xref: /freebsd/contrib/unbound/validator/val_sigcrypt.h (revision 3005e0a300309ec169f8e42181b39865e910da6c)
1b7579f77SDag-Erling Smørgrav /*
2b7579f77SDag-Erling Smørgrav  * validator/val_sigcrypt.h - validator signature crypto functions.
3b7579f77SDag-Erling Smørgrav  *
4b7579f77SDag-Erling Smørgrav  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5b7579f77SDag-Erling Smørgrav  *
6b7579f77SDag-Erling Smørgrav  * This software is open source.
7b7579f77SDag-Erling Smørgrav  *
8b7579f77SDag-Erling Smørgrav  * Redistribution and use in source and binary forms, with or without
9b7579f77SDag-Erling Smørgrav  * modification, are permitted provided that the following conditions
10b7579f77SDag-Erling Smørgrav  * are met:
11b7579f77SDag-Erling Smørgrav  *
12b7579f77SDag-Erling Smørgrav  * Redistributions of source code must retain the above copyright notice,
13b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer.
14b7579f77SDag-Erling Smørgrav  *
15b7579f77SDag-Erling Smørgrav  * Redistributions in binary form must reproduce the above copyright notice,
16b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer in the documentation
17b7579f77SDag-Erling Smørgrav  * and/or other materials provided with the distribution.
18b7579f77SDag-Erling Smørgrav  *
19b7579f77SDag-Erling Smørgrav  * Neither the name of the NLNET LABS nor the names of its contributors may
20b7579f77SDag-Erling Smørgrav  * be used to endorse or promote products derived from this software without
21b7579f77SDag-Erling Smørgrav  * specific prior written permission.
22b7579f77SDag-Erling Smørgrav  *
23b7579f77SDag-Erling Smørgrav  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
2417d15b25SDag-Erling Smørgrav  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
2517d15b25SDag-Erling Smørgrav  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
2617d15b25SDag-Erling Smørgrav  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
2717d15b25SDag-Erling Smørgrav  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
2817d15b25SDag-Erling Smørgrav  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
2917d15b25SDag-Erling Smørgrav  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
3017d15b25SDag-Erling Smørgrav  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
3117d15b25SDag-Erling Smørgrav  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
3217d15b25SDag-Erling Smørgrav  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
3317d15b25SDag-Erling Smørgrav  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34b7579f77SDag-Erling Smørgrav  */
35b7579f77SDag-Erling Smørgrav 
36b7579f77SDag-Erling Smørgrav /**
37b7579f77SDag-Erling Smørgrav  * \file
38b7579f77SDag-Erling Smørgrav  *
39b7579f77SDag-Erling Smørgrav  * This file contains helper functions for the validator module.
40b7579f77SDag-Erling Smørgrav  * The functions help with signature verification and checking, the
41b7579f77SDag-Erling Smørgrav  * bridging between RR wireformat data and crypto calls.
42b7579f77SDag-Erling Smørgrav  */
43b7579f77SDag-Erling Smørgrav 
44b7579f77SDag-Erling Smørgrav #ifndef VALIDATOR_VAL_SIGCRYPT_H
45b7579f77SDag-Erling Smørgrav #define VALIDATOR_VAL_SIGCRYPT_H
46b7579f77SDag-Erling Smørgrav #include "util/data/packed_rrset.h"
47b7579f77SDag-Erling Smørgrav struct val_env;
48b7579f77SDag-Erling Smørgrav struct module_env;
49b7579f77SDag-Erling Smørgrav struct ub_packed_rrset_key;
50*3005e0a3SDag-Erling Smørgrav struct rbtree_type;
51b7579f77SDag-Erling Smørgrav struct regional;
5217d15b25SDag-Erling Smørgrav struct sldns_buffer;
53b7579f77SDag-Erling Smørgrav 
54b7579f77SDag-Erling Smørgrav /** number of entries in algorithm needs array */
55b7579f77SDag-Erling Smørgrav #define ALGO_NEEDS_MAX 256
56b7579f77SDag-Erling Smørgrav 
57b7579f77SDag-Erling Smørgrav /**
58b7579f77SDag-Erling Smørgrav  * Storage for algorithm needs.  DNSKEY algorithms.
