HomeSort by: relevance | last modified time | path
    Searched defs:dnskey (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
cdnskey_60.c 87 dns_rdata_cdnskey_t *dnskey = target; local
89 REQUIRE(dnskey != NULL);
93 DNS_RDATACOMMON_INIT(dnskey, rdata->type, rdata->rdclass);
100 dns_rdata_cdnskey_t *dnskey = (dns_rdata_cdnskey_t *)source; local
102 REQUIRE(dnskey != NULL);
103 REQUIRE(dnskey->common.rdtype == dns_rdatatype_cdnskey);
dnskey_48.c 88 dns_rdata_dnskey_t *dnskey = target; local
90 REQUIRE(dnskey != NULL);
94 DNS_RDATACOMMON_INIT(dnskey, rdata->type, rdata->rdclass);
101 dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *)source; local
103 REQUIRE(dnskey != NULL);
104 REQUIRE(dnskey->common.rdtype == dns_rdatatype_dnskey);
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
cdnskey_60.c 87 dns_rdata_cdnskey_t *dnskey = target; local
89 REQUIRE(dnskey != NULL);
93 dnskey->common.rdclass = rdata->rdclass;
94 dnskey->common.rdtype = rdata->type;
95 ISC_LINK_INIT(&dnskey->common, link);
102 dns_rdata_cdnskey_t *dnskey = (dns_rdata_cdnskey_t *)source; local
104 REQUIRE(dnskey != NULL);
105 REQUIRE(dnskey->common.rdtype == dns_rdatatype_cdnskey);
dnskey_48.c 88 dns_rdata_dnskey_t *dnskey = target; local
90 REQUIRE(dnskey != NULL);
94 dnskey->common.rdclass = rdata->rdclass;
95 dnskey->common.rdtype = rdata->type;
96 ISC_LINK_INIT(&dnskey->common, link);
103 dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *)source; local
105 REQUIRE(dnskey != NULL);
106 REQUIRE(dnskey->common.rdtype == dns_rdatatype_dnskey);
  /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/
dns_obj_rr_dnskey.c 34 // MARK: - DNS DNSKEY Resource Record Kind Definition
38 uint16_t key_tag; // The key tag of the DNSKEY record that can be used to match RRSIG/DS records.
45 DNS_OBJECT_SUBKIND_DEFINE_ABSTRUCT(rr, dnskey,
57 // MARK: - DNS DNSKEY Resource Record Public Methods
64 dns_obj_rr_dnskey_t dnskey = NULL; local
79 dnskey = obj;
80 dns_obj_retain(dnskey);
88 return dnskey;
230 // MARK: - DNSKEY Public Functions
299 // MARK: - DNS DNSKEY Resource Record Private Method
    [all...]
  /src/external/bsd/unbound/dist/testcode/
unitverify.c 112 /** extract DNSKEY rrset from answer and convert it */
117 struct ub_packed_rrset_key* dnskey = NULL; local
125 dnskey = rep->rrsets[i];
130 unit_assert(dnskey);
134 return dnskey;
163 /** setup sig alg list from dnskey */
165 setup_sigalg(struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
170 for(i=0; i<rrset_get_count(dnskey); i++) {
171 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i);
183 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
259 struct ub_packed_rrset_key* ds, *dnskey; local
304 struct ub_packed_rrset_key* dnskey; local
    [all...]
