tsec.c revision 9eae5f2a7a189353bd4fcbb939c2b61094b3bfe9
/*
* Copyright (C) 2006 Internet Systems Consortium, Inc. ("ISC")
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
* REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
* INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
* LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
* OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* PERFORMANCE OF THIS SOFTWARE.
*/
/* $Id: tsec.c,v 1.3 2009/09/01 03:43:27 jinmei Exp $ */
#include <config.h>
/*%
* DNS Transaction Security object. We assume this is not shared by
* multiple threads, and so the structure does not contain a lock.
*/
struct dns_tsec {
unsigned int magic;
union {
} ukey;
};
dns_tsec_t **tsecp)
{
return (ISC_R_NOMEMORY);
switch (type) {
case dns_tsectype_tsig:
switch (dst_key_alg(key)) {
case DST_ALG_HMACMD5:
break;
case DST_ALG_HMACSHA1:
break;
case DST_ALG_HMACSHA224:
break;
case DST_ALG_HMACSHA256:
break;
case DST_ALG_HMACSHA384:
break;
case DST_ALG_HMACSHA512:
break;
default:
return (DNS_R_BADALG);
}
&tsigkey);
if (result != ISC_R_SUCCESS) {
return (result);
}
break;
case dns_tsectype_sig0:
break;
default:
INSIST(0);
}
return (ISC_R_SUCCESS);
}
void
case dns_tsectype_tsig:
break;
case dns_tsectype_sig0:
break;
default:
INSIST(0);
}
}
}
void
case dns_tsectype_tsig:
break;
case dns_tsectype_sig0:
break;
default:
INSIST(0);
}
}