| /openbsd-src/usr.sbin/unbound/validator/ |
| H A D | val_utils.c | 491 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, char** reason, in verify_dnskeys_with_ds_rr() 501 if(ds_get_key_algo(ds_rrset, ds_idx) in verify_dnskeys_with_ds_rr() 504 != ds_get_keytag(ds_rrset, ds_idx)) { in verify_dnskeys_with_ds_rr() 509 ds_get_key_algo(ds_rrset, ds_idx), in verify_dnskeys_with_ds_rr() 510 ds_get_keytag(ds_rrset, ds_idx)); in verify_dnskeys_with_ds_rr() 514 if(!ds_digest_match_dnskey(env, dnskey_rrset, i, ds_rrset, in verify_dnskeys_with_ds_rr() 547 algo_needs_reason(ds_get_key_algo(ds_rrset, ds_idx), 558 int val_favorite_ds_algo(struct ub_packed_rrset_key* ds_rrset) in val_verify_DNSKEY_with_DS() 560 size_t i, num = rrset_get_count(ds_rrset); in val_verify_DNSKEY_with_DS() 564 if(!ds_digest_algo_is_supported(ds_rrset, in val_verify_DNSKEY_with_DS() 464 verify_dnskeys_with_ds_rr(struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,struct ub_packed_rrset_key * ds_rrset,size_t ds_idx,char ** reason,sldns_ede_code * reason_bogus,struct module_qstate * qstate,int * nonechecked) verify_dnskeys_with_ds_rr() argument 531 val_favorite_ds_algo(struct ub_packed_rrset_key * ds_rrset) val_favorite_ds_algo() argument 551 val_verify_DNSKEY_with_DS(struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,struct ub_packed_rrset_key * ds_rrset,uint8_t * sigalg,char ** reason,sldns_ede_code * reason_bogus,struct module_qstate * qstate) val_verify_DNSKEY_with_DS() argument 651 val_verify_new_DNSKEYs(struct regional * region,struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,struct ub_packed_rrset_key * ds_rrset,int downprot,char ** reason,sldns_ede_code * reason_bogus,struct module_qstate * qstate) val_verify_new_DNSKEYs() argument 849 val_dsset_isusable(struct ub_packed_rrset_key * ds_rrset) val_dsset_isusable() argument [all...] |
| H A D | val_sigcrypt.h | 152 * @param ds_rrset: DS rrset 158 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx); 171 * @param ds_rrset: DS rrset 175 uint16_t ds_get_keytag(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx); 205 * @param ds_rrset: DS rrset 209 int ds_digest_algo_is_supported(struct ub_packed_rrset_key* ds_rrset, 214 * @param ds_rrset: DS rrset. 218 int ds_get_digest_algo(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx); 222 * @param ds_rrset: DS rrset 226 int ds_key_algo_is_supported(struct ub_packed_rrset_key* ds_rrset, [all...] |
| H A D | val_utils.h | 144 * @param ds_rrset: DS rrset to verify with. 159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 199 * @param ds_rrset: DS rrset to verify with. 220 struct ub_packed_rrset_key* ds_rrset, int downprot, char** reason, 263 * @param ds_rrset: the newly received DS rrset. 266 int val_dsset_isusable(struct ub_packed_rrset_key* ds_rrset); 405 * @param ds_rrset: the DSes in this rrset are inspected and best algo chosen. 408 int val_favorite_ds_algo(struct ub_packed_rrset_key* ds_rrset);
|