59b7579f77SDag-Erling Smørgrav  */
60b7579f77SDag-Erling Smørgrav struct algo_needs {
61b7579f77SDag-Erling Smørgrav 	/** the algorithms (8-bit) with each a number.
62b7579f77SDag-Erling Smørgrav 	 * 0: not marked.
63b7579f77SDag-Erling Smørgrav 	 * 1: marked 'necessary but not yet fulfilled'
64b7579f77SDag-Erling Smørgrav 	 * 2: marked bogus.
65b7579f77SDag-Erling Smørgrav 	 * Indexed by algorithm number.
66b7579f77SDag-Erling Smørgrav 	 */
67b7579f77SDag-Erling Smørgrav 	uint8_t needs[ALGO_NEEDS_MAX];
68b7579f77SDag-Erling Smørgrav 	/** the number of entries in the array that are unfulfilled */
69b7579f77SDag-Erling Smørgrav 	size_t num;
70b7579f77SDag-Erling Smørgrav };
71b7579f77SDag-Erling Smørgrav 
72b7579f77SDag-Erling Smørgrav /**
73b7579f77SDag-Erling Smørgrav  * Initialize algo needs structure, set algos from rrset as needed.
74b7579f77SDag-Erling Smørgrav  * Results are added to an existing need structure.
75b7579f77SDag-Erling Smørgrav  * @param n: struct with storage.
76b7579f77SDag-Erling Smørgrav  * @param dnskey: algos from this struct set as necessary. DNSKEY set.
77b7579f77SDag-Erling Smørgrav  * @param sigalg: adds to signalled algorithm list too.
78b7579f77SDag-Erling Smørgrav  */
79b7579f77SDag-Erling Smørgrav void algo_needs_init_dnskey_add(struct algo_needs* n,
80b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* dnskey, uint8_t* sigalg);
81b7579f77SDag-Erling Smørgrav 
82b7579f77SDag-Erling Smørgrav /**
83b7579f77SDag-Erling Smørgrav  * Initialize algo needs structure from a signalled algo list.
84b7579f77SDag-Erling Smørgrav  * @param n: struct with storage.
85b7579f77SDag-Erling Smørgrav  * @param sigalg: signalled algorithm list, numbers ends with 0.
86b7579f77SDag-Erling Smørgrav  */
87b7579f77SDag-Erling Smørgrav void algo_needs_init_list(struct algo_needs* n, uint8_t* sigalg);
88b7579f77SDag-Erling Smørgrav 
89b7579f77SDag-Erling Smørgrav /**
90b7579f77SDag-Erling Smørgrav  * Initialize algo needs structure, set algos from rrset as needed.
91b7579f77SDag-Erling Smørgrav  * @param n: struct with storage.
92b7579f77SDag-Erling Smørgrav  * @param ds: algos from this struct set as necessary. DS set.
93b7579f77SDag-Erling Smørgrav  * @param fav_ds_algo: filter to use only this DS algo.
94b7579f77SDag-Erling Smørgrav  * @param sigalg: list of signalled algos, constructed as output,
95b7579f77SDag-Erling Smørgrav  *	provide size ALGO_NEEDS_MAX+1. list of algonumbers, ends with a zero.
96b7579f77SDag-Erling Smørgrav  */
97b7579f77SDag-Erling Smørgrav void algo_needs_init_ds(struct algo_needs* n, struct ub_packed_rrset_key* ds,
98b7579f77SDag-Erling Smørgrav 	int fav_ds_algo, uint8_t* sigalg);
99b7579f77SDag-Erling Smørgrav 
100b7579f77SDag-Erling Smørgrav /**
101b7579f77SDag-Erling Smørgrav  * Mark this algorithm as a success, sec_secure, and see if we are done.