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-dsfromkey.c 133 fatal("no DNSKEY RR for %s in %s", setname, filename);
255 dns_rdata_dnskey_t dnskey; local
263 result = dns_rdata_tostruct(rdata, &dnskey, NULL);
265 fatal("can't convert DNSKEY");
268 if ((dnskey.flags & DNS_KEYFLAG_REVOKE) != 0) {
272 if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0 && !showall) {
533 fatal("could not load DNSKEY set: %s\n",
dnssec-settime.c 92 fprintf(stderr, " -k state date/[+-]offset: set the DNSKEY state\n");
213 dst_key_state_t dnskey = DST_KEY_STATE_NA; local
296 (void)isoptarg("dnskey", argv, usage);
377 dnskey = strtokeystate(isc_commandline_argument);
415 (void)isoptarg("dnskey", argv, usage);
866 if (dnskey == DST_KEY_STATE_NA) {
870 dst_key_setstate(key, DST_KEY_DNSKEY, dnskey);
dnssec-cds.c 84 static int nkey; /* number of child zone DNSKEY records */
91 * The child DNSKEY RRset is scanned to find out which keys are
96 * the child DNSKEY, CDNSKEY, and CDS RRsets. In this program, only keys
471 * Find out if any (C)DS record matches a particular (C)DNSKEY.
524 ki->rdata.type == dns_rdatatype_cdnskey ? "CDNSKEY" : "DNSKEY",
531 * Find which (C)DNSKEY records match a (C)DS RRset.
549 dns_rdata_dnskey_t dnskey; local
559 result = dns_rdata_tostruct(keyrdata, &dnskey, NULL);
560 check_result(result, "dns_rdata_tostruct(DNSKEY)");
561 ki->algo = dnskey.algorithm
    [all...]
dnssec-signzone.c 306 fatal("dnskey '%s' failed to sign data: %s", keystr,
464 fatal("failure looking for '%s DNSKEY' in database: %s", namestr,
574 "private dnskey not found\n",
578 vbprintf(2, "\trrsig by %s %s - dnskey not found\n",
611 vbprintf(2, "\trrsig by %s dropped - dnskey removed\n",
678 "resigning with dnskey");
738 "signing with dnskey");
799 "signing with dnskey");
1066 /* No DS records found; try again, looking for DNSKEY records */
1086 vbprintf(2, "found DNSKEY records\n")
2936 dns_rdata_dnskey_t dnskey; local
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
nsec.c 253 dns_rdata_dnskey_t dnskey; local
281 result = dns_rdata_tostruct(&rdata, &dnskey, NULL);
284 if (dnskey.algorithm == DST_ALG_RSAMD5 ||
285 dnskey.algorithm == DST_ALG_DSA ||
286 dnskey.algorithm == DST_ALG_RSASHA1)
dnssec.c 407 * NS, SOA and DNSKEY records are signed by their owner.
1151 * algorithm, we strive to publish its signatures and DNSKEY records
1297 * Get a list of KEY or DNSKEY keys from the key repository. If rrtypekey
1424 * Mark all keys which signed the DNSKEY/SOA RRsets as "active",
1506 * Add the contents of a DNSKEY rdataset 'keyset' to 'keylist'.
1516 dst_key_t *dnskey = NULL, *pubkey = NULL, *privkey = NULL; local
1539 CHECK(dns_dnssec_keyfromrdata(origin, &rdata, mctx, &dnskey));
1540 dst_key_setttl(dnskey, keys.ttl);
1542 if (!is_zone_key(dnskey)) {
1547 if (!dns_name_equal(origin, dst_key_name(dnskey))) {
1748 dns_rdata_t dnskey = DNS_RDATA_INIT; local
1782 dns_rdata_t dnskey = DNS_RDATA_INIT; local
    [all...]
zoneverify.c 1388 zoneverify_log_error(vctx, "DNSKEY is not signed "
1438 * verified zone based on the signatures made using 'dnskey' (prepared from
1440 * if 'dnskey' correctly signs the DNSKEY RRset at zone apex and either
1441 * 'vctx->secroots' is NULL or 'dnskey' is present in 'vctx->secroots'.
1444 * 'dnskey' is a KSK and false otherwise.
1447 check_dnskey_sigs(vctx_t *vctx, const dns_rdata_dnskey_t *dnskey,
1461 * First, does this key sign the DNSKEY rrset?
1470 if (active_keys[dnskey->algorithm] != DNS_KEYALG_MAX) {
1471 active_keys[dnskey->algorithm]++
1578 dns_rdata_dnskey_t dnskey; local
    [all...]
