2000-06-21 22:38:33 +00:00
|
|
|
/*
|
2018-02-23 09:53:12 +01:00
|
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
2000-08-01 01:33:37 +00:00
|
|
|
*
|
2016-06-27 14:56:38 +10:00
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
2018-02-23 09:53:12 +01:00
|
|
|
*
|
|
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
|
|
* information regarding copyright ownership.
|
2000-06-21 22:38:33 +00:00
|
|
|
*/
|
|
|
|
|
1999-07-12 20:08:42 +00:00
|
|
|
#ifndef DST_DST_H
|
|
|
|
#define DST_DST_H 1
|
|
|
|
|
2006-12-22 01:46:19 +00:00
|
|
|
/*! \file dst/dst.h */
|
2005-04-27 04:57:32 +00:00
|
|
|
|
2018-03-28 14:19:37 +02:00
|
|
|
#include <inttypes.h>
|
2018-04-17 08:29:14 -07:00
|
|
|
#include <stdbool.h>
|
2018-03-28 14:19:37 +02:00
|
|
|
|
1999-07-12 20:08:42 +00:00
|
|
|
#include <isc/lang.h>
|
2009-07-19 04:18:05 +00:00
|
|
|
#include <isc/stdtime.h>
|
1999-07-12 20:08:42 +00:00
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
#include <dns/ds.h>
|
|
|
|
#include <dns/dsdigest.h>
|
2012-10-24 12:58:16 -07:00
|
|
|
#include <dns/log.h>
|
2009-10-12 20:48:12 +00:00
|
|
|
#include <dns/name.h>
|
|
|
|
#include <dns/secalg.h>
|
2020-02-12 13:59:18 +01:00
|
|
|
#include <dns/types.h>
|
2000-05-24 23:13:32 +00:00
|
|
|
|
2006-12-04 01:54:53 +00:00
|
|
|
#include <dst/gssapi.h>
|
|
|
|
|
1999-07-12 20:08:42 +00:00
|
|
|
ISC_LANG_BEGINDECLS
|
|
|
|
|
|
|
|
/***
|
|
|
|
*** Types
|
|
|
|
***/
|
|
|
|
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%
|
1999-07-12 20:08:42 +00:00
|
|
|
* The dst_key structure is opaque. Applications should use the accessor
|
|
|
|
* functions provided to retrieve key attributes. If an application needs
|
|
|
|
* to set attributes, new accessor functions will be written.
|
|
|
|
*/
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
typedef struct dst_key dst_key_t;
|
|
|
|
typedef struct dst_context dst_context_t;
|
1999-07-12 20:08:42 +00:00
|
|
|
|
2019-09-12 11:57:55 +02:00
|
|
|
/*%
|
|
|
|
* Key states for the DNSSEC records related to a key: DNSKEY, RRSIG (ksk),
|
|
|
|
* RRSIG (zsk), and DS.
|
|
|
|
*
|
|
|
|
* DST_KEY_STATE_HIDDEN: Records of this type are not published in zone.
|
|
|
|
* This may be because the key parts were never
|
|
|
|
* introduced in the zone, or because the key has
|
|
|
|
* retired and has no records of this type left in
|
|
|
|
* the zone.
|
|
|
|
* DST_KEY_STATE_RUMOURED: Records of this type are published in zone, but
|
|
|
|
* not long enough to ensure all resolvers know
|
|
|
|
* about it.
|
|
|
|
* DST_KEY_STATE_OMNIPRESENT: Records of this type are published in zone long
|
|
|
|
* enough so that all resolvers that know about
|
|
|
|
* these records, no longer have outdated data.
|
|
|
|
* DST_KEY_STATE_UNRETENTIVE: Records of this type have been removed from the
|
|
|
|
* zone, but there may be resolvers that still have
|
|
|
|
* have predecessor records cached. Note that RRSIG
|
|
|
|
* records in this state may actually still be in the
|
|
|
|
* zone because they are reused, but retired RRSIG
|
|
|
|
* records will never be refreshed: A successor key
|
|
|
|
* is used to create signatures.
|
|
|
|
* DST_KEY_STATE_NA: The state is not applicable for this record type.
