| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| cdnskey_60.c | 87 dns_rdata_cdnskey_t *dnskey = target; local 89 REQUIRE(dnskey != NULL); 93 DNS_RDATACOMMON_INIT(dnskey, rdata->type, rdata->rdclass); 100 dns_rdata_cdnskey_t *dnskey = (dns_rdata_cdnskey_t *)source; local 102 REQUIRE(dnskey != NULL); 103 REQUIRE(dnskey->common.rdtype == dns_rdatatype_cdnskey);
|
| dnskey_48.c | 88 dns_rdata_dnskey_t *dnskey = target; local 90 REQUIRE(dnskey != NULL); 94 DNS_RDATACOMMON_INIT(dnskey, rdata->type, rdata->rdclass); 101 dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *)source; local 103 REQUIRE(dnskey != NULL); 104 REQUIRE(dnskey->common.rdtype == dns_rdatatype_dnskey);
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| cdnskey_60.c | 87 dns_rdata_cdnskey_t *dnskey = target; local 89 REQUIRE(dnskey != NULL); 93 dnskey->common.rdclass = rdata->rdclass; 94 dnskey->common.rdtype = rdata->type; 95 ISC_LINK_INIT(&dnskey->common, link); 102 dns_rdata_cdnskey_t *dnskey = (dns_rdata_cdnskey_t *)source; local 104 REQUIRE(dnskey != NULL); 105 REQUIRE(dnskey->common.rdtype == dns_rdatatype_cdnskey);
|
| dnskey_48.c | 88 dns_rdata_dnskey_t *dnskey = target; local 90 REQUIRE(dnskey != NULL); 94 dnskey->common.rdclass = rdata->rdclass; 95 dnskey->common.rdtype = rdata->type; 96 ISC_LINK_INIT(&dnskey->common, link); 103 dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *)source; local 105 REQUIRE(dnskey != NULL); 106 REQUIRE(dnskey->common.rdtype == dns_rdatatype_dnskey);
|
| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/ |
| dns_obj_rr_dnskey.c | 34 // MARK: - DNS DNSKEY Resource Record Kind Definition 38 uint16_t key_tag; // The key tag of the DNSKEY record that can be used to match RRSIG/DS records. 45 DNS_OBJECT_SUBKIND_DEFINE_ABSTRUCT(rr, dnskey, 57 // MARK: - DNS DNSKEY Resource Record Public Methods 64 dns_obj_rr_dnskey_t dnskey = NULL; local 79 dnskey = obj; 80 dns_obj_retain(dnskey); 88 return dnskey; 230 // MARK: - DNSKEY Public Functions 299 // MARK: - DNS DNSKEY Resource Record Private Method [all...] |
| /src/external/bsd/unbound/dist/testcode/ |
| unitverify.c | 112 /** extract DNSKEY rrset from answer and convert it */ 117 struct ub_packed_rrset_key* dnskey = NULL; local 125 dnskey = rep->rrsets[i]; 130 unit_assert(dnskey); 134 return dnskey; 163 /** setup sig alg list from dnskey */ 165 setup_sigalg(struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 170 for(i=0; i<rrset_get_count(dnskey); i++) { 171 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i); 183 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, 259 struct ub_packed_rrset_key* ds, *dnskey; local 304 struct ub_packed_rrset_key* dnskey; local [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-dsfromkey.c | 133 fatal("no DNSKEY RR for %s in %s", setname, filename); 255 dns_rdata_dnskey_t dnskey; local 263 result = dns_rdata_tostruct(rdata, &dnskey, NULL); 265 fatal("can't convert DNSKEY"); 268 if ((dnskey.flags & DNS_KEYFLAG_REVOKE) != 0) { 272 if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0 && !showall) { 533 fatal("could not load DNSKEY set: %s\n",
|
