsig.covered == covers) { 718 dns_rdata_rrsig_t rrsig; local 749 * Extract covers from RRSIG. 761 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL); 762 rdataset->covers = rrsig.covered;
|
| keymgr.c | 888 * least one key with the same algorithm that has its RRSIG 1027 * Check for existence of RRSIG (zsk), or a good RRSIG state. 1028 * See equations what are good RRSIG states. 1136 * in that case allow publishing the RRSIG records before the 1213 * Rule 3: There must be RRSIG records at all times. Again, 1255 * publication of a DNSKEY (plus RRSIG (KSK)) before 1288 * dependent information (RRSIG ZSK) to be purged from 1296 * TTLsig is the maximum TTL of all zone RRSIG 2378 int rrsig, active, retire local [all...] |
| update.c | 677 * Return true if the record is a RRSIG. 797 * Check whether there is an rrset other than a NSEC or RRSIG NSEC, 1089 * Add RRSIG records for an RRset, recording the change in "diff". 1262 /* Calculate the signature, creating a RRSIG RDATA. */ 1266 /* Update the database and journal with the RRSIG. */ 1310 dns_rdata_rrsig_t rrsig; local 1338 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 1342 if (rrsig.keyid == dst_key_id(keys[i])) { 1361 * If there is not a matching DNSKEY then delete the RRSIG. 1459 * Update RRSIG, NSEC and NSEC3 records affected by an update. The origina [all...] |
| resolver.c | 749 * ANY if qtype was SIG or RRSIG) */ 956 dns_rdata_rrsig_t rrsig; local 966 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 968 namereln = dns_name_fullcompare(&rrsig.signer, &fctx->domain, 1017 * Also accept answers with RRSIG records from the child zone. 1018 * Direct queries for RRSIG records should not be answered from 1043 * RRsig from child? 6240 dns_rdata_rrsig_t rrsig; local 6281 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 6283 /* Wildcard has rrsig.labels < labels - 1. * [all...] |
| zone.c | 6734 "DNSKEY RRSIG(s) have expired"); 6741 "DNSKEY RRSIG(s) will expire within 7 days: %s", 6812 * Deleting the SOA RRSIG is always okay. 6860 dns_rdata_rrsig_t rrsig; local 6897 result = dns_rdata_tostruct(&rdata, &rrsig, NULL); 6904 if (delsig_ok(&rrsig, keys, nkeys, kasp, &warn)) { 6916 * At this point, we've got an RRSIG, 6920 * keep the old RRSIG. Marking the key as 6942 dns_secalg_format(rrsig.algorithm, 6951 rrsig.keyid) 7620 dns_rdata_rrsig_t rrsig; local 9391 dns_rdata_rrsig_t rrsig; local 20601 dns_rdata_rrsig_t rrsig; local [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/utilities/ |
| rdata_parser.c | 364 // MARK: - RRSIG Parser 367 uint16_t type_covered; // Indicates which DNS type RRSIG covers. 369 uint8_t labels; // The number of labels in the RRSIG owner name, is used to check wild matching. 370 uint32_t original_ttl; // The original TTL of the records that are covered by the RRSIG, it is used to 372 uint32_t signature_expiration; // The epoch time when the RRSIG expires. 373 uint32_t signature_inception; // The epoch time when the RRSIG should start to be valid to validate. 374 uint16_t key_tag; // The key tag that identifies which DNSKEY it uses to generate the current RRSIG. 458 const rdata_rrsig_t * const rrsig = (const rdata_rrsig_t *)rdata; local 459 const uint8_t * const signer_name = rrsig->signer_name; 472 // Minimal size of the RRSIG rdata: <all the fields before signer_name> + <1 byte root domain> + <1 byte signature [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-ksr.c | 690 dns_rdata_t *rrsig = NULL; local 714 rrsig = isc_mem_get(mctx, sizeof(*rrsig)); 715 dns_rdata_init(rrsig); 726 dns_rdata_fromregion(rrsig, dns_rdataclass_in, 728 ISC_LIST_APPEND(rrsiglist->rdata, rrsig, link);
|
