/openbsd-current/sbin/unwind/libunbound/validator/ |
H A D | val_sigcrypt.h | 148 * @param dnskey_rrset: DNSKEY rrset. 155 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 160 * @param dnskey_rrset: DNSKEY rrset. 164 uint16_t dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, 177 * @param dnskey_rrset: DNSKEY rrset. 181 int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, 186 * @param dnskey_rrset: DNSKEY rrset. 190 int dnskey_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset, 196 * @param dnskey_rrset: DNSKEY rrset. 199 int dnskeyset_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset); [all...] |
H A D | val_utils.c | 463 struct ub_packed_rrset_key* dnskey_rrset, 470 num = rrset_get_count(dnskey_rrset); 475 != dnskey_get_algo(dnskey_rrset, i) 476 || dnskey_calc_keytag(dnskey_rrset, i) 487 if(!ds_digest_match_dnskey(env, dnskey_rrset, i, ds_rrset, 499 if(!dnskey_size_is_supported(dnskey_rrset, i)) { 508 sec = dnskey_verify_rrset(env, ve, dnskey_rrset, dnskey_rrset, 550 struct ub_packed_rrset_key* dnskey_rrset, 562 if(dnskey_rrset 462 verify_dnskeys_with_ds_rr(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate, int *nonechecked) argument 549 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 649 val_verify_new_DNSKEYs(struct regional* region, struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, int downprot, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 678 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 820 val_verify_new_DNSKEYs_with_ta(struct regional* region, struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds_rrset, struct ub_packed_rrset_key* ta_dnskey_rrset, int downprot, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument [all...] |
H A D | val_utils.h | 141 * @param dnskey_rrset: DNSKEY rrset to verify 154 struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, 163 * @param dnskey_rrset: DNSKEY rrset to verify 177 struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, 190 * @param dnskey_rrset: DNSKEY rrset to verify 198 * dnskey_rrset, a "null" key entry indicating that this DS 209 struct ub_packed_rrset_key* dnskey_rrset, 219 * @param dnskey_rrset: DNSKEY rrset to verify 228 * dnskey_rrset, a "null" key entry indicating that this DS 239 struct ub_packed_rrset_key* dnskey_rrset, [all...] |
H A D | autotrust.c | 402 autr_rrset_delete(tp->dnskey_rrset); 786 autr_rrset_delete(tp->dnskey_rrset); 790 tp->dnskey_rrset = ubdnskey; 1273 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, 1313 struct ub_packed_rrset_key* dnskey_rrset, size_t i, 1322 sec = dnskey_verify_rrset(env, ve, dnskey_rrset, dnskey_rrset, i, 1538 struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, 1542 dnskey_rrset->entry.data; 1544 log_assert(ntohs(dnskey_rrset 1312 rr_is_selfsigned_revoked(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, size_t i, struct module_qstate* qstate) argument 1537 check_contains_revoked(struct module_env* env, struct val_env* ve, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, int* changed, struct module_qstate* qstate) argument 1584 key_matches_a_ds(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, size_t key_idx, struct ub_packed_rrset_key* ds_rrset) argument 1629 update_events(struct module_env* env, struct val_env* ve, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, int* changed) argument 2062 set_next_probe(struct module_env* env, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset) argument 2105 autr_tp_remove(struct module_env* env, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset) argument 2157 autr_process_prime(struct module_env* env, struct val_env* ve, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, struct module_qstate* qstate) argument [all...] |
H A D | autotrust.h | 190 * @param dnskey_rrset: DNSKEY rrset probed (can be NULL if bad prime result). 198 struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset,
|
H A D | val_sigcrypt.c | 285 * @param dnskey_rrset: DNSKEY rrset. 294 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 301 rrset_get_rdata(dnskey_rrset, dnskey_idx, &dnskey_rdata, &dnskey_len); 307 sldns_buffer_write(b, dnskey_rrset->rk.dname, 308 dnskey_rrset->rk.dname_len); 319 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 350 if(!ds_create_dnskey_digest(env, dnskey_rrset, dnskey_idx, ds_rrset, 377 dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx) argument 381 rrset_get_rdata(dnskey_rrset, dnskey_idx, &data, &len); 386 int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, argument 293 ds_create_dnskey_digest(struct module_env* env, struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, uint8_t* digest) argument 318 ds_digest_match_dnskey(struct module_env* env, struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) argument 393 dnskey_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx) argument 426 dnskeyset_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset) argument [all...] |