| dnssec-settime.c | 92 fprintf(stderr, " -k state date/[+-]offset: set the DNSKEY state\n"); 213 dst_key_state_t dnskey = DST_KEY_STATE_NA; local 296 (void)isoptarg("dnskey", argv, usage); 377 dnskey = strtokeystate(isc_commandline_argument); 415 (void)isoptarg("dnskey", argv, usage); 866 if (dnskey == DST_KEY_STATE_NA) { 870 dst_key_setstate(key, DST_KEY_DNSKEY, dnskey);
|
| dnssec-cds.c | 84 static int nkey; /* number of child zone DNSKEY records */ 91 * The child DNSKEY RRset is scanned to find out which keys are 96 * the child DNSKEY, CDNSKEY, and CDS RRsets. In this program, only keys 471 * Find out if any (C)DS record matches a particular (C)DNSKEY. 524 ki->rdata.type == dns_rdatatype_cdnskey ? "CDNSKEY" : "DNSKEY", 531 * Find which (C)DNSKEY records match a (C)DS RRset. 549 dns_rdata_dnskey_t dnskey; local 559 result = dns_rdata_tostruct(keyrdata, &dnskey, NULL); 560 check_result(result, "dns_rdata_tostruct(DNSKEY)"); 561 ki->algo = dnskey.algorithm [all...] |
| dnssec-signzone.c | 306 fatal("dnskey '%s' failed to sign data: %s", keystr, 464 fatal("failure looking for '%s DNSKEY' in database: %s", namestr, 574 "private dnskey not found\n", 578 vbprintf(2, "\trrsig by %s %s - dnskey not found\n", 611 vbprintf(2, "\trrsig by %s dropped - dnskey removed\n", 678 "resigning with dnskey"); 738 "signing with dnskey"); 799 "signing with dnskey"); 1066 /* No DS records found; try again, looking for DNSKEY records */ 1086 vbprintf(2, "found DNSKEY records\n") 2936 dns_rdata_dnskey_t dnskey; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| nsec.c | 253 dns_rdata_dnskey_t dnskey; local 281 result = dns_rdata_tostruct(&rdata, &dnskey, NULL); 284 if (dnskey.algorithm == DST_ALG_RSAMD5 || 285 dnskey.algorithm == DST_ALG_DSA || 286 dnskey.algorithm == DST_ALG_RSASHA1)
|
| dnssec.c | 407 * NS, SOA and DNSKEY records are signed by their owner. 1151 * algorithm, we strive to publish its signatures and DNSKEY records 1297 * Get a list of KEY or DNSKEY keys from the key repository. If rrtypekey 1424 * Mark all keys which signed the DNSKEY/SOA RRsets as "active", 1506 * Add the contents of a DNSKEY rdataset 'keyset' to 'keylist'. 1516 dst_key_t *dnskey = NULL, *pubkey = NULL, *privkey = NULL; local 1539 CHECK(dns_dnssec_keyfromrdata(origin, &rdata, mctx, &dnskey)); 1540 dst_key_setttl(dnskey, keys.ttl); 1542 if (!is_zone_key(dnskey)) { 1547 if (!dns_name_equal(origin, dst_key_name(dnskey))) { 1748 dns_rdata_t dnskey = DNS_RDATA_INIT; local 1782 dns_rdata_t dnskey = DNS_RDATA_INIT; local [all...] |
| zoneverify.c | 1388 zoneverify_log_error(vctx, "DNSKEY is not signed " 1438 * verified zone based on the signatures made using 'dnskey' (prepared from 1440 * if 'dnskey' correctly signs the DNSKEY RRset at zone apex and either 1441 * 'vctx->secroots' is NULL or 'dnskey' is present in 'vctx->secroots'. 1444 * 'dnskey' is a KSK and false otherwise. 1447 check_dnskey_sigs(vctx_t *vctx, const dns_rdata_dnskey_t *dnskey, 1461 * First, does this key sign the DNSKEY rrset? 1470 if (active_keys[dnskey->algorithm] != DNS_KEYALG_MAX) { 1471 active_keys[dnskey->algorithm]++ 1578 dns_rdata_dnskey_t dnskey; local [all...] |
