HomeSort by: relevance | last modified time | path
    Searched defs:rrsig (Results 1 - 22 of 22) sorted by relevancy

  /src/external/mpl/bind/dist/tests/dns/
rdataset_test.c 38 dns_rdata_rrsig_t rrsig; local
51 rrsig.timeexpire = ttltimeexpire;
52 rrsig.originalttl = 1000;
54 dns_rdataset_trimttl(&rdataset, &sigrdataset, &rrsig, ttltimenow, true);
60 rrsig.timeexpire = ttltimenow - 200;
61 rrsig.originalttl = 1000;
63 dns_rdataset_trimttl(&rdataset, &sigrdataset, &rrsig, ttltimenow, true);
69 rrsig.timeexpire = ttltimenow - 200;
70 rrsig.originalttl = 1000;
72 dns_rdataset_trimttl(&rdataset, &sigrdataset, &rrsig, ttltimenow
    [all...]
sigs_test.c 114 dns_rdata_rrsig_t rrsig; local
165 * Found tuple must be of type RRSIG.
174 result = dns_rdata_tostruct(&found->rdata, &rrsig, NULL);
177 result = dns_rdatatype_totext(rrsig.covered, &typebuf);
179 assert_int_equal(expected_type, rrsig.covered);
  /src/external/bsd/nsd/dist/
packet.c 123 rrset_type *rrsig; local
156 (rrsig = domain_find_rrset(owner, rrset->zone, TYPE_RRSIG)))
158 for (i = 0; i < rrsig->rr_count; ++i) {
159 if (rr_rrsig_type_covered(rrsig->rrs[i])
163 rrsig->rrs[i],
164 rrset_rrtype(rrset)==TYPE_SOA?rrset->rrs[0]->ttl:rrsig->rrs[i]->ttl))
  /src/external/mpl/bind/dist/lib/dns/
skr.c 161 dns_rdata_rrsig_t rrsig; local
169 result = dns_rdata_tostruct(&tuple->rdata, &rrsig, NULL);
178 if (rrsig.covered == covering_type &&
179 rrsig.keyid == dst_key_id(key))
ncache.c 596 dns_rdata_rrsig_t rrsig; local
654 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL);
655 if (rrsig.covered == covers) {
696 dns_rdata_rrsig_t rrsig; local
725 * Extract covers from RRSIG.
737 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL);
738 covers = rrsig.covered;
update.c 564 * Return true if the record is a RRSIG.
683 * Check whether there is an rrset other than a NSEC or RRSIG NSEC,
997 * Add RRSIG records for an RRset, recording the change in "diff".
1140 /* Calculate the signature, creating a RRSIG RDATA. */
1155 /* Update the database and journal with the RRSIG. */
1199 dns_rdata_rrsig_t rrsig; local
1224 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
1228 if (rrsig.keyid == dst_key_id(keys[i])) {
1247 * If there is not a matching DNSKEY then delete the RRSIG.
1345 * Update RRSIG, NSEC and NSEC3 records affected by an update. The origina
    [all...]
keymgr.c 997 * least one key with the same algorithm that has its RRSIG
1136 * Check for existence of RRSIG (zsk), or a good RRSIG state.
1137 * See equations what are good RRSIG states.
1245 * in that case allow publishing the RRSIG records before the
1326 * Rule 3: There must be RRSIG records at all times. Again,
1374 * publication of a DNSKEY (plus RRSIG (KSK)) before
1418 * dependent information (RRSIG ZSK) to be purged from
1426 * TTLsig is the maximum TTL of all zone RRSIG
2621 int rrsig, active, retire local
    [all...]
resolver.c 797 * ANY if qtype was SIG or RRSIG) */
5163 * typemap with just RRSIG(46) and NSEC(47) bits set.
5650 * Don't cache NSEC if missing NSEC or RRSIG types.
5819 dns_rdata_rrsig_t rrsig; local
5860 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
5862 /* Wildcard has rrsig.labels < labels - 1. */
5863 if (rrsig.labels + 1U >= labels) {
6012 * If this is an ANY, SIG or RRSIG query, we're
8034 * There can be multiple RRSIG and SIG records at a name so
9197 * NS or RRSIG NS
    [all...]
zone.c 6711 "DNSKEY RRSIG(s) have expired");
6718 "DNSKEY RRSIG(s) will expire within 7 days: %s",
6789 * Deleting the SOA RRSIG is always okay.
6837 dns_rdata_rrsig_t rrsig; local
6878 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
6883 if (delsig_ok(&rrsig, keys, nkeys, kasp != NULL, &warn))
6896 * At this point, we've got an RRSIG,
6900 * keep the old RRSIG. Marking the key as
6922 dns_secalg_format(rrsig.algorithm,
6931 rrsig.keyid)
7542 dns_rdata_rrsig_t rrsig; local
9318 dns_rdata_rrsig_t rrsig; local
20928 dns_rdata_rrsig_t rrsig; local
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
ncache.c 611 dns_rdata_rrsig_t rrsig; local
669 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL);
670 if (rrsig.covered == covers) {
718 dns_rdata_rrsig_t rrsig; local
749 * Extract covers from RRSIG.