H A D | val_anchor.h | 118 struct ub_packed_rrset_key* dnskey_rrset; member in struct:trust_anchor
|
H A D | val_anchor.c | 134 assembled_rrset_delete(ta->dnskey_rrset); 939 ta->dnskey_rrset = assemble_it(ta, ta->numDNSKEY, 941 if(!ta->dnskey_rrset) 974 if(!dnskey_algo_is_supported(ta->dnskey_rrset, i) || 975 !dnskey_size_is_supported(ta->dnskey_rrset, i)) 1273 if(ta->numDNSKEY != 0 && ta->dnskey_rrset) { 1275 ta->dnskey_rrset->entry.data; 1278 list[ret++] = dnskey_calc_keytag(ta->dnskey_rrset, i);
|
H A D | validator.c | 2656 * @param dnskey_rrset: DNSKEY rrset (can be NULL if none) in prime reply. 2667 primeResponseToKE(struct ub_packed_rrset_key* dnskey_rrset, argument 2677 if(!dnskey_rrset) { 2701 dnskey_rrset, ta->ds_rrset, ta->dnskey_rrset, downprot, 3201 struct ub_packed_rrset_key* dnskey_rrset = NULL; local 3216 dnskey_rrset = reply_find_rrset_section_an(msg->rep, 3222 if(!autr_process_prime(qstate->env, ve, ta, dnskey_rrset, 3230 vq->key_entry = primeResponseToKE(dnskey_rrset, ta, qstate, id);
|
/openbsd-current/usr.sbin/unbound/validator/ |
H A D | val_sigcrypt.h | 148 * @param dnskey_rrset: DNSKEY rrset. 155 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 160 * @param dnskey_rrset: DNSKEY rrset. 164 uint16_t dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, 177 * @param dnskey_rrset: DNSKEY rrset. 181 int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, 186 * @param dnskey_rrset: DNSKEY rrset. 190 int dnskey_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset, 196 * @param dnskey_rrset: DNSKEY rrset. 199 int dnskeyset_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset); [all...] |
H A D | val_utils.c | 463 struct ub_packed_rrset_key* dnskey_rrset, 470 num = rrset_get_count(dnskey_rrset); 475 != dnskey_get_algo(dnskey_rrset, i) 476 || dnskey_calc_keytag(dnskey_rrset, i) 487 if(!ds_digest_match_dnskey(env, dnskey_rrset, i, ds_rrset, 499 if(!dnskey_size_is_supported(dnskey_rrset, i)) { 508 sec = dnskey_verify_rrset(env, ve, dnskey_rrset, dnskey_rrset, 550 struct ub_packed_rrset_key* dnskey_rrset, 562 if(dnskey_rrset 462 verify_dnskeys_with_ds_rr(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate, int *nonechecked) argument 549 val_verify_DNSKEY_with_DS(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 649 val_verify_new_DNSKEYs(struct regional* region, struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ds_rrset, int downprot, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 678 val_verify_DNSKEY_with_TA(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds, struct ub_packed_rrset_key* ta_dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument 820 val_verify_new_DNSKEYs_with_ta(struct regional* region, struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, struct ub_packed_rrset_key* ta_ds_rrset, struct ub_packed_rrset_key* ta_dnskey_rrset, int downprot, char** reason, sldns_ede_code *reason_bogus, struct module_qstate* qstate) argument [all...] |
H A D | val_utils.h | 141 * @param dnskey_rrset: DNSKEY rrset to verify 154 struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, 163 * @param dnskey_rrset: DNSKEY rrset to verify 177 struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, 190 * @param dnskey_rrset: DNSKEY rrset to verify 198 * dnskey_rrset, a "null" key entry indicating that this DS 209 struct ub_packed_rrset_key* dnskey_rrset, 219 * @param dnskey_rrset: DNSKEY rrset to verify 228 * dnskey_rrset, a "null" key entry indicating that this DS 239 struct ub_packed_rrset_key* dnskey_rrset, [all...] |
