Lines Matching defs:dnskey
192 /** get public key rdata field from a dnskey RR and do some checks */
437 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
441 size_t num = rrset_get_count(dnskey);
444 algo = (uint8_t)dnskey_get_algo(dnskey, i);
535 * verify rrset, with dnskey rrset, for a specific rrsig in rrset
540 * @param dnskey: DNSKEY rrset, keyset to try.
557 struct ub_packed_rrset_key* dnskey, size_t sig_idx,
567 size_t i, num = rrset_get_count(dnskey);
581 if(algo != dnskey_get_algo(dnskey, i) ||
582 tag != dnskey_calc_keytag(dnskey, i))
589 env->scratch_buffer, ve, now, rrset, dnskey, i,
624 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
659 dnskey, i, &sortree, reason, reason_bogus,
707 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
715 uint16_t tag = dnskey_calc_keytag(dnskey, dnskey_idx);
716 int algo = dnskey_get_algo(dnskey, dnskey_idx);
736 dnskey, dnskey_idx, i, &sortree, &buf_canon, reason,
1538 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
1565 if(!(dnskey_get_flags(dnskey, dnskey_idx) & DNSKEY_BIT_ZSK)) {
1566 verbose(VERB_QUERY, "verify: dnskey without ZSK flag");
1567 *reason = "dnskey without ZSK flag";
1573 if(dnskey_get_protocol(dnskey, dnskey_idx) != LDNS_DNSSEC_KEYPROTO) {
1575 verbose(VERB_QUERY, "verify: dnskey has wrong key protocol");
1576 *reason = "dnskey has wrong protocolnumber";
1610 if(query_dname_compare(signer, dnskey->rk.dname) != 0) {
1615 dnskey->rk.dname, 0, 0);
1632 if((int)sig[2+2] != dnskey_get_algo(dnskey, dnskey_idx)) {
1639 ktag = htons(dnskey_calc_keytag(dnskey, dnskey_idx));
1670 /* check that dnskey is available */
1671 dnskey_get_pubkey(dnskey, dnskey_idx, &key, &keylen);