|
|
|
|
*/
|
|
|
|
typedef enum dst_key_state {
|
|
|
|
DST_KEY_STATE_HIDDEN = 0,
|
|
|
|
DST_KEY_STATE_RUMOURED = 1,
|
|
|
|
DST_KEY_STATE_OMNIPRESENT = 2,
|
|
|
|
DST_KEY_STATE_UNRETENTIVE = 3,
|
|
|
|
DST_KEY_STATE_NA = 4
|
|
|
|
} dst_key_state_t;
|
|
|
|
|
1999-07-12 20:08:42 +00:00
|
|
|
/* DST algorithm codes */
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_ALG_UNKNOWN 0
|
|
|
|
#define DST_ALG_RSA 1 /* Used for parsing RSASHA1, RSASHA256 and RSASHA512 */
|
|
|
|
#define DST_ALG_RSAMD5 1
|
|
|
|
#define DST_ALG_DH 2
|
|
|
|
#define DST_ALG_DSA 3
|
|
|
|
#define DST_ALG_ECC 4
|
|
|
|
#define DST_ALG_RSASHA1 5
|
|
|
|
#define DST_ALG_NSEC3DSA 6
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_ALG_NSEC3RSASHA1 7
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_ALG_RSASHA256 8
|
|
|
|
#define DST_ALG_RSASHA512 10
|
|
|
|
#define DST_ALG_ECCGOST 12
|
|
|
|
#define DST_ALG_ECDSA256 13
|
|
|
|
#define DST_ALG_ECDSA384 14
|
|
|
|
#define DST_ALG_ED25519 15
|
|
|
|
#define DST_ALG_ED448 16
|
|
|
|
#define DST_ALG_HMACMD5 157
|
|
|
|
#define DST_ALG_GSSAPI 160
|
|
|
|
#define DST_ALG_HMACSHA1 161 /* XXXMPA */
|
|
|
|
#define DST_ALG_HMACSHA224 162 /* XXXMPA */
|
|
|
|
#define DST_ALG_HMACSHA256 163 /* XXXMPA */
|
|
|
|
#define DST_ALG_HMACSHA384 164 /* XXXMPA */
|
|
|
|
#define DST_ALG_HMACSHA512 165 /* XXXMPA */
|
|
|
|
#define DST_ALG_INDIRECT 252
|
|
|
|
#define DST_ALG_PRIVATE 254
|
|
|
|
#define DST_MAX_ALGS 256
|
1999-07-12 20:08:42 +00:00
|
|
|
|
2005-04-27 04:57:32 +00:00
|
|
|
/*% A buffer of this size is large enough to hold any key */
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_KEY_MAXSIZE 1280
|
2001-12-18 06:05:41 +00:00
|
|
|
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%
|
2001-12-18 06:05:41 +00:00
|
|
|
* A buffer of this size is large enough to hold the textual representation
|
|
|
|
* of any key
|
|
|
|
*/
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_KEY_MAXTEXTSIZE 2048
|
1999-07-12 20:08:42 +00:00
|
|
|
|
2005-04-27 04:57:32 +00:00
|
|
|
/*% 'Type' for dst_read_key() */
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_TYPE_KEY 0x1000000 /* KEY key */
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_TYPE_PRIVATE 0x2000000
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_TYPE_PUBLIC 0x4000000
|
|
|
|
#define DST_TYPE_STATE 0x8000000
|
1999-07-12 20:08:42 +00:00
|
|
|
|
2009-07-19 04:18:05 +00:00
|
|
|
/* Key timing metadata definitions */
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_TIME_CREATED 0
|
|
|
|
#define DST_TIME_PUBLISH 1
|
|
|
|
#define DST_TIME_ACTIVATE 2
|
|
|
|
#define DST_TIME_REVOKE 3
|
|
|
|
#define DST_TIME_INACTIVE 4
|
|
|
|
#define DST_TIME_DELETE 5
|
|
|
|
#define DST_TIME_DSPUBLISH 6
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_TIME_SYNCPUBLISH 7
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_TIME_SYNCDELETE 8
|
|
|
|
#define DST_TIME_DNSKEY 9
|
|
|
|
#define DST_TIME_ZRRSIG 10
|
|
|
|
#define DST_TIME_KRRSIG 11
|
|
|
|
#define DST_TIME_DS 12
|
|
|
|
#define DST_MAX_TIMES 12
|
2009-10-09 06:09:21 +00:00
|
|
|
|
|
|
|
