/netbsd-src/external/bsd/unbound/dist/validator/ |
H A D | val_utils.c | 425 struct ub_packed_rrset_key* dnskey_rrset, in verify_dnskeys_with_ds_rr() argument 431 num = rrset_get_count(dnskey_rrset); in verify_dnskeys_with_ds_rr() 435 != dnskey_get_algo(dnskey_rrset, i) in verify_dnskeys_with_ds_rr() 436 || dnskey_calc_keytag(dnskey_rrset, i) in verify_dnskeys_with_ds_rr() 447 if(!ds_digest_match_dnskey(env, dnskey_rrset, i, ds_rrset, in verify_dnskeys_with_ds_rr() 459 if(!dnskey_size_is_supported(dnskey_rrset, i)) { in verify_dnskeys_with_ds_rr() 468 sec = dnskey_verify_rrset(env, ve, dnskey_rrset, dnskey_rrset, in verify_dnskeys_with_ds_rr() 508 struct ub_packed_rrset_key* dnskey_rrset, in val_verify_DNSKEY_with_DS() argument 519 if(dnskey_rrset->rk.dname_len != ds_rrset->rk.dname_len || in val_verify_DNSKEY_with_DS() 520 query_dname_compare(dnskey_rrset->rk.dname, ds_rrset->rk.dname) in val_verify_DNSKEY_with_DS() [all …]
|
H A D | autotrust.c | 398 autr_rrset_delete(tp->dnskey_rrset); in autr_point_delete() 782 autr_rrset_delete(tp->dnskey_rrset); in autr_assemble() 786 tp->dnskey_rrset = ubdnskey; in autr_assemble() 1265 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, in verify_dnskey() 1305 struct ub_packed_rrset_key* dnskey_rrset, size_t i, in rr_is_selfsigned_revoked() argument 1314 sec = dnskey_verify_rrset(env, ve, dnskey_rrset, dnskey_rrset, i, in rr_is_selfsigned_revoked() 1530 struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, in check_contains_revoked() argument 1534 dnskey_rrset->entry.data; in check_contains_revoked() 1536 log_assert(ntohs(dnskey_rrset->rk.type) == LDNS_RR_TYPE_DNSKEY); in check_contains_revoked() 1539 if(!rr_is_dnskey_sep(ntohs(dnskey_rrset->rk.type), in check_contains_revoked() [all …]
|
H A D | val_sigcrypt.h | 155 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 164 uint16_t dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, 181 int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, 190 int dnskey_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset, 199 int dnskeyset_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset);
|
H A D | val_utils.h | 154 struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, 177 struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, 209 struct ub_packed_rrset_key* dnskey_rrset, 239 struct ub_packed_rrset_key* dnskey_rrset,
|
H A D | val_sigcrypt.c | 294 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, in ds_create_dnskey_digest() argument 301 rrset_get_rdata(dnskey_rrset, dnskey_idx, &dnskey_rdata, &dnskey_len); in ds_create_dnskey_digest() 307 sldns_buffer_write(b, dnskey_rrset->rk.dname, in ds_create_dnskey_digest() 308 dnskey_rrset->rk.dname_len); in ds_create_dnskey_digest() 319 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, in ds_digest_match_dnskey() argument 350 if(!ds_create_dnskey_digest(env, dnskey_rrset, dnskey_idx, ds_rrset, in ds_digest_match_dnskey() 377 dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx) in dnskey_calc_keytag() argument 381 rrset_get_rdata(dnskey_rrset, dnskey_idx, &data, &len); in dnskey_calc_keytag() 386 int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, in dnskey_algo_is_supported() argument 389 return dnskey_algo_id_is_supported(dnskey_get_algo(dnskey_rrset, in dnskey_algo_is_supported() [all …]
|
H A D | val_anchor.c | 134 assembled_rrset_delete(ta->dnskey_rrset); in anchors_delfunc() 939 ta->dnskey_rrset = assemble_it(ta, ta->numDNSKEY, in anchors_assemble() 941 if(!ta->dnskey_rrset) in anchors_assemble() 974 if(!dnskey_algo_is_supported(ta->dnskey_rrset, i) || in anchors_dnskey_unsupported() 975 !dnskey_size_is_supported(ta->dnskey_rrset, i)) in anchors_dnskey_unsupported() 1273 if(ta->numDNSKEY != 0 && ta->dnskey_rrset) { in anchor_list_keytags() 1275 ta->dnskey_rrset->entry.data; in anchor_list_keytags() 1278 list[ret++] = dnskey_calc_keytag(ta->dnskey_rrset, i); in anchor_list_keytags()
|
H A D | autotrust.h | 198 struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset,
|
H A D | val_anchor.h | 118 struct ub_packed_rrset_key* dnskey_rrset; member
|
H A D | validator.c | 2677 primeResponseToKE(struct ub_packed_rrset_key* dnskey_rrset, in primeResponseToKE() argument 2687 if(!dnskey_rrset) { in primeResponseToKE() 2711 dnskey_rrset, ta->ds_rrset, ta->dnskey_rrset, downprot, in primeResponseToKE() 3209 struct ub_packed_rrset_key* dnskey_rrset = NULL; in process_prime_response() local 3224 dnskey_rrset = reply_find_rrset_section_an(msg->rep, in process_prime_response() 3230 if(!autr_process_prime(qstate->env, ve, ta, dnskey_rrset, in process_prime_response() 3238 vq->key_entry = primeResponseToKE(dnskey_rrset, ta, qstate, id); in process_prime_response()
|
/netbsd-src/external/bsd/unbound/dist/services/ |
H A D | authzone.c | 8110 struct auth_rrset* dnskey_rrset; in zonemd_get_dnskey_from_anchor() local 8120 dnskey_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_DNSKEY); in zonemd_get_dnskey_from_anchor() 8121 if(!dnskey_rrset || dnskey_rrset->data->count==0) { in zonemd_get_dnskey_from_anchor() 8135 keystorage->entry.data = dnskey_rrset->data; in zonemd_get_dnskey_from_anchor() 8143 anchor->dnskey_rrset, NULL, why_bogus, NULL, NULL); in zonemd_get_dnskey_from_anchor() 8169 struct auth_rrset* dnskey_rrset; in auth_zone_verify_zonemd_key_with_ds() local 8180 dnskey_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_DNSKEY); in auth_zone_verify_zonemd_key_with_ds() 8181 if(!dnskey_rrset || dnskey_rrset->data->count==0) { in auth_zone_verify_zonemd_key_with_ds() 8195 keystorage->entry.data = dnskey_rrset->data; in auth_zone_verify_zonemd_key_with_ds()
|