761 (void)dns_rdata_tostruct(&rdata, &rrsig, NULL);
762 rdataset->covers = rrsig.covered;
keymgr.c 888 * least one key with the same algorithm that has its RRSIG
1027 * Check for existence of RRSIG (zsk), or a good RRSIG state.
1028 * See equations what are good RRSIG states.
1136 * in that case allow publishing the RRSIG records before the
1213 * Rule 3: There must be RRSIG records at all times. Again,
1255 * publication of a DNSKEY (plus RRSIG (KSK)) before
1288 * dependent information (RRSIG ZSK) to be purged from
1296 * TTLsig is the maximum TTL of all zone RRSIG
2378 int rrsig, active, retire local
    [all...]
update.c 677 * Return true if the record is a RRSIG.
797 * Check whether there is an rrset other than a NSEC or RRSIG NSEC,
1089 * Add RRSIG records for an RRset, recording the change in "diff".
1262 /* Calculate the signature, creating a RRSIG RDATA. */
1266 /* Update the database and journal with the RRSIG. */
1310 dns_rdata_rrsig_t rrsig; local
1338 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
1342 if (rrsig.keyid == dst_key_id(keys[i])) {
1361 * If there is not a matching DNSKEY then delete the RRSIG.
1459 * Update RRSIG, NSEC and NSEC3 records affected by an update. The origina
    [all...]
resolver.c 749 * ANY if qtype was SIG or RRSIG) */
956 dns_rdata_rrsig_t rrsig; local
966 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
968 namereln = dns_name_fullcompare(&rrsig.signer, &fctx->domain,
1017 * Also accept answers with RRSIG records from the child zone.
1018 * Direct queries for RRSIG records should not be answered from
1043 * RRsig from child?
6240 dns_rdata_rrsig_t rrsig; local
6281 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
6283 /* Wildcard has rrsig.labels < labels - 1. *
    [all...]
zone.c 6734 "DNSKEY RRSIG(s) have expired");
6741 "DNSKEY RRSIG(s) will expire within 7 days: %s",
6812 * Deleting the SOA RRSIG is always okay.
6860 dns_rdata_rrsig_t rrsig; local
6897 result = dns_rdata_tostruct(&rdata, &rrsig, NULL);
6904 if (delsig_ok(&rrsig, keys, nkeys, kasp, &warn)) {
6916 * At this point, we've got an RRSIG,
6920 * keep the old RRSIG. Marking the key as
6942 dns_secalg_format(rrsig.algorithm,
6951 rrsig.keyid)
7620 dns_rdata_rrsig_t rrsig; local
9391 dns_rdata_rrsig_t rrsig; local
20601 dns_rdata_rrsig_t rrsig; local
    [all...]
  /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/utilities/
rdata_parser.c 364 // MARK: - RRSIG Parser
367 uint16_t type_covered; // Indicates which DNS type RRSIG covers.
369 uint8_t labels; // The number of labels in the RRSIG owner name, is used to check wild matching.
370 uint32_t original_ttl; // The original TTL of the records that are covered by the RRSIG, it is used to
372 uint32_t signature_expiration; // The epoch time when the RRSIG expires.
373 uint32_t signature_inception; // The epoch time when the RRSIG should start to be valid to validate.
374 uint16_t key_tag; // The key tag that identifies which DNSKEY it uses to generate the current RRSIG.
458 const rdata_rrsig_t * const rrsig = (const rdata_rrsig_t *)rdata; local
459 const uint8_t * const signer_name = rrsig->signer_name;
472 // Minimal size of the RRSIG rdata: <all the fields before signer_name> + <1 byte root domain> + <1 byte signature
    [all...]
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-ksr.c 690 dns_rdata_t *rrsig = NULL; local
714 rrsig = isc_mem_get(mctx, sizeof(*rrsig));
715 dns_rdata_init(rrsig);
726 dns_rdata_fromregion(rrsig, dns_rdataclass_in,
728 ISC_LIST_APPEND(rrsiglist->rdata, rrsig, link);
dnssec-signzone.c 357 * Find the key that generated an RRSIG, if it is in the key list. If
363 keythatsigned_unlocked(dns_rdata_rrsig_t *rrsig) {
369 if (rrsig->keyid == dst_key_id(key->key) &&
370 rrsig->algorithm == dst_key_alg(key->key) &&
371 dns_name_equal(&rrsig->signer, dst_key_name(key->key)))
380 * Finds the key that generated a RRSIG, if possible. First look at the keys
384 keythatsigned(dns_rdata_rrsig_t *rrsig) {
390 key = keythatsigned_unlocked(rrsig);
404 key = keythatsigned_unlocked(rrsig);
410 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid
494 dns_rdata_rrsig_t rrsig; local
    [all...]