/* Numeric metadata definitions */
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_NUM_PREDECESSOR 0
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_NUM_SUCCESSOR 1
|
|
|
|
#define DST_NUM_MAXTTL 2
|
|
|
|
#define DST_NUM_ROLLPERIOD 3
|
|
|
|
#define DST_NUM_LIFETIME 4
|
|
|
|
#define DST_MAX_NUMERIC 4
|
2019-09-11 16:29:33 +02:00
|
|
|
|
|
|
|
/* Boolean metadata definitions */
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_BOOL_KSK 0
|
|
|
|
#define DST_BOOL_ZSK 1
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_MAX_BOOLEAN 1
|
2009-07-19 04:18:05 +00:00
|
|
|
|
2019-09-12 11:57:55 +02:00
|
|
|
/* Key state metadata definitions */
|
2020-02-13 14:44:37 -08:00
|
|
|
#define DST_KEY_DNSKEY 0
|
|
|
|
#define DST_KEY_ZRRSIG 1
|
|
|
|
#define DST_KEY_KRRSIG 2
|
|
|
|
#define DST_KEY_DS 3
|
|
|
|
#define DST_KEY_GOAL 4
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_MAX_KEYSTATES 4
|
2019-09-12 11:57:55 +02:00
|
|
|
|
2009-10-26 21:18:24 +00:00
|
|
|
/*
|
|
|
|
* Current format version number of the private key parser.
|
|
|
|
*
|
|
|
|
* When parsing a key file with the same major number but a higher minor
|
|
|
|
* number, the key parser will ignore any fields it does not recognize.
|
|
|
|
* Thus, DST_MINOR_VERSION should be incremented whenever new
|
|
|
|
* fields are added to the private key file (such as new metadata).
|
|
|
|
*
|
|
|
|
* When rewriting these keys, those fields will be dropped, and the
|
|
|
|
* format version set back to the current one..
|
|
|
|
*
|
|
|
|
* When a key is seen with a higher major number, the key parser will
|
|
|
|
* reject it as invalid. Thus, DST_MAJOR_VERSION should be incremented
|
|
|
|
* and DST_MINOR_VERSION set to zero whenever there is a format change
|
|
|
|
* which is not backward compatible to previous versions of the dst_key
|
|
|
|
* parser, such as change in the syntax of an existing field, the removal
|
|
|
|
* of a currently mandatory field, or a new field added which would
|
|
|
|
* alter the functioning of the key if it were absent.
|
|
|
|
*/
|
2020-02-12 13:59:18 +01:00
|
|
|
#define DST_MAJOR_VERSION 1
|
|
|
|
#define DST_MINOR_VERSION 3
|
2009-10-26 21:18:24 +00:00
|
|
|
|
1999-07-12 20:08:42 +00:00
|
|
|
/***
|
|
|
|
*** Functions
|
|
|
|
***/
|
2009-10-05 17:30:49 +00:00
|
|
|
isc_result_t
|
2018-04-22 14:56:28 +02:00
|
|
|
dst_lib_init(isc_mem_t *mctx, const char *engine);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-09 22:32:20 +00:00
|
|
|
* Initializes the DST subsystem.
|
2000-06-06 21:58:16 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "mctx" is a valid memory context
|
2000-06-06 21:58:16 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li ISC_R_NOMEMORY
|
2009-10-05 17:30:49 +00:00
|
|
|
* \li DST_R_NOENGINE
|
2000-06-06 21:58:16 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li DST is properly initialized.
|
2000-06-06 21:58:16 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_lib_destroy(void);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-06 21:58:16 +00:00
|
|
|
* Releases all resources allocated by DST.