| H A D | val_sigcrypt.c | 232 ds_get_keytag(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) in ds_get_keytag() argument 237 rrset_get_rdata(ds_rrset, ds_idx, &rdata, &len); in ds_get_keytag() 287 * @param ds_rrset: DS rrset 295 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, in ds_create_dnskey_digest() argument 313 return secalgo_ds_digest(ds_get_digest_algo(ds_rrset, ds_idx), in ds_create_dnskey_digest() 320 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) in ds_digest_match_dnskey() argument 325 size_t digestlen = ds_digest_size_algo(ds_rrset, ds_idx); in ds_digest_match_dnskey() 333 if(fake_sha1 && ds_get_digest_algo(ds_rrset, ds_idx)==LDNS_SHA1) in ds_digest_match_dnskey() 338 ds_get_sigdata(ds_rrset, ds_idx, &ds, &dslen); in ds_digest_match_dnskey() 350 if(!ds_create_dnskey_digest(env, dnskey_rrset, dnskey_idx, ds_rrset, in ds_digest_match_dnskey() 363 ds_digest_algo_is_supported(struct ub_packed_rrset_key * ds_rrset,size_t ds_idx) ds_digest_algo_is_supported() argument 370 ds_key_algo_is_supported(struct ub_packed_rrset_key * ds_rrset,size_t ds_idx) ds_key_algo_is_supported() argument [all...] |
| H A D | autotrust.c | 401 autr_rrset_delete(tp->ds_rrset); in autr_point_delete() 785 autr_rrset_delete(tp->ds_rrset); in autr_assemble() 789 tp->ds_rrset = ubds; in autr_assemble() 1270 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, in verify_dnskey() 1583 struct ub_packed_rrset_key* ds_rrset) in key_matches_a_ds() 1586 ds_rrset->entry.data; in key_matches_a_ds() 1588 int d = val_favorite_ds_algo(ds_rrset); in key_matches_a_ds() 1591 if(!ds_digest_algo_is_supported(ds_rrset, ds_idx) || in key_matches_a_ds() 1592 !ds_key_algo_is_supported(ds_rrset, ds_idx) || in key_matches_a_ds() 1594 ds_get_digest_algo(ds_rrset, ds_id in key_matches_a_ds() 1582 key_matches_a_ds(struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,size_t key_idx,struct ub_packed_rrset_key * ds_rrset) key_matches_a_ds() argument [all...] |
| H A D | val_anchor.c | 133 assembled_rrset_delete(ta->ds_rrset); in anchors_delfunc() 934 ta->ds_rrset = assemble_it(ta, ta->numDS, LDNS_RR_TYPE_DS); in anchors_assemble() 935 if(!ta->ds_rrset) in anchors_assemble() 957 if(!ds_digest_algo_is_supported(ta->ds_rrset, i) || in anchors_ds_unsupported() 958 !ds_key_algo_is_supported(ta->ds_rrset, i)) in anchors_ds_unsupported() 1265 if(ta->numDS != 0 && ta->ds_rrset) { in anchor_list_keytags() 1267 ta->ds_rrset->entry.data; in anchor_list_keytags() 1270 list[ret++] = ds_get_keytag(ta->ds_rrset, i); in anchor_list_keytags()
|
| H A D | validator.c | 1812 vq->ds_rrset = 0; in processInit() 1972 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname, in processFindKey() 1973 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY, in processFindKey() 2039 if(vq->ds_rrset) in processFindKey() 2040 log_nametypeclass(VERB_ALGO, "DS RRset", vq->ds_rrset->rk.dname, LDNS_RR_TYPE_DS, LDNS_RR_CLASS_IN); in processFindKey() 2043 if(vq->ds_rrset && query_dname_compare(vq->ds_rrset->rk.dname, in processFindKey() 2045 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname, in processFindKey() 2046 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY, in processFindKey() 2054 if(!vq->ds_rrset || query_dname_compar in processFindKey() [all...] |
| H A D | validator.h | 200 struct ub_packed_rrset_key* ds_rrset; member
|
| H A D | val_anchor.h | 116 struct ub_packed_rrset_key* ds_rrset; member
|
| /openbsd-src/sbin/unwind/libunbound/validator/ |