| dnssec-signzone.c | 357 * Find the key that generated an RRSIG, if it is in the key list. If 363 keythatsigned_unlocked(dns_rdata_rrsig_t *rrsig) { 369 if (rrsig->keyid == dst_key_id(key->key) && 370 rrsig->algorithm == dst_key_alg(key->key) && 371 dns_name_equal(&rrsig->signer, dst_key_name(key->key))) 380 * Finds the key that generated a RRSIG, if possible. First look at the keys 384 keythatsigned(dns_rdata_rrsig_t *rrsig) { 390 key = keythatsigned_unlocked(rrsig); 404 key = keythatsigned_unlocked(rrsig); 410 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid 494 dns_rdata_rrsig_t rrsig; local [all...] |
| /src/external/apache2/mDNSResponder/dist/Clients/ |
| dns-sd.c | 360 else if (!strcasecmp(s, "rrsig" )) return(kDNSServiceType_RRSIG); 417 case kDNSServiceType_RRSIG: return("RRSIG"); 1108 rdataRRSig *rrsig = (rdataRRSig *)rd; local 1117 expClock = (unsigned long)swap32(rrsig->sigExpireTime); 1120 inceptClock = (unsigned long)swap32(rrsig->sigInceptTime); 1124 DNSTypeName(swap16(rrsig->typeCovered)), rrsig->alg, rrsig->labels, swap32(rrsig->origTTL), 1125 expTimeBuf, inceptTimeBuf, swap16(rrsig->keyTag)) [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSCore/ |
| DNSCommon.c | 284 case kDNSType_RRSIG: return("RRSIG"); 606 // See <https://datatracker.ietf.org/doc/html/rfc4034#section-3.2> for RRSIG RR Presentation Format. 609 dnssec_obj_rr_rrsig_t rrsig = NULL; local 612 rrsig = dnssec_obj_rr_rrsig_create(rr->name->c, rr->rdata->u.data, rr->rdlength, false, &err); 617 rrsig_rdata_description = dnssec_obj_rr_copy_rdata_rfc_description(rrsig, &err); 626 MDNS_DISPOSE_DNSSEC_OBJ(rrsig); 2121 // The type covered of RRSIG should match the non-duplicate DNSSEC question type, because RRSIG will be used by it
|
| mDNS.c | 5488 // If we get a CNAME back while we are validating the response (i.e., CNAME for DS, DNSKEY, RRSIG), 6166 // If the RRSIG covers a CNAME, and this RRSIG covers a wildcard resource record, 9765 // This operation ensures that mDNSResponder will deliver all the records including RRSIG or denial of 10210 // Here we assume that the total number of RRSIG records contained in a response should be no more than 30 (large enough). 10215 // Parse SOA, NSEC/NSEC3, RRSIG records contained in the DNS message to DNSSEC objects. 10249 // All SOA, NSEC/NSEC3, RRSIG records are in the authority section. 10298 // Other than SOA, NSEC/NSEC3/RRSIG can use the rdata parsed by GetLargeResourceRecord() directly because 10331 dnssec_obj_rr_rrsig_t rrsig = dnssec_obj_rr_rrsig_create(rr->name->c, rr->rdata->u.data, rr->rdlength, mDNStrue, &err); local 10337 const mDNSu16 typeCovered = dnssec_obj_rr_rrsig_get_type_covered(rrsig); [all...] |
| /src/external/bsd/unbound/dist/services/ |
| authzone.c | 686 /** find an rrsig index in the rrset. returns true if found */ 717 /** get rrsig type covered from rdata. 918 rrsig_num_that_cover(struct auth_rrset* rrsig, uint16_t rr_type, size_t* sigsz) 920 struct packed_rrset_data* d = rrsig->data; 923 log_assert(d && rrsig->type == LDNS_RR_TYPE_RRSIG); 934 /** See if rrsig set has covered sigs for rrset and move them over */ 937 struct auth_rrset* rrset, struct auth_rrset* rrsig) 940 struct packed_rrset_data* sigold = rrsig->data; 945 log_assert(rrsig->type == LDNS_RR_TYPE_RRSIG); 946 sigs = rrsig_num_that_cover(rrsig, rr_type, &sigsz) 1139 struct auth_rrset* rrsig; local [all...] |
| /src/external/mpl/bind/dist/lib/ns/ |
| query.c | 2366 dns_rdata_rrsig_t *rrsig, dns_rdataset_t *rdataset, 2388 dns_rdataset_trimttl(rdataset, sigrdataset, rrsig, now, 2399 * Find the secure key that corresponds to rrsig. 2405 get_key(ns_client_t *client, dns_db_t *db, dns_rdata_rrsig_t *rrsig, 2417 result = dns_db_findnodeext(db, &rrsig->signer, false, &cm, &ci, 2448 result = dst_key_fromdns(&rrsig->signer, rdata.rdclass, &b, 2453 if (rrsig->algorithm == (dns_secalg_t)dst_key_alg(*keyp) && 2454 rrsig->keyid == (dns_keytag_t)dst_key_id(*keyp) && 2496 dns_rdata_rrsig_t rrsig; local 2509 result = dns_rdata_tostruct(&rdata, &rrsig, NULL) 10050 dns_rdata_rrsig_t rrsig; local [all...] |