  /src/external/mpl/bind/dist/tests/dns/
keytable_test.c 140 dns_rdata_dnskey_t dnskey; local
143 * Populate DNSKEY rdata structure.
145 create_keystruct(flags, proto, alg, keystr, &dnskey);
151 result = dns_rdata_fromstruct(&rdata, dnskey.common.rdclass,
152 dnskey.common.rdtype, &dnskey,
163 dns_rdata_freestruct(&dnskey);
414 dns_rdata_dnskey_t dnskey; local
424 create_keystruct(257, 3, 5, keystr1, &dnskey);
425 assert_int_equal(dns_keytable_deletekey(keytable, keyname, &dnskey),
    [all...]
skr_test.c 230 /* Create the DNSKEY signature. */
350 int dnskey = 0; local
360 switch (dnskey) {
381 dnskey++;
  /src/external/mpl/dhcp/bind/dist/lib/dns/
nsec.c 256 dns_rdata_dnskey_t dnskey; local
284 result = dns_rdata_tostruct(&rdata, &dnskey, NULL);
287 if (dnskey.algorithm == DST_ALG_RSAMD5 ||
288 dnskey.algorithm == DST_ALG_RSASHA1)
dnssec.c 1359 * algorithm, we strive to publish its signatures and DNSKEY records
1599 * Mark all keys which signed the DNSKEY/SOA RRsets as "active",
1650 * Add the contents of a DNSKEY rdataset 'keyset' to 'keylist'.
1660 dst_key_t *dnskey = NULL, *pubkey = NULL, *privkey = NULL; local
1683 RETERR(dns_dnssec_keyfromrdata(origin, &rdata, mctx, &dnskey));
1684 dst_key_setttl(dnskey, keys.ttl);
1686 if (!is_zone_key(dnskey) ||
1687 (dst_key_flags(dnskey) & DNS_KEYTYPE_NOAUTH) != 0)
1693 if (!dns_name_equal(origin, dst_key_name(dnskey))) {
1698 RETERR(addkey(keylist, &dnskey, savekeys, mctx))
1899 dns_rdata_t dnskey = DNS_RDATA_INIT; local
1932 dns_rdata_t dnskey = DNS_RDATA_INIT; local
    [all...]
zoneverify.c 1387 zoneverify_log_error(vctx, "DNSKEY is not signed "
1437 * verified zone based on the signatures made using 'dnskey' (prepared from
1439 * if 'dnskey' correctly signs the DNSKEY RRset at zone apex and either
1440 * 'vctx->secroots' is NULL or 'dnskey' is present in 'vctx->secroots'.
1443 * 'dnskey' is a KSK and false otherwise.
1446 check_dnskey_sigs(vctx_t *vctx, const dns_rdata_dnskey_t *dnskey,
1460 * First, does this key sign the DNSKEY rrset?
1469 if (active_keys[dnskey->algorithm] != DNS_KEYALG_MAX) {
1470 active_keys[dnskey->algorithm]++
1577 dns_rdata_dnskey_t dnskey; local
    [all...]
  /src/external/bsd/unbound/dist/validator/
val_utils.c 471 /* temporary dnskey rrset-key */
472 struct ub_packed_rrset_key dnskey; local
475 dnskey.rk.type = htons(kd->rrset_type);
476 dnskey.rk.rrset_class = htons(kkey->key_class);
477 dnskey.rk.flags = 0;
478 dnskey.rk.dname = kkey->name;
479 dnskey.rk.dname_len = kkey->namelen;
480 dnskey.entry.key = &dnskey;
481 dnskey.entry.data = kd->rrset_data
    [all...]
validator.c 613 * The trust anchor can be DNSKEY or DS and does not have to be signed.