| H A D | val_utils.c | 491 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, char** reason, in verify_dnskeys_with_ds_rr() 501 if(ds_get_key_algo(ds_rrset, ds_idx) in verify_dnskeys_with_ds_rr() 504 != ds_get_keytag(ds_rrset, ds_idx)) { in verify_dnskeys_with_ds_rr() 509 ds_get_key_algo(ds_rrset, ds_idx), in verify_dnskeys_with_ds_rr() 510 ds_get_keytag(ds_rrset, ds_idx)); in verify_dnskeys_with_ds_rr() 514 if(!ds_digest_match_dnskey(env, dnskey_rrset, i, ds_rrset, in verify_dnskeys_with_ds_rr() 547 algo_needs_reason(ds_get_key_algo(ds_rrset, ds_idx), 558 int val_favorite_ds_algo(struct ub_packed_rrset_key* ds_rrset) in val_verify_DNSKEY_with_DS() 560 size_t i, num = rrset_get_count(ds_rrset); in val_verify_DNSKEY_with_DS() 564 if(!ds_digest_algo_is_supported(ds_rrset, in val_verify_DNSKEY_with_DS() 464 verify_dnskeys_with_ds_rr(struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,struct ub_packed_rrset_key * ds_rrset,size_t ds_idx,char ** reason,sldns_ede_code * reason_bogus,struct module_qstate * qstate,int * nonechecked) verify_dnskeys_with_ds_rr() argument 531 val_favorite_ds_algo(struct ub_packed_rrset_key * ds_rrset) val_favorite_ds_algo() argument 551 val_verify_DNSKEY_with_DS(struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,struct ub_packed_rrset_key * ds_rrset,uint8_t * sigalg,char ** reason,sldns_ede_code * reason_bogus,struct module_qstate * qstate) val_verify_DNSKEY_with_DS() argument 651 val_verify_new_DNSKEYs(struct regional * region,struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,struct ub_packed_rrset_key * ds_rrset,int downprot,char ** reason,sldns_ede_code * reason_bogus,struct module_qstate * qstate) val_verify_new_DNSKEYs() argument 849 val_dsset_isusable(struct ub_packed_rrset_key * ds_rrset) val_dsset_isusable() argument [all...] |
| H A D | val_sigcrypt.h | 152 * @param ds_rrset: DS rrset 158 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx); 171 * @param ds_rrset: DS rrset 175 uint16_t ds_get_keytag(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx); 205 * @param ds_rrset: DS rrset 209 int ds_digest_algo_is_supported(struct ub_packed_rrset_key* ds_rrset, 214 * @param ds_rrset: DS rrset. 218 int ds_get_digest_algo(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx); 222 * @param ds_rrset: DS rrset 226 int ds_key_algo_is_supported(struct ub_packed_rrset_key* ds_rrset, [all...] |
| H A D | val_utils.h | 144 * @param ds_rrset: DS rrset to verify with. 159 struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, 199 * @param ds_rrset: DS rrset to verify with. 220 struct ub_packed_rrset_key* ds_rrset, int downprot, char** reason, 263 * @param ds_rrset: the newly received DS rrset. 266 int val_dsset_isusable(struct ub_packed_rrset_key* ds_rrset); 405 * @param ds_rrset: the DSes in this rrset are inspected and best algo chosen. 408 int val_favorite_ds_algo(struct ub_packed_rrset_key* ds_rrset);
|
| H A D | val_sigcrypt.c | 232 ds_get_keytag(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) in ds_get_keytag() argument 237 rrset_get_rdata(ds_rrset, ds_idx, &rdata, &len); in ds_get_keytag() 287 * @param ds_rrset: DS rrset 295 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, in ds_create_dnskey_digest() argument 313 return secalgo_ds_digest(ds_get_digest_algo(ds_rrset, ds_idx), in ds_create_dnskey_digest() 320 struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) in ds_digest_match_dnskey() argument 325 size_t