Searched refs:dnskey (Results 1 - 6 of 6) sorted by relevance
/freebsd-10.1-release/contrib/unbound/validator/ |
H A D | val_sigcrypt.h | 76 * @param dnskey: algos from this struct set as necessary. DNSKEY set. 80 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 142 * Check if dnskey matches a DS digest 143 * Does not check dnskey-keyid footprint, just the digest. 156 * Get dnskey keytag, footprint value 232 * Verify rrset against dnskey rrset. 236 * @param dnskey: DNSKEY rrset, keyset to try. 246 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason); 249 * verify rrset against one specific dnskey (from rrset) 253 * @param dnskey [all...] |
H A D | val_sigcrypt.c | 187 /** get public key rdata field from a dnskey RR and do some checks */ 384 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) 388 size_t num = rrset_get_count(dnskey); 391 algo = (uint8_t)dnskey_get_algo(dnskey, i); 481 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, 509 dnskey, i, &sortree, reason); 549 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, 556 uint16_t tag = dnskey_calc_keytag(dnskey, dnskey_idx); 557 int algo = dnskey_get_algo(dnskey, dnskey_idx); 574 dnskey, dnskey_id 383 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument 480 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason) argument 548 dnskey_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, size_t dnskey_idx, char** reason) argument 585 dnskeyset_verify_rrset_sig(struct module_env* env, struct val_env* ve, time_t now, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, size_t sig_idx, struct rbtree_t** sortree, char** reason) argument 1303 dnskey_verify_rrset_sig(struct regional* region, sldns_buffer* buf, struct val_env* ve, time_t now, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, size_t dnskey_idx, size_t sig_idx, struct rbtree_t** sortree, int* buf_canon, char** reason) argument [all...] |
H A D | val_utils.c | 369 /* temporary dnskey rrset-key */ 370 struct ub_packed_rrset_key dnskey; local 373 dnskey.rk.type = htons(kd->rrset_type); 374 dnskey.rk.rrset_class = htons(kkey->key_class); 375 dnskey.rk.flags = 0; 376 dnskey.rk.dname = kkey->name; 377 dnskey.rk.dname_len = kkey->namelen; 378 dnskey.entry.key = &dnskey; 379 dnskey [all...] |
H A D | validator.c | 2076 /* create a nullentry for the key so the dnskey lookup 2653 struct ub_packed_rrset_key* dnskey = NULL; local 2658 dnskey = reply_find_answer_rrset(qinfo, msg->rep); 2660 if(dnskey == NULL) { 2675 log_err("alloc failure in missing dnskey response"); 2692 ve, dnskey, vq->ds_rrset, downprot, &reason);
|
/freebsd-10.1-release/contrib/unbound/smallapp/ |
H A D | unbound-anchor.c | 1900 struct ub_result* dnskey) 1940 ub_resolve_free(dnskey); 2186 struct ub_result* dnskey; local 2199 dnskey = prime_root_key(ctx); 2203 if(dnskey->secure && !force) { 2205 ub_resolve_free(dnskey); 2211 if((dnskey->rcode == 0 && 2215 debugconf, ip4only, ip6only, port, dnskey)) 2220 ub_resolve_free(dnskey); 1896 do_certupdate(const char* root_anchor_file, const char* root_cert_file, const char* urlname, const char* xmlname, const char* p7sname, const char* p7signer, const char* res_conf, const char* root_hints, const char* debugconf, int ip4only, int ip6only, int port, struct ub_result* dnskey) argument
|
/freebsd-10.1-release/contrib/ldns/ |
H A D | rr.c | 1643 /* convert dnskey to a ds with the given algorithm, 1647 ldns_rr *dnskey) 1653 if (!dnskey || !ds || 1655 ldns_rr_get_type(dnskey) != LDNS_RR_TYPE_DNSKEY) { 1664 ds_gen = ldns_key_rr2ds(dnskey, algo); 1646 ldns_rr_compare_ds_dnskey(ldns_rr *ds, ldns_rr *dnskey) argument
|
Completed in 187 milliseconds