102b7579f77SDag-Erling Smørgrav  * @param n: storage structure processed.
103b7579f77SDag-Erling Smørgrav  * @param algo: the algorithm processed to be secure.
104b7579f77SDag-Erling Smørgrav  * @return if true, processing has finished successfully, we are satisfied.
105b7579f77SDag-Erling Smørgrav  */
106b7579f77SDag-Erling Smørgrav int algo_needs_set_secure(struct algo_needs* n, uint8_t algo);
107b7579f77SDag-Erling Smørgrav 
108b7579f77SDag-Erling Smørgrav /**
109b7579f77SDag-Erling Smørgrav  * Mark this algorithm a failure, sec_bogus.  It can later be overridden
110b7579f77SDag-Erling Smørgrav  * by a success for this algorithm (with a different signature).
111b7579f77SDag-Erling Smørgrav  * @param n: storage structure processed.
112b7579f77SDag-Erling Smørgrav  * @param algo: the algorithm processed to be bogus.
113b7579f77SDag-Erling Smørgrav  */
114b7579f77SDag-Erling Smørgrav void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
115b7579f77SDag-Erling Smørgrav 
116b7579f77SDag-Erling Smørgrav /**
117b7579f77SDag-Erling Smørgrav  * See how many algorithms are missing (not bogus or secure, but not processed)
118b7579f77SDag-Erling Smørgrav  * @param n: storage structure processed.
119b7579f77SDag-Erling Smørgrav  * @return number of algorithms missing after processing.
120b7579f77SDag-Erling Smørgrav  */
121b7579f77SDag-Erling Smørgrav size_t algo_needs_num_missing(struct algo_needs* n);
122b7579f77SDag-Erling Smørgrav 
123b7579f77SDag-Erling Smørgrav /**
124b7579f77SDag-Erling Smørgrav  * See which algo is missing.
125b7579f77SDag-Erling Smørgrav  * @param n: struct after processing.
126b7579f77SDag-Erling Smørgrav  * @return if 0 an algorithm was bogus, if a number, this algorithm was
127b7579f77SDag-Erling Smørgrav  *   missing.  So on 0, report why that was bogus, on number report a missing
128b7579f77SDag-Erling Smørgrav  *   algorithm.  There could be multiple missing, this reports the first one.
129b7579f77SDag-Erling Smørgrav  */
130b7579f77SDag-Erling Smørgrav int algo_needs_missing(struct algo_needs* n);
131b7579f77SDag-Erling Smørgrav 
132b7579f77SDag-Erling Smørgrav /**
133b7579f77SDag-Erling Smørgrav  * Format error reason for algorithm missing.
134b7579f77SDag-Erling Smørgrav  * @param env: module env with scratch for temp storage of string.
135b7579f77SDag-Erling Smørgrav  * @param alg: DNSKEY-algorithm missing.
136b7579f77SDag-Erling Smørgrav  * @param reason: destination.
137b7579f77SDag-Erling Smørgrav  * @param s: string, appended with 'with algorithm ..'.
138b7579f77SDag-Erling Smørgrav  */
139b7579f77SDag-Erling Smørgrav void algo_needs_reason(struct module_env* env, int alg, char** reason, char* s);
140b7579f77SDag-Erling Smørgrav 
141b7579f77SDag-Erling Smørgrav /**
142b7579f77SDag-Erling Smørgrav  * Check if dnskey matches a DS digest
143b7579f77SDag-Erling Smørgrav  * Does not check dnskey-keyid footprint, just the digest.
144b7579f77SDag-Erling Smørgrav  * @param env: module environment. Uses scratch space.
145b7579f77SDag-Erling Smørgrav  * @param dnskey_rrset: DNSKEY rrset.
146b7579f77SDag-Erling Smørgrav  * @param dnskey_idx: index of RR in rrset.
