Lines Matching refs:nsec3
2375 /** true if domain has only nsec3 */
2496 /* no direct answer from nsec3-only domains */
2843 /* skip unknown flags (dynamic signer is recalculating nsec3 chain) */
2938 /* because canonical ordering and b32 nsec3 ordering are the same.
2939 * this is a good lookup to find the nsec3 name. */
2941 /* but we may have to skip non-nsec3 nodes */
2943 * separate nsec3 tree with nsec3 nodes */
3036 struct auth_rrset* nsec3;
3038 nsec3 = az_domain_rrset(node, LDNS_RR_TYPE_NSEC3);
3039 if(!nsec3) return 1; /* if no nsec3 RR, skip it */
3040 if(!msg_add_rrset_ns(z, region, msg, node, nsec3)) return 0;
3044 /** add NSEC3 records to the zone for the nsec3 proof.
3049 * always enabled: include nsec3 proving about the Closest Encloser.
3070 /* find parameters of nsec3 proof */
3072 return 1; /* no nsec3 */
3075 * proof nsec3, this has to be an exact match nsec3. */
3100 /* find nsec3 that matches or covers it */
3116 /* find nsec3 that matches or covers it */
3333 * wildcard qname denial needs to have a CE nsec3. */
7842 /** check for nsec3, the RR with params equal, if bitmap has the type */
7843 static int nsec3_of_param_has_type(struct auth_rrset* nsec3, int algo,
7846 int i, count = (int)nsec3->data->count;
7849 pk.entry.data = nsec3->data;
7909 struct auth_rrset* nsec3;
7925 nsec3 = az_domain_rrset(match, LDNS_RR_TYPE_NSEC3);
7926 if(!nsec3) {
7932 nsec3, why_bogus, sigalg, reasonbuf, reasonlen)) {
7937 if(nsec3_of_param_has_type(nsec3, algo, iter, salt, saltlen,