• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-12-stable/contrib/unbound/validator/

Lines Matching refs:rrset

49 #include "services/cache/rrset.h"
160 val_find_rrset_signer(struct ub_packed_rrset_key* rrset, uint8_t** sname,
164 rrset->entry.data;
178 * @param rrset: which rrsigs to look through.
186 val_find_best_signer(struct ub_packed_rrset_key* rrset,
191 rrset->entry.data;
224 /* check for the answer rrset */
236 /* check for the first signed cname/dname rrset */
276 /* check for one of the answer rrset that has signatures,
315 /** return number of rrs in an rrset */
317 rrset_get_count(struct ub_packed_rrset_key* rrset)
320 rrset->entry.data;
325 /** return TTL of rrset */
327 rrset_get_ttl(struct ub_packed_rrset_key* rrset)
330 rrset->entry.data;
337 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys,
342 struct packed_rrset_data* d = (struct packed_rrset_data*)rrset->
346 log_nametypeclass(VERB_ALGO, "verify rrset cached",
347 rrset->rk.dname, ntohs(rrset->rk.type),
348 ntohs(rrset->rk.rrset_class));
352 rrset_check_sec_status(env->rrset_cache, rrset, *env->now);
354 log_nametypeclass(VERB_ALGO, "verify rrset from cache",
355 rrset->rk.dname, ntohs(rrset->rk.type),
356 ntohs(rrset->rk.rrset_class));
359 log_nametypeclass(VERB_ALGO, "verify rrset", rrset->rk.dname,
360 ntohs(rrset->rk.type), ntohs(rrset->rk.rrset_class));
361 sec = dnskeyset_verify_rrset(env, ve, rrset, keys, sigalg, reason,
366 /* update rrset security status
375 /* update ttl for rrset to fixed value. */
386 rrset_update_sec_status(env->rrset_cache, rrset, *env->now);
394 struct ub_packed_rrset_key* rrset, struct key_entry_key* kkey,
397 /* temporary dnskey rrset-key */
408 sec = val_verify_rrset(env, ve, rrset, &dnskey, kd->algo, reason,
488 /* as long as this is false, we can consider this DS rrset to be
489 * equivalent to no DS rrset. */
770 val_rrset_wildcard(struct ub_packed_rrset_key* rrset, uint8_t** wc,
773 struct packed_rrset_data* d = (struct packed_rrset_data*)rrset->
791 * labels, then this rrset was synthesized from a wildcard.
793 wn = rrset->rk.dname;
794 wl = rrset->rk.dname_len;
831 /** see if rrset has signer name as one of the rrsig signers */
833 rrset_has_signer(struct ub_packed_rrset_key* rrset, uint8_t* name, size_t len)
835 struct packed_rrset_data* d = (struct packed_rrset_data*)rrset->
937 * However, this rrset is not signed or signed
939 * verify this rrset with the keysets of import.
940 * But this rrset did not verify.
955 /* remove this unneeded authority rrset */
966 "non secure rrset",
988 /* remove this unneeded additional rrset */
1140 struct ub_packed_rrset_key *rrset = rrset_cache_lookup(
1143 if(rrset) {
1144 /* DS rrset exists. Return it to the validator immediately*/
1146 rrset, region, *env->now);
1147 lock_rw_unlock(&rrset->entry.lock);
1158 /* lookup in rrset and negative cache for NSEC/NSEC3 */