147b7579f77SDag-Erling Smørgrav  * @param ds_rrset: DS rrset
148b7579f77SDag-Erling Smørgrav  * @param ds_idx: index of RR in DS rrset.
149b7579f77SDag-Erling Smørgrav  * @return true if it matches, false on error, not supported or no match.
150b7579f77SDag-Erling Smørgrav  */
151b7579f77SDag-Erling Smørgrav int ds_digest_match_dnskey(struct module_env* env,
152b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* dnskey_rrset, size_t dnskey_idx,
153b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* ds_rrset, size_t ds_idx);
154b7579f77SDag-Erling Smørgrav 
155b7579f77SDag-Erling Smørgrav /**
156b7579f77SDag-Erling Smørgrav  * Get dnskey keytag, footprint value
157b7579f77SDag-Erling Smørgrav  * @param dnskey_rrset: DNSKEY rrset.
158b7579f77SDag-Erling Smørgrav  * @param dnskey_idx: index of RR in rrset.
159b7579f77SDag-Erling Smørgrav  * @return the keytag or 0 for badly formatted DNSKEYs.
160b7579f77SDag-Erling Smørgrav  */
161b7579f77SDag-Erling Smørgrav uint16_t dnskey_calc_keytag(struct ub_packed_rrset_key* dnskey_rrset,
162b7579f77SDag-Erling Smørgrav 	size_t dnskey_idx);
163b7579f77SDag-Erling Smørgrav 
164b7579f77SDag-Erling Smørgrav /**
165b7579f77SDag-Erling Smørgrav  * Get DS keytag, footprint value that matches the DNSKEY keytag it signs.
166b7579f77SDag-Erling Smørgrav  * @param ds_rrset: DS rrset
167b7579f77SDag-Erling Smørgrav  * @param ds_idx: index of RR in DS rrset.
168b7579f77SDag-Erling Smørgrav  * @return the keytag or 0 for badly formatted DSs.
169b7579f77SDag-Erling Smørgrav  */
170b7579f77SDag-Erling Smørgrav uint16_t ds_get_keytag(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx);
171b7579f77SDag-Erling Smørgrav 
172b7579f77SDag-Erling Smørgrav /**
173b7579f77SDag-Erling Smørgrav  * See if DNSKEY algorithm is supported
174b7579f77SDag-Erling Smørgrav  * @param dnskey_rrset: DNSKEY rrset.
175b7579f77SDag-Erling Smørgrav  * @param dnskey_idx: index of RR in rrset.
176b7579f77SDag-Erling Smørgrav  * @return true if supported.
177b7579f77SDag-Erling Smørgrav  */
178b7579f77SDag-Erling Smørgrav int dnskey_algo_is_supported(struct ub_packed_rrset_key* dnskey_rrset,
179b7579f77SDag-Erling Smørgrav 	size_t dnskey_idx);
180b7579f77SDag-Erling Smørgrav 
181b7579f77SDag-Erling Smørgrav /**
182b7579f77SDag-Erling Smørgrav  * See if DS digest algorithm is supported
183b7579f77SDag-Erling Smørgrav  * @param ds_rrset: DS rrset
184b7579f77SDag-Erling Smørgrav  * @param ds_idx: index of RR in DS rrset.
185b7579f77SDag-Erling Smørgrav  * @return true if supported.
186b7579f77SDag-Erling Smørgrav  */
187b7579f77SDag-Erling Smørgrav int ds_digest_algo_is_supported(struct ub_packed_rrset_key* ds_rrset,
188b7579f77SDag-Erling Smørgrav 	size_t ds_idx);
189b7579f77SDag-Erling Smørgrav 
190b7579f77SDag-Erling Smørgrav /**
191b7579f77SDag-Erling Smørgrav  * Get DS RR digest algorithm
192b7579f77SDag-Erling Smørgrav  * @param ds_rrset: DS rrset.
193b7579f77SDag-Erling Smørgrav  * @param ds_idx: which DS.
