/systemd/src/resolve/ |
H A D | resolved-dns-dnssec.c | 263 DnsResourceRecord *rrsig, 272 assert(rrsig); 310 rrsig->rrsig.signature, rrsig->rrsig.signature_size, 410 DnsResourceRecord *rrsig, 419 assert(rrsig); 434 if (rrsig->rrsig 260 dnssec_rsa_verify( const char *hash_algorithm, const void *hash, size_t hash_size, DnsResourceRecord *rrsig, DnsResourceRecord *dnskey) argument 406 dnssec_ecdsa_verify( const char *hash_algorithm, int algorithm, const void *hash, size_t hash_size, DnsResourceRecord *rrsig, DnsResourceRecord *dnskey) argument 464 dnssec_rrsig_prepare(DnsResourceRecord *rrsig) argument 515 dnssec_rrsig_expired(DnsResourceRecord *rrsig, usec_t realtime) argument 584 dnssec_fix_rrset_ttl( DnsResourceRecord *list[], unsigned n, DnsResourceRecord *rrsig, usec_t realtime) argument 613 dnssec_verify_rrset( DnsAnswer *a, const DnsResourceKey *key, DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, usec_t realtime, DnssecResult *result) argument 839 dnssec_rrsig_match_dnskey(DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, bool revoked_ok) argument 869 dnssec_key_match_rrsig(const DnsResourceKey *key, DnsResourceRecord *rrsig) argument 894 DnsResourceRecord *rrsig; local 2121 dnssec_verify_rrset( DnsAnswer *a, const DnsResourceKey *key, DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, usec_t realtime, DnssecResult *result) argument 2132 dnssec_rrsig_match_dnskey(DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, bool revoked_ok) argument 2137 dnssec_key_match_rrsig(const DnsResourceKey *key, DnsResourceRecord *rrsig) argument [all...] |
H A D | test-dnssec.c | 55 _cleanup_(dns_resource_record_unrefp) DnsResourceRecord *nsec = NULL, *rrsig = NULL, *dnskey = NULL; 79 rrsig = dns_resource_record_new_full(DNS_CLASS_IN, DNS_TYPE_RRSIG, "NaSa.GOV."); 80 assert_se(rrsig); 82 rrsig->rrsig.type_covered = DNS_TYPE_NSEC; 83 rrsig->rrsig.algorithm = DNSSEC_ALGORITHM_RSASHA256; 84 rrsig->rrsig.labels = 2; 85 rrsig [all...] |
H A D | resolved-dns-dnssec.h | 66 int dnssec_rrsig_match_dnskey(DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, bool revoked_ok); 67 int dnssec_key_match_rrsig(const DnsResourceKey *key, DnsResourceRecord *rrsig); 69 int dnssec_verify_rrset(DnsAnswer *answer, const DnsResourceKey *key, DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, usec_t realtime, DnssecResult *result); 70 int dnssec_verify_rrset_search(DnsAnswer *answer, const DnsResourceKey *key, DnsAnswer *validated_dnskeys, usec_t realtime, DnssecResult *result, DnsResourceRecord **rrsig);
|
H A D | resolved-dns-rr.c | 469 free(rr->rrsig.signer); 470 free(rr->rrsig.signature); 672 return a->rrsig.type_covered == b->rrsig.type_covered && 673 a->rrsig.algorithm == b->rrsig.algorithm && 674 a->rrsig.labels == b->rrsig.labels && 675 a->rrsig.original_ttl == b->rrsig [all...] |
H A D | resolved-dns-packet.c | 978 r = dns_packet_append_uint16(p, rr->rrsig.type_covered, NULL); 982 r = dns_packet_append_uint8(p, rr->rrsig.algorithm, NULL); 986 r = dns_packet_append_uint8(p, rr->rrsig.labels, NULL); 990 r = dns_packet_append_uint32(p, rr->rrsig.original_ttl, NULL); 994 r = dns_packet_append_uint32(p, rr->rrsig.expiration, NULL); 998 r = dns_packet_append_uint32(p, rr->rrsig.inception, NULL); 1002 r = dns_packet_append_uint16(p, rr->rrsig.key_tag, NULL); 1006 r = dns_packet_append_name(p, rr->rrsig.signer, false, true, NULL); 1010 r = dns_packet_append_blob(p, rr->rrsig.signature, rr->rrsig [all...] |
H A D | resolved-dns-trust-anchor.c | 681 DnsResourceRecord *rrsig; local 705 DNS_ANSWER_FOREACH(rrsig, rrs) { 708 if (rrsig->key->type != DNS_TYPE_RRSIG) 711 r = dnssec_rrsig_match_dnskey(rrsig, dnskey, true); 717 r = dnssec_verify_rrset(rrs, dnskey->key, rrsig, dnskey, USEC_INFINITY, &result);
|
H A D | resolved-dns-transaction.c | 1835 if (rr->rrsig.type_covered == DNS_TYPE_DNSKEY) { 1836 r = dns_name_equal(rr->rrsig.signer, DNS_RESOURCE_KEY_NAME(rr->key)); 1854 r = dns_name_endswith(DNS_RESOURCE_KEY_NAME(t->key), rr->rrsig.signer); 1860 dnskey = dns_resource_key_new(rr->key->class, DNS_TYPE_DNSKEY, rr->rrsig.signer); 1864 log_debug("Requesting DNSKEY to validate transaction %" PRIu16" (%s, RRSIG with key tag: %" PRIu16 ").", t->id, DNS_RESOURCE_KEY_NAME(rr->key), rr->rrsig.key_tag); 2385 DnsResourceRecord *rrsig; local 2399 DNS_ANSWER_FOREACH(rrsig, t->answer) { 2403 r = dnssec_key_match_rrsig(rr->key, rrsig); 2416 r = dns_name_equal(DNS_RESOURCE_KEY_NAME(dt->key), rrsig->rrsig 2618 DnsResourceRecord *rrsig = NULL; local [all...] |
H A D | resolved-dns-rr.h | 216 } rrsig; member in union:DnsResourceRecord::__anon231
|