Searched refs:dnskey (Results 1 - 6 of 6) sorted by relevance

/freebsd-10.1-release/contrib/unbound/validator/
H A Dval_sigcrypt.h76 * @param dnskey: algos from this struct set as necessary. DNSKEY set.
80 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
142 * Check if dnskey matches a DS digest
143 * Does not check dnskey-keyid footprint, just the digest.
156 * Get dnskey keytag, footprint value
232 * Verify rrset against dnskey rrset.
236 * @param dnskey: DNSKEY rrset, keyset to try.
246 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason);
249 * verify rrset against one specific dnskey (from rrset)
253 * @param dnskey
[all...]
H A Dval_sigcrypt.c187 /** get public key rdata field from a dnskey RR and do some checks */
384 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg)
388 size_t num = rrset_get_count(dnskey);
391 algo = (uint8_t)dnskey_get_algo(dnskey, i);
481 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
509 dnskey, i, &sortree, reason);
549 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
556 uint16_t tag = dnskey_calc_keytag(dnskey, dnskey_idx);
557 int algo = dnskey_get_algo(dnskey, dnskey_idx);
574 dnskey, dnskey_id
383 algo_needs_init_dnskey_add(struct algo_needs* n, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) argument
480 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason) argument
548 dnskey_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, size_t dnskey_idx, char** reason) argument
585 dnskeyset_verify_rrset_sig(struct module_env* env, struct val_env* ve, time_t now, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, size_t sig_idx, struct rbtree_t** sortree, char** reason) argument
1303 dnskey_verify_rrset_sig(struct regional* region, sldns_buffer* buf, struct val_env* ve, time_t now, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, size_t dnskey_idx, size_t sig_idx, struct rbtree_t** sortree, int* buf_canon, char** reason) argument
[all...]
H A Dval_utils.c369 /* temporary dnskey rrset-key */
370 struct ub_packed_rrset_key dnskey; local
373 dnskey.rk.type = htons(kd->rrset_type);
374 dnskey.rk.rrset_class = htons(kkey->key_class);
375 dnskey.rk.flags = 0;
376 dnskey.rk.dname = kkey->name;
377 dnskey.rk.dname_len = kkey->namelen;
378 dnskey.entry.key = &dnskey;
379 dnskey
[all...]
H A Dvalidator.c2076 /* create a nullentry for the key so the dnskey lookup
2653 struct ub_packed_rrset_key* dnskey = NULL; local
2658 dnskey = reply_find_answer_rrset(qinfo, msg->rep);
2660 if(dnskey == NULL) {
2675 log_err("alloc failure in missing dnskey response");
2692 ve, dnskey, vq->ds_rrset, downprot, &reason);
/freebsd-10.1-release/contrib/unbound/smallapp/
H A Dunbound-anchor.c1900 struct ub_result* dnskey)
1940 ub_resolve_free(dnskey);
2186 struct ub_result* dnskey; local
2199 dnskey = prime_root_key(ctx);
2203 if(dnskey->secure && !force) {
2205 ub_resolve_free(dnskey);
2211 if((dnskey->rcode == 0 &&
2215 debugconf, ip4only, ip6only, port, dnskey))
2220 ub_resolve_free(dnskey);
1896 do_certupdate(const char* root_anchor_file, const char* root_cert_file, const char* urlname, const char* xmlname, const char* p7sname, const char* p7signer, const char* res_conf, const char* root_hints, const char* debugconf, int ip4only, int ip6only, int port, struct ub_result* dnskey) argument
/freebsd-10.1-release/contrib/ldns/
H A Drr.c1643 /* convert dnskey to a ds with the given algorithm,
1647 ldns_rr *dnskey)
1653 if (!dnskey || !ds ||
1655 ldns_rr_get_type(dnskey) != LDNS_RR_TYPE_DNSKEY) {
1664 ds_gen = ldns_key_rr2ds(dnskey, algo);
1646 ldns_rr_compare_ds_dnskey(ldns_rr *ds, ldns_rr *dnskey) argument

Completed in 187 milliseconds