| /freebsd/contrib/unbound/testcode/ |
| H A D | unitverify.c | 117 struct ub_packed_rrset_key* dnskey = NULL; in extract_keys() local 125 dnskey = rep->rrsets[i]; in extract_keys() 130 unit_assert(dnskey); in extract_keys() 134 return dnskey; in extract_keys() 165 setup_sigalg(struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) in setup_sigalg() argument 170 for(i=0; i<rrset_get_count(dnskey); i++) { in setup_sigalg() 171 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i); in setup_sigalg() 183 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, in verifytest_rrset() argument 196 setup_sigalg(dnskey, sigalg); /* check all algorithms in the dnskey */ in verifytest_rrset() 198 sec = dnskeyset_verify_rrset(env, ve, rrset, dnskey, sigalg, &reason, in verifytest_rrset() [all …]
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_sigcrypt.h | 83 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg); 274 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, 294 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, 322 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
|
| H A D | val_sigcrypt.c | 438 struct ub_packed_rrset_key* dnskey, uint8_t* sigalg) in algo_needs_init_dnskey_add() argument 442 size_t num = rrset_get_count(dnskey); in algo_needs_init_dnskey_add() 445 algo = (uint8_t)dnskey_get_algo(dnskey, i); in algo_needs_init_dnskey_add() 558 struct ub_packed_rrset_key* dnskey, size_t sig_idx, in dnskeyset_verify_rrset_sig() argument 568 size_t i, num = rrset_get_count(dnskey); in dnskeyset_verify_rrset_sig() 582 if(algo != dnskey_get_algo(dnskey, i) || in dnskeyset_verify_rrset_sig() 583 tag != dnskey_calc_keytag(dnskey, i)) in dnskeyset_verify_rrset_sig() 590 env->scratch_buffer, ve, now, rrset, dnskey, i, in dnskeyset_verify_rrset_sig() 625 struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, in dnskeyset_verify_rrset() argument 660 dnskey, i, &sortree, reason, reason_bogus, in dnskeyset_verify_rrset() [all …]
|
| H A D | val_utils.c | 472 struct ub_packed_rrset_key dnskey; in val_verify_rrset_entry() local 475 dnskey.rk.type = htons(kd->rrset_type); in val_verify_rrset_entry() 476 dnskey.rk.rrset_class = htons(kkey->key_class); in val_verify_rrset_entry() 477 dnskey.rk.flags = 0; in val_verify_rrset_entry() 478 dnskey.rk.dname = kkey->name; in val_verify_rrset_entry() 479 dnskey.rk.dname_len = kkey->namelen; in val_verify_rrset_entry() 480 dnskey.entry.key = &dnskey; in val_verify_rrset_entry() 481 dnskey.entry.data = kd->rrset_data; in val_verify_rrset_entry() 482 sec = val_verify_rrset(env, ve, rrset, &dnskey, kd->algo, reason, in val_verify_rrset_entry()
|
| H A D | validator.c | 3251 struct ub_packed_rrset_key* dnskey = NULL; in process_dnskey_response() local 3267 dnskey = reply_find_answer_rrset(qinfo, msg->rep); in process_dnskey_response() 3269 if(dnskey == NULL) { in process_dnskey_response() 3312 ve, dnskey, vq->ds_rrset, downprot, &reason, &reason_bogus, in process_dnskey_response()
|
| /freebsd/contrib/unbound/smallapp/ |
| H A D | unbound-anchor.c | 2256 struct ub_result* dnskey; in fetch_root_key() local 2261 dnskey = prime_root_key(ctx); in fetch_root_key() 2263 return dnskey; in fetch_root_key() 2274 struct ub_result* dnskey; in do_root_update_work() local 2285 dnskey = fetch_root_key(root_anchor_file, res_conf, in do_root_update_work() 2287 rcode = dnskey->rcode; in do_root_update_work() 2289 if (res_conf_fallback && res_conf && !dnskey->secure) { in do_root_update_work() 2291 ub_resolve_free(dnskey); in do_root_update_work() 2293 dnskey = fetch_root_key(root_anchor_file, NULL, in do_root_update_work() 2295 if (rcode != 0 && dnskey->rcode == 0) { in do_root_update_work() [all …]
|
| /freebsd/contrib/unbound/services/ |
| H A D | authzone.c | 7823 struct ub_packed_rrset_key* dnskey, struct auth_data* node, in zonemd_dnssec_verify_rrset() argument 7854 sec = dnskeyset_verify_rrset(env, ve, &pk, dnskey, sigalg, why_bogus, NULL, in zonemd_dnssec_verify_rrset() 7897 struct ub_packed_rrset_key* dnskey, struct auth_data* apex, in zonemd_check_dnssec_absence() argument 7910 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, in zonemd_check_dnssec_absence() 7953 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, match, in zonemd_check_dnssec_absence() 7974 struct ub_packed_rrset_key* dnskey, struct auth_data* apex, in zonemd_check_dnssec_soazonemd() argument 7988 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, soa, in zonemd_check_dnssec_soazonemd() 7993 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, in zonemd_check_dnssec_soazonemd() 8059 struct module_stack* mods, struct ub_packed_rrset_key* dnskey, in auth_zone_verify_zonemd_with_key() argument 8085 if(!dnskey && !is_insecure) { in auth_zone_verify_zonemd_with_key() [all …]
|
| /freebsd/contrib/ldns/ |
| H A D | rr.c | 1685 ldns_rr *dnskey) in ldns_rr_compare_ds_dnskey() argument 1691 if (!dnskey || !ds || in ldns_rr_compare_ds_dnskey() 1693 ldns_rr_get_type(dnskey) != LDNS_RR_TYPE_DNSKEY) { in ldns_rr_compare_ds_dnskey() 1702 ds_gen = ldns_key_rr2ds(dnskey, algo); in ldns_rr_compare_ds_dnskey()
|
| /freebsd/contrib/unbound/doc/ |
| H A D | example.conf.in | 554 # off, failing to validate dnskey data for a trustanchor will
|
| H A D | Changelog | 795 - Fix shadowed error string variable in validator dnskey handling.
|