| /src/external/mpl/bind/dist/tests/dns/ |
| keytable_test.c | 140 dns_rdata_dnskey_t dnskey; local 143 * Populate DNSKEY rdata structure. 145 create_keystruct(flags, proto, alg, keystr, &dnskey); 151 result = dns_rdata_fromstruct(&rdata, dnskey.common.rdclass, 152 dnskey.common.rdtype, &dnskey, 163 dns_rdata_freestruct(&dnskey); 414 dns_rdata_dnskey_t dnskey; local 424 create_keystruct(257, 3, 5, keystr1, &dnskey); 425 assert_int_equal(dns_keytable_deletekey(keytable, keyname, &dnskey), [all...] |
| skr_test.c | 230 /* Create the DNSKEY signature. */ 350 int dnskey = 0; local 360 switch (dnskey) { 381 dnskey++;
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| nsec.c | 256 dns_rdata_dnskey_t dnskey; local 284 result = dns_rdata_tostruct(&rdata, &dnskey, NULL); 287 if (dnskey.algorithm == DST_ALG_RSAMD5 || 288 dnskey.algorithm == DST_ALG_RSASHA1)
|
| dnssec.c | 1359 * algorithm, we strive to publish its signatures and DNSKEY records 1599 * Mark all keys which signed the DNSKEY/SOA RRsets as "active", 1650 * Add the contents of a DNSKEY rdataset 'keyset' to 'keylist'. 1660 dst_key_t *dnskey = NULL, *pubkey = NULL, *privkey = NULL; local 1683 RETERR(dns_dnssec_keyfromrdata(origin, &rdata, mctx, &dnskey)); 1684 dst_key_setttl(dnskey, keys.ttl); 1686 if (!is_zone_key(dnskey) || 1687 (dst_key_flags(dnskey) & DNS_KEYTYPE_NOAUTH) != 0) 1693 if (!dns_name_equal(origin, dst_key_name(dnskey))) { 1698 RETERR(addkey(keylist, &dnskey, savekeys, mctx)) 1899 dns_rdata_t dnskey = DNS_RDATA_INIT; local 1932 dns_rdata_t dnskey = DNS_RDATA_INIT; local [all...] |
| zoneverify.c | 1387 zoneverify_log_error(vctx, "DNSKEY is not signed " 1437 * verified zone based on the signatures made using 'dnskey' (prepared from 1439 * if 'dnskey' correctly signs the DNSKEY RRset at zone apex and either 1440 * 'vctx->secroots' is NULL or 'dnskey' is present in 'vctx->secroots'. 1443 * 'dnskey' is a KSK and false otherwise. 1446 check_dnskey_sigs(vctx_t *vctx, const dns_rdata_dnskey_t *dnskey, 1460 * First, does this key sign the DNSKEY rrset? 1469 if (active_keys[dnskey->algorithm] != DNS_KEYALG_MAX) { 1470 active_keys[dnskey->algorithm]++ 1577 dns_rdata_dnskey_t dnskey; local [all...] |
| /src/external/bsd/unbound/dist/validator/ |
| val_utils.c | 471 /* temporary dnskey rrset-key */ 472 struct ub_packed_rrset_key dnskey; local 475 dnskey.rk.type = htons(kd->rrset_type); 476 dnskey.rk.rrset_class = htons(kkey->key_class); 477 dnskey.rk.flags = 0; 478 dnskey.rk.dname = kkey->name; 479 dnskey.rk.dname_len = kkey->namelen; 480 dnskey.entry.key = &dnskey; 481 dnskey.entry.data = kd->rrset_data [all...] |
| validator.c | 613 * The trust anchor can be DNSKEY or DS and does not have to be signed. 662 * trusted DNSKEY rrset that signs this response must already have been 1348 * trusted DNSKEY rrset that signs this response must already have been 1385 * trusted DNSKEY rrset that signs this response must already have been 1890 /* is a DNSKEY so lookup a bit higher since we want to 1984 * to query and either issues a DS or a DNSKEY query. It will check to see 2006 * It could be an isnull key, which signals the DNSKEY failed 2013 verbose(VERB_ALGO, "error generating DNSKEY request"); 2076 * for the next DNSKEY. */ 2086 verbose(VERB_ALGO, "error generating DNSKEY request") 3251 struct ub_packed_rrset_key* dnskey = NULL; local [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/isctest/ |