662 * trusted DNSKEY rrset that signs this response must already have been
1348 * trusted DNSKEY rrset that signs this response must already have been
1385 * trusted DNSKEY rrset that signs this response must already have been
1890 /* is a DNSKEY so lookup a bit higher since we want to
1984 * to query and either issues a DS or a DNSKEY query. It will check to see
2006 * It could be an isnull key, which signals the DNSKEY failed
2013 verbose(VERB_ALGO, "error generating DNSKEY request");
2076 * for the next DNSKEY. */
2086 verbose(VERB_ALGO, "error generating DNSKEY request")
3251 struct ub_packed_rrset_key* dnskey = NULL; local
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/isctest/
kasp.py 62 config["dnskey-ttl"]
69 ttl1 = config["dnskey-ttl"] + config["publish-safety"]
75 # dnskey-ttl, and no publish-safety (because we are looking at
446 def dnskey(self) -> dns.rrset.RRset: member in class:Key
458 dnskey_rr.rdtype == dns.rdatatype.DNSKEY
459 ), f"DNSKEY not found in {self.keyfile}"
463 dnskey = self.dnskey
465 ds = dns.dnssec.make_ds(dnskey.name, dnskey[0], dsdigest
    [all...]
  /src/external/bsd/unbound/dist/smallapp/
unbound-anchor.c 50 * * mostly: use RFC5011 tracking, quick . DNSKEY UDP query.
54 * * DNSKEY probe must be NOERROR, saves a lot of https traffic.
68 * have only probed the . DNSKEY, not done expensive https transfers on the
78 * the file contains a list of normal DNSKEY/DS records, and uses that to
2148 if(verb) printf("resolve DNSKEY: %s\n", ub_strerror(r));
2263 struct ub_result* dnskey; local
2268 dnskey = prime_root_key(ctx);
2270 return dnskey;
2281 struct ub_result* dnskey; local
2291 * and probe . DNSKEY */
    [all...]
  /src/external/mpl/bind/dist/bin/delv/
delv.c 640 dns_rdata_dnskey_t dnskey; local
685 /* if DNSKEY, flags; if DS, key tag */
688 /* if DNSKEY, protocol; if DS, algorithm */
691 /* if DNSKEY, algorithm; if DS, digest type */
738 dnskey.common.rdclass = dns_rdataclass_in;
739 dnskey.common.rdtype = dns_rdatatype_dnskey;
740 dnskey.mctx = NULL;
742 ISC_LINK_INIT(&dnskey.common, link);
744 dnskey.flags = (uint16_t)rdata1;
745 dnskey.protocol = (uint8_t)rdata2
    [all...]
  /src/external/apache2/mDNSResponder/dist/mDNSCore/
DNSCommon.c 285 case kDNSType_DNSKEY: return("DNSKEY");
649 // See <https://datatracker.ietf.org/doc/html/rfc4034#section-2.2> for DNSKEY RR Presentation Format.
652 dnssec_obj_rr_dnskey_t dnskey = mDNSNULL; local
655 dnskey = dnssec_obj_rr_dnskey_create(rr->name->c, rr->rrclass, rr->rdata->u.data, rr->rdlength, false, &err);
660 dnskey_rdata_description = dnssec_obj_rr_copy_rdata_rfc_description(dnskey, &err);
668 MDNS_DISPOSE_DNSSEC_OBJ(dnskey);
  /src/external/bsd/unbound/dist/services/
authzone.c 7820 /** ZONEMD, dnssec verify the rrset with the dnskey */
7823 struct ub_packed_rrset_key* dnskey, struct auth_data* node,
7835 "DNSKEY chain of trust, but no validator module");
7852 "zonemd: verify %s RRset with DNSKEY", typestr);
7854 sec = dnskeyset_verify_rrset(env, ve, &pk, dnskey, sigalg, why_bogus, NULL,
7897 struct ub_packed_rrset_key* dnskey, struct auth_data* apex,
7910 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex,
7953 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, match,
7974 struct ub_packed_rrset_key* dnskey, struct auth_data* apex,
7988 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, soa
8293 struct ub_packed_rrset_key* dnskey = NULL, *ds = NULL; local
8500 struct ub_packed_rrset_key* dnskey = NULL; local
    [all...]

Completed in 78 milliseconds

1 2