194b7579f77SDag-Erling Smørgrav  * @return algorithm or 0 if DS too short.
195b7579f77SDag-Erling Smørgrav  */
196b7579f77SDag-Erling Smørgrav int ds_get_digest_algo(struct ub_packed_rrset_key* ds_rrset, size_t ds_idx);
197b7579f77SDag-Erling Smørgrav 
198b7579f77SDag-Erling Smørgrav /**
199b7579f77SDag-Erling Smørgrav  * See if DS key algorithm is supported
200b7579f77SDag-Erling Smørgrav  * @param ds_rrset: DS rrset
201b7579f77SDag-Erling Smørgrav  * @param ds_idx: index of RR in DS rrset.
202b7579f77SDag-Erling Smørgrav  * @return true if supported.
203b7579f77SDag-Erling Smørgrav  */
204b7579f77SDag-Erling Smørgrav int ds_key_algo_is_supported(struct ub_packed_rrset_key* ds_rrset,
205b7579f77SDag-Erling Smørgrav 	size_t ds_idx);
206b7579f77SDag-Erling Smørgrav 
207b7579f77SDag-Erling Smørgrav /**
208b7579f77SDag-Erling Smørgrav  * Get DS RR key algorithm. This value should match with the DNSKEY algo.
209b7579f77SDag-Erling Smørgrav  * @param k: DS rrset.
210b7579f77SDag-Erling Smørgrav  * @param idx: which DS.
211b7579f77SDag-Erling Smørgrav  * @return algorithm or 0 if DS too short.
212b7579f77SDag-Erling Smørgrav  */
213b7579f77SDag-Erling Smørgrav int ds_get_key_algo(struct ub_packed_rrset_key* k, size_t idx);
214b7579f77SDag-Erling Smørgrav 
215b7579f77SDag-Erling Smørgrav /**
216b7579f77SDag-Erling Smørgrav  * Get DNSKEY RR signature algorithm
217b7579f77SDag-Erling Smørgrav  * @param k: DNSKEY rrset.
218b7579f77SDag-Erling Smørgrav  * @param idx: which DNSKEY RR.
219b7579f77SDag-Erling Smørgrav  * @return algorithm or 0 if DNSKEY too short.
220b7579f77SDag-Erling Smørgrav  */
221b7579f77SDag-Erling Smørgrav int dnskey_get_algo(struct ub_packed_rrset_key* k, size_t idx);
222b7579f77SDag-Erling Smørgrav 
223b7579f77SDag-Erling Smørgrav /**
224b7579f77SDag-Erling Smørgrav  * Get DNSKEY RR flags
225b7579f77SDag-Erling Smørgrav  * @param k: DNSKEY rrset.
226b7579f77SDag-Erling Smørgrav  * @param idx: which DNSKEY RR.
227b7579f77SDag-Erling Smørgrav  * @return flags or 0 if DNSKEY too short.
228b7579f77SDag-Erling Smørgrav  */
229b7579f77SDag-Erling Smørgrav uint16_t dnskey_get_flags(struct ub_packed_rrset_key* k, size_t idx);
230b7579f77SDag-Erling Smørgrav 
231b7579f77SDag-Erling Smørgrav /**
232b7579f77SDag-Erling Smørgrav  * Verify rrset against dnskey rrset.
233b7579f77SDag-Erling Smørgrav  * @param env: module environment, scratch space is used.
234b7579f77SDag-Erling Smørgrav  * @param ve: validator environment, date settings.
235b7579f77SDag-Erling Smørgrav  * @param rrset: to be validated.
236b7579f77SDag-Erling Smørgrav  * @param dnskey: DNSKEY rrset, keyset to try.
237b7579f77SDag-Erling Smørgrav  * @param sigalg: if nonNULL provide downgrade protection otherwise one
238b7579f77SDag-Erling Smørgrav  *   algorithm is enough.