H A D | autotrust.c | 402 autr_rrset_delete(tp->dnskey_rrset); 786 autr_rrset_delete(tp->dnskey_rrset); 790 tp->dnskey_rrset = ubdnskey; 1269 tp->ds_rrset, tp->dnskey_rrset, downprot?sigalg:NULL, &reason, 1309 struct ub_packed_rrset_key* dnskey_rrset, size_t i, 1318 sec = dnskey_verify_rrset(env, ve, dnskey_rrset, dnskey_rrset, i, 1534 struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, 1538 dnskey_rrset->entry.data; 1540 log_assert(ntohs(dnskey_rrset 1308 rr_is_selfsigned_revoked(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, size_t i, struct module_qstate* qstate) argument 1533 check_contains_revoked(struct module_env* env, struct val_env* ve, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, int* changed, struct module_qstate* qstate) argument 1580 key_matches_a_ds(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* dnskey_rrset, size_t key_idx, struct ub_packed_rrset_key* ds_rrset) argument 1625 update_events(struct module_env* env, struct val_env* ve, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, int* changed) argument 2058 set_next_probe(struct module_env* env, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset) argument 2101 autr_tp_remove(struct module_env* env, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset) argument 2153 autr_process_prime(struct module_env* env, struct val_env* ve, struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset, struct module_qstate* qstate) argument [all...] |
H A D | autotrust.h | 190 * @param dnskey_rrset: DNSKEY rrset probed (can be NULL if bad prime result). 198 struct trust_anchor* tp, struct ub_packed_rrset_key* dnskey_rrset,
|
H A D | val_sigcrypt.c | 285 * @param dnskey_rrset: DNSKEY rrset. 294 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 301 rrset_get_rdata(dnskey_rrset, dnskey_idx, &dnskey_rdata, &dnskey_len); 307 sldns_buffer_write(b, dnskey_rrset->rk.dname, 308 dnskey_rrset->rk.dname_len); 319 struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, 350 if(!ds_create_dnskey_digest(env, dnskey_rrset, dnskey_idx, ds_rrset, 377 dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx) argument 381 rrset_get_rdata(dnskey_rrset, dnskey_idx, &data, &len); 386 int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset, argument 293 ds_create_dnskey_digest(struct module_env* env, struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, struct ub_packed_rrset_key* ds_rrset, size_t ds_idx, uint8_t* digest) argument 318 ds_digest_match_dnskey(struct module_env* env, struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx, struct ub_packed_rrset_key* ds_rrset, size_t ds_idx) argument 393 dnskey_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx) argument 426 dnskeyset_size_is_supported(struct ub_packed_rrset_key* dnskey_rrset) argument [all...] |
H A D | val_anchor.h | 118 struct ub_packed_rrset_key* dnskey_rrset; member in struct:trust_anchor
|
H A D | val_anchor.c | 134 assembled_rrset_delete(ta->dnskey_rrset); 939 ta->dnskey_rrset = assemble_it(ta, ta->numDNSKEY, 941 if(!ta->dnskey_rrset) 974 if(!dnskey_algo_is_supported(ta->dnskey_rrset, i) || 975 !dnskey_size_is_supported(ta->dnskey_rrset, i)) 1273 if(ta->numDNSKEY != 0 && ta->dnskey_rrset) { 1275 ta->dnskey_rrset->entry.data; 1278 list[ret++] = dnskey_calc_keytag(ta->dnskey_rrset, i);
|
H A D | validator.c | 2656 * @param dnskey_rrset: DNSKEY rrset (can be NULL if none) in prime reply. 2667 primeResponseToKE(struct ub_packed_rrset_key* dnskey_rrset, argument 2677 if(!dnskey_rrset) { 2701 dnskey_rrset, ta->ds_rrset, ta->dnskey_rrset, downprot, 3201 struct ub_packed_rrset_key* dnskey_rrset = NULL; local 3216 dnskey_rrset = reply_find_rrset_section_an(msg->rep, 3222 if(!autr_process_prime(qstate->env, ve, ta, dnskey_rrset, 3230 vq->key_entry = primeResponseToKE(dnskey_rrset, ta, qstate, id);
|
/openbsd-current/usr.sbin/unbound/services/ |
H A D | authzone.c | 8120 struct auth_rrset* dnskey_rrset; local 8130 dnskey_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_DNSKEY); 8131 if(!dnskey_rrset || dnskey_rrset->data->count==0) { 8145 keystorage->entry.data = dnskey_rrset->data; 8153 anchor->dnskey_rrset, NULL, why_bogus, NULL, NULL); 8179 struct auth_rrset* dnskey_rrset; local 8190 dnskey_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_DNSKEY); 8191 if(!dnskey_rrset || dnskey_rrset [all...] |
/openbsd-current/sbin/unwind/libunbound/services/ |
H A D | authzone.c | 8120 struct auth_rrset* dnskey_rrset; local 8130 dnskey_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_DNSKEY); 8131 if(!dnskey_rrset || dnskey_rrset->data->count==0) { 8145 keystorage->entry.data = dnskey_rrset->data; 8153 anchor->dnskey_rrset, NULL, why_bogus, NULL, NULL); 8179 struct auth_rrset* dnskey_rrset; local 8190 dnskey_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_DNSKEY); 8191 if(!dnskey_rrset || dnskey_rrset [all...] |