digestlen = ds_digest_size_algo(ds_rrset, ds_idx); in ds_digest_match_dnskey() 333 if(fake_sha1 && ds_get_digest_algo(ds_rrset, ds_idx)==LDNS_SHA1) in ds_digest_match_dnskey() 338 ds_get_sigdata(ds_rrset, ds_idx, &ds, &dslen); in ds_digest_match_dnskey() 350 if(!ds_create_dnskey_digest(env, dnskey_rrset, dnskey_idx, ds_rrset, in ds_digest_match_dnskey() 363 ds_digest_algo_is_supported(struct ub_packed_rrset_key * ds_rrset,size_t ds_idx) ds_digest_algo_is_supported() argument 370 ds_key_algo_is_supported(struct ub_packed_rrset_key * ds_rrset,size_t ds_idx) ds_key_algo_is_supported() argument [all...] |
| H A D | autotrust.c | 401 autr_rrset_delete(tp->ds_rrset); in autr_point_delete() 785 autr_rrset_delete(tp->ds_rrset); in autr_assemble() 789 tp->ds_rrset = ubds; in autr_assemble() 1274 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, in verify_dnskey() 1587 struct ub_packed_rrset_key* ds_rrset) in key_matches_a_ds() 1590 ds_rrset->entry.data; in key_matches_a_ds() 1592 int d = val_favorite_ds_algo(ds_rrset); in key_matches_a_ds() 1595 if(!ds_digest_algo_is_supported(ds_rrset, ds_idx) || in key_matches_a_ds() 1596 !ds_key_algo_is_supported(ds_rrset, ds_idx) || in key_matches_a_ds() 1598 ds_get_digest_algo(ds_rrset, ds_id in key_matches_a_ds() 1586 key_matches_a_ds(struct module_env * env,struct val_env * ve,struct ub_packed_rrset_key * dnskey_rrset,size_t key_idx,struct ub_packed_rrset_key * ds_rrset) key_matches_a_ds() argument [all...] |
| H A D | val_anchor.c | 133 assembled_rrset_delete(ta->ds_rrset); in anchors_delfunc() 934 ta->ds_rrset = assemble_it(ta, ta->numDS, LDNS_RR_TYPE_DS); in anchors_assemble() 935 if(!ta->ds_rrset) in anchors_assemble() 957 if(!ds_digest_algo_is_supported(ta->ds_rrset, i) || in anchors_ds_unsupported() 958 !ds_key_algo_is_supported(ta->ds_rrset, i)) in anchors_ds_unsupported() 1265 if(ta->numDS != 0 && ta->ds_rrset) { in anchor_list_keytags() 1267 ta->ds_rrset->entry.data; in anchor_list_keytags() 1270 list[ret++] = ds_get_keytag(ta->ds_rrset, i); in anchor_list_keytags()
|
| H A D | validator.c | 1812 vq->ds_rrset = 0; in processInit() 1972 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname, in processFindKey() 1973 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY, in processFindKey() 2039 if(vq->ds_rrset) in processFindKey() 2040 log_nametypeclass(VERB_ALGO, "DS RRset", vq->ds_rrset->rk.dname, LDNS_RR_TYPE_DS, LDNS_RR_CLASS_IN); in processFindKey() 2043 if(vq->ds_rrset && query_dname_compare(vq->ds_rrset->rk.dname, in processFindKey() 2045 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname, in processFindKey() 2046 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY, in processFindKey() 2054 if(!vq->ds_rrset || query_dname_compar in processFindKey() [all...] |
| H A D | validator.h | 200 struct ub_packed_rrset_key* ds_rrset; member
|
| H A D | val_anchor.h | 116 struct ub_packed_rrset_key* ds_rrset; member
|
| /openbsd-src/usr.sbin/unbound/services/ |
| H A D | authzone.c | 8160 sec = val_verify_DNSKEY_with_TA(env, ve, keystorage, anchor->ds_rrset, in zonemd_get_dnskey_from_anchor()
|
| /openbsd-src/sbin/unwind/libunbound/services/ |
| H A D | authzone.c | 8160 sec = val_verify_DNSKEY_with_TA(env, ve, keystorage, anchor->ds_rrset, in zonemd_get_dnskey_from_anchor()
|