239b7579f77SDag-Erling Smørgrav  * @param reason: if bogus, a string returned, fixed or alloced in scratch.
240b7579f77SDag-Erling Smørgrav  * @return SECURE if one key in the set verifies one rrsig.
241b7579f77SDag-Erling Smørgrav  *	UNCHECKED on allocation errors, unsupported algorithms, malformed data,
242b7579f77SDag-Erling Smørgrav  *	and BOGUS on verification failures (no keys match any signatures).
243b7579f77SDag-Erling Smørgrav  */
244b7579f77SDag-Erling Smørgrav enum sec_status dnskeyset_verify_rrset(struct module_env* env,
245b7579f77SDag-Erling Smørgrav 	struct val_env* ve, struct ub_packed_rrset_key* rrset,
246b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason);
247b7579f77SDag-Erling Smørgrav 
248b7579f77SDag-Erling Smørgrav /**
249b7579f77SDag-Erling Smørgrav  * verify rrset against one specific dnskey (from rrset)
250b7579f77SDag-Erling Smørgrav  * @param env: module environment, scratch space is used.
251b7579f77SDag-Erling Smørgrav  * @param ve: validator environment, date settings.
252b7579f77SDag-Erling Smørgrav  * @param rrset: to be validated.
253b7579f77SDag-Erling Smørgrav  * @param dnskey: DNSKEY rrset, keyset.
254b7579f77SDag-Erling Smørgrav  * @param dnskey_idx: which key from the rrset to try.
255b7579f77SDag-Erling Smørgrav  * @param reason: if bogus, a string returned, fixed or alloced in scratch.
256b7579f77SDag-Erling Smørgrav  * @return secure if *this* key signs any of the signatures on rrset.
257b7579f77SDag-Erling Smørgrav  *	unchecked on error or and bogus on bad signature.
258b7579f77SDag-Erling Smørgrav  */
259b7579f77SDag-Erling Smørgrav enum sec_status dnskey_verify_rrset(struct module_env* env,
260b7579f77SDag-Erling Smørgrav 	struct val_env* ve, struct ub_packed_rrset_key* rrset,
261b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* dnskey, size_t dnskey_idx, char** reason);
262b7579f77SDag-Erling Smørgrav 
263b7579f77SDag-Erling Smørgrav /**
264b7579f77SDag-Erling Smørgrav  * verify rrset, with dnskey rrset, for a specific rrsig in rrset
265b7579f77SDag-Erling Smørgrav  * @param env: module environment, scratch space is used.
266b7579f77SDag-Erling Smørgrav  * @param ve: validator environment, date settings.
267b7579f77SDag-Erling Smørgrav  * @param now: current time for validation (can be overridden).
268b7579f77SDag-Erling Smørgrav  * @param rrset: to be validated.
269b7579f77SDag-Erling Smørgrav  * @param dnskey: DNSKEY rrset, keyset to try.
270b7579f77SDag-Erling Smørgrav  * @param sig_idx: which signature to try to validate.
271b7579f77SDag-Erling Smørgrav  * @param sortree: reused sorted order. Stored in region. Pass NULL at start,
272b7579f77SDag-Erling Smørgrav  * 	and for a new rrset.
273b7579f77SDag-Erling Smørgrav  * @param reason: if bogus, a string returned, fixed or alloced in scratch.
274b7579f77SDag-Erling Smørgrav  * @return secure if any key signs *this* signature. bogus if no key signs it,
275b7579f77SDag-Erling Smørgrav  *	or unchecked on error.
276b7579f77SDag-Erling Smørgrav  */
277b7579f77SDag-Erling Smørgrav enum sec_status dnskeyset_verify_rrset_sig(struct module_env* env,
27817d15b25SDag-Erling Smørgrav 	struct val_env* ve, time_t now, struct ub_packed_rrset_key* rrset,
279b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* dnskey, size_t sig_idx,
280*3005e0a3SDag-Erling Smørgrav 	struct rbtree_type** sortree, char** reason);
281b7579f77SDag-Erling Smørgrav 
282b7579f77SDag-Erling Smørgrav /**
283b7579f77SDag-Erling Smørgrav  * verify rrset, with specific dnskey(from set), for a specific rrsig
284b7579f77SDag-Erling Smørgrav  * @param region: scratch region used for temporary allocation.