  /src/external/apache2/mDNSResponder/dist/Clients/
dns-sd.c 360 else if (!strcasecmp(s, "rrsig" )) return(kDNSServiceType_RRSIG);
417 case kDNSServiceType_RRSIG: return("RRSIG");
1108 rdataRRSig *rrsig = (rdataRRSig *)rd; local
1117 expClock = (unsigned long)swap32(rrsig->sigExpireTime);
1120 inceptClock = (unsigned long)swap32(rrsig->sigInceptTime);
1124 DNSTypeName(swap16(rrsig->typeCovered)), rrsig->alg, rrsig->labels, swap32(rrsig->origTTL),
1125 expTimeBuf, inceptTimeBuf, swap16(rrsig->keyTag))
    [all...]
  /src/external/apache2/mDNSResponder/dist/mDNSCore/
DNSCommon.c 284 case kDNSType_RRSIG: return("RRSIG");
606 // See <https://datatracker.ietf.org/doc/html/rfc4034#section-3.2> for RRSIG RR Presentation Format.
609 dnssec_obj_rr_rrsig_t rrsig = NULL; local
612 rrsig = dnssec_obj_rr_rrsig_create(rr->name->c, rr->rdata->u.data, rr->rdlength, false, &err);
617 rrsig_rdata_description = dnssec_obj_rr_copy_rdata_rfc_description(rrsig, &err);
626 MDNS_DISPOSE_DNSSEC_OBJ(rrsig);
2121 // The type covered of RRSIG should match the non-duplicate DNSSEC question type, because RRSIG will be used by it
mDNS.c 5488 // If we get a CNAME back while we are validating the response (i.e., CNAME for DS, DNSKEY, RRSIG),
6166 // If the RRSIG covers a CNAME, and this RRSIG covers a wildcard resource record,
9765 // This operation ensures that mDNSResponder will deliver all the records including RRSIG or denial of
10210 // Here we assume that the total number of RRSIG records contained in a response should be no more than 30 (large enough).
10215 // Parse SOA, NSEC/NSEC3, RRSIG records contained in the DNS message to DNSSEC objects.
10249 // All SOA, NSEC/NSEC3, RRSIG records are in the authority section.
10298 // Other than SOA, NSEC/NSEC3/RRSIG can use the rdata parsed by GetLargeResourceRecord() directly because
10331 dnssec_obj_rr_rrsig_t rrsig = dnssec_obj_rr_rrsig_create(rr->name->c, rr->rdata->u.data, rr->rdlength, mDNStrue, &err); local
10337 const mDNSu16 typeCovered = dnssec_obj_rr_rrsig_get_type_covered(rrsig);
    [all...]
  /src/external/bsd/unbound/dist/services/
authzone.c 686 /** find an rrsig index in the rrset. returns true if found */
717 /** get rrsig type covered from rdata.
918 rrsig_num_that_cover(struct auth_rrset* rrsig, uint16_t rr_type, size_t* sigsz)
920 struct packed_rrset_data* d = rrsig->data;
923 log_assert(d && rrsig->type == LDNS_RR_TYPE_RRSIG);
934 /** See if rrsig set has covered sigs for rrset and move them over */
937 struct auth_rrset* rrset, struct auth_rrset* rrsig)
940 struct packed_rrset_data* sigold = rrsig->data;
945 log_assert(rrsig->type == LDNS_RR_TYPE_RRSIG);
946 sigs = rrsig_num_that_cover(rrsig, rr_type, &sigsz)
1139 struct auth_rrset* rrsig; local
    [all...]
  /src/external/mpl/bind/dist/lib/ns/
query.c 2366 dns_rdata_rrsig_t *rrsig, dns_rdataset_t *rdataset,
2388 dns_rdataset_trimttl(rdataset, sigrdataset, rrsig, now,
2399 * Find the secure key that corresponds to rrsig.
2405 get_key(ns_client_t *client, dns_db_t *db, dns_rdata_rrsig_t *rrsig,
2417 result = dns_db_findnodeext(db, &rrsig->signer, false, &cm, &ci,
2448 result = dst_key_fromdns(&rrsig->signer, rdata.rdclass, &b,
2453 if (rrsig->algorithm == (dns_secalg_t)dst_key_alg(*keyp) &&
2454 rrsig->keyid == (dns_keytag_t)dst_key_id(*keyp) &&
2496 dns_rdata_rrsig_t rrsig; local
2509 result = dns_rdata_tostruct(&rdata, &rrsig, NULL)
10050 dns_rdata_rrsig_t rrsig; local
    [all...]

Completed in 210 milliseconds