| kasp.py | 62 config["dnskey-ttl"] 69 ttl1 = config["dnskey-ttl"] + config["publish-safety"] 75 # dnskey-ttl, and no publish-safety (because we are looking at 446 def dnskey(self) -> dns.rrset.RRset: member in class:Key 458 dnskey_rr.rdtype == dns.rdatatype.DNSKEY 459 ), f"DNSKEY not found in {self.keyfile}" 463 dnskey = self.dnskey 465 ds = dns.dnssec.make_ds(dnskey.name, dnskey[0], dsdigest [all...] |
| /src/external/bsd/unbound/dist/smallapp/ |
| unbound-anchor.c | 50 * * mostly: use RFC5011 tracking, quick . DNSKEY UDP query. 54 * * DNSKEY probe must be NOERROR, saves a lot of https traffic. 68 * have only probed the . DNSKEY, not done expensive https transfers on the 78 * the file contains a list of normal DNSKEY/DS records, and uses that to 2148 if(verb) printf("resolve DNSKEY: %s\n", ub_strerror(r)); 2263 struct ub_result* dnskey; local 2268 dnskey = prime_root_key(ctx); 2270 return dnskey; 2281 struct ub_result* dnskey; local 2291 * and probe . DNSKEY */ [all...] |
| /src/external/mpl/bind/dist/bin/delv/ |
| delv.c | 640 dns_rdata_dnskey_t dnskey; local 685 /* if DNSKEY, flags; if DS, key tag */ 688 /* if DNSKEY, protocol; if DS, algorithm */ 691 /* if DNSKEY, algorithm; if DS, digest type */ 738 dnskey.common.rdclass = dns_rdataclass_in; 739 dnskey.common.rdtype = dns_rdatatype_dnskey; 740 dnskey.mctx = NULL; 742 ISC_LINK_INIT(&dnskey.common, link); 744 dnskey.flags = (uint16_t)rdata1; 745 dnskey.protocol = (uint8_t)rdata2 [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSCore/ |
| DNSCommon.c | 285 case kDNSType_DNSKEY: return("DNSKEY"); 649 // See <https://datatracker.ietf.org/doc/html/rfc4034#section-2.2> for DNSKEY RR Presentation Format. 652 dnssec_obj_rr_dnskey_t dnskey = mDNSNULL; local 655 dnskey = dnssec_obj_rr_dnskey_create(rr->name->c, rr->rrclass, rr->rdata->u.data, rr->rdlength, false, &err); 660 dnskey_rdata_description = dnssec_obj_rr_copy_rdata_rfc_description(dnskey, &err); 668 MDNS_DISPOSE_DNSSEC_OBJ(dnskey);
|
| /src/external/bsd/unbound/dist/services/ |
| authzone.c | 7820 /** ZONEMD, dnssec verify the rrset with the dnskey */ 7823 struct ub_packed_rrset_key* dnskey, struct auth_data* node, 7835 "DNSKEY chain of trust, but no validator module"); 7852 "zonemd: verify %s RRset with DNSKEY", typestr); 7854 sec = dnskeyset_verify_rrset(env, ve, &pk, dnskey, sigalg, why_bogus, NULL, 7897 struct ub_packed_rrset_key* dnskey, struct auth_data* apex, 7910 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, 7953 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, match, 7974 struct ub_packed_rrset_key* dnskey, struct auth_data* apex, 7988 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, soa 8293 struct ub_packed_rrset_key* dnskey = NULL, *ds = NULL; local 8500 struct ub_packed_rrset_key* dnskey = NULL; local [all...] |