285b7579f77SDag-Erling Smørgrav  * @param buf: scratch buffer used for canonicalized rrset data.
286b7579f77SDag-Erling Smørgrav  * @param ve: validator environment, date settings.
287b7579f77SDag-Erling Smørgrav  * @param now: current time for validation (can be overridden).
288b7579f77SDag-Erling Smørgrav  * @param rrset: to be validated.
289b7579f77SDag-Erling Smørgrav  * @param dnskey: DNSKEY rrset, keyset.
290b7579f77SDag-Erling Smørgrav  * @param dnskey_idx: which key from the rrset to try.
291b7579f77SDag-Erling Smørgrav  * @param sig_idx: which signature to try to validate.
292b7579f77SDag-Erling Smørgrav  * @param sortree: pass NULL at start, the sorted rrset order is returned.
293b7579f77SDag-Erling Smørgrav  * 	pass it again for the same rrset.
294b7579f77SDag-Erling Smørgrav  * @param buf_canon: if true, the buffer is already canonical.
295b7579f77SDag-Erling Smørgrav  * 	pass false at start. pass old value only for same rrset and same
296b7579f77SDag-Erling Smørgrav  * 	signature (but perhaps different key) for reuse.
297b7579f77SDag-Erling Smørgrav  * @param reason: if bogus, a string returned, fixed or alloced in scratch.
298b7579f77SDag-Erling Smørgrav  * @return secure if this key signs this signature. unchecked on error or
299b7579f77SDag-Erling Smørgrav  *	bogus if it did not validate.
300b7579f77SDag-Erling Smørgrav  */
301b7579f77SDag-Erling Smørgrav enum sec_status dnskey_verify_rrset_sig(struct regional* region,
30217d15b25SDag-Erling Smørgrav 	struct sldns_buffer* buf, struct val_env* ve, time_t now,
303b7579f77SDag-Erling Smørgrav 	struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey,
304b7579f77SDag-Erling Smørgrav 	size_t dnskey_idx, size_t sig_idx,
305*3005e0a3SDag-Erling Smørgrav 	struct rbtree_type** sortree, int* buf_canon, char** reason);
306b7579f77SDag-Erling Smørgrav 
307b7579f77SDag-Erling Smørgrav /**
308b7579f77SDag-Erling Smørgrav  * canonical compare for two tree entries
309b7579f77SDag-Erling Smørgrav  */
310b7579f77SDag-Erling Smørgrav int canonical_tree_compare(const void* k1, const void* k2);
311b7579f77SDag-Erling Smørgrav 
31217d15b25SDag-Erling Smørgrav /**
31317d15b25SDag-Erling Smørgrav  * Compare two rrsets and see if they are the same, canonicalised.
31417d15b25SDag-Erling Smørgrav  * The rrsets are not altered.
31517d15b25SDag-Erling Smørgrav  * @param region: temporary region.
31617d15b25SDag-Erling Smørgrav  * @param k1: rrset1
31717d15b25SDag-Erling Smørgrav  * @param k2: rrset2
31817d15b25SDag-Erling Smørgrav  * @return true if equal.
31917d15b25SDag-Erling Smørgrav  */
32017d15b25SDag-Erling Smørgrav int rrset_canonical_equal(struct regional* region,
32117d15b25SDag-Erling Smørgrav 	struct ub_packed_rrset_key* k1, struct ub_packed_rrset_key* k2);
32217d15b25SDag-Erling Smørgrav 
323b7579f77SDag-Erling Smørgrav #endif /* VALIDATOR_VAL_SIGCRYPT_H */
324