|
|
|
|
*/
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2001-05-21 22:10:23 +00:00
|
|
|
dst_algorithm_supported(unsigned int alg);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Checks that a given algorithm is supported by DST.
|
|
|
|
*
|
|
|
|
* Returns:
|
2018-04-17 08:29:14 -07:00
|
|
|
* \li true
|
|
|
|
* \li false
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2012-10-03 12:38:43 +10:00
|
|
|
dst_ds_digest_supported(unsigned int digest_type);
|
|
|
|
/*%<
|
|
|
|
* Checks that a given digest algorithm is supported by DST.
|
|
|
|
*
|
|
|
|
* Returns:
|
2018-04-17 08:29:14 -07:00
|
|
|
* \li true
|
|
|
|
* \li false
|
2012-10-03 12:38:43 +10:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
dst_context_create(dst_key_t *key, isc_mem_t *mctx, isc_logcategory_t *category,
|
|
|
|
bool useforsigning, int maxbits, dst_context_t **dctxp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-07 17:22:31 +00:00
|
|
|
* Creates a context to be used for a sign or verify operation.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "key" is a valid key.
|
|
|
|
* \li "mctx" is a valid memory context.
|
|
|
|
* \li dctxp != NULL && *dctxp == NULL
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li ISC_R_NOMEMORY
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li *dctxp will contain a usable context.
|
2000-06-02 18:57:51 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_context_destroy(dst_context_t **dctxp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Destroys all memory associated with a context.
|
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li *dctxp != NULL && *dctxp == NULL
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li *dctxp == NULL
|
2000-06-02 18:57:51 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dst_context_adddata(dst_context_t *dctx, const isc_region_t *data);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-07 17:22:31 +00:00
|
|
|
* Incrementally adds data to the context to be used in a sign or verify
|
|
|
|
* operation.
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "dctx" is a valid context
|
|
|
|
* \li "data" is a valid region
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li DST_R_SIGNFAILURE
|
|
|
|
* \li all other errors indicate failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dst_context_sign(dst_context_t *dctx, isc_buffer_t *sig);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Computes a signature using the data and key stored in the context.
|
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "dctx" is a valid context.
|
|
|
|
* \li "sig" is a valid buffer.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li DST_R_VERIFYFAILURE
|
|
|
|
* \li all other errors indicate failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "sig" will contain the signature
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2000-06-02 18:57:51 +00:00
|
|
|
dst_context_verify(dst_context_t *dctx, isc_region_t *sig);
|
2012-06-14 15:44:20 +10:00
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dst_context_verify2(dst_context_t *dctx, unsigned int maxbits,
|
|
|
|
isc_region_t *sig);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Verifies the signature using the data and key stored in the context.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2012-06-14 15:44:20 +10:00
|
|
|
* 'maxbits' specifies the maximum number of bits permitted in the RSA
|
|
|
|
* exponent.
|
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "dctx" is a valid context.
|
|
|
|
* \li "sig" is a valid region.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li all other errors indicate failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "sig" will contain the signature
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2000-05-17 22:48:10 +00:00
|
|
|
dst_key_computesecret(const dst_key_t *pub, const dst_key_t *priv,
|
|
|
|
isc_buffer_t *secret);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Computes a shared secret from two (Diffie-Hellman) keys.
|
1999-09-27 16:55:45 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "pub" is a valid key that can be used to derive a shared secret
|
|
|
|
* \li "priv" is a valid private key that can be used to derive a shared secret
|
|
|
|
* \li "secret" is a valid buffer
|
1999-09-27 16:55:45 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-09-27 16:55:45 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li If successful, secret will contain the derived shared secret.
|
1999-09-27 16:55:45 +00:00
|
|
|
*/
|
|
|
|
|
2014-06-10 19:18:34 +05:30
|
|
|
isc_result_t
|
|
|
|
dst_key_getfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg,
|
2020-02-12 13:59:18 +01:00
|
|
|
int type, const char *directory, isc_mem_t *mctx,
|
|
|
|
isc_buffer_t *buf);
|
2014-06-10 19:18:34 +05:30
|
|
|
/*%<
|
|
|
|
* Generates a key filename for the name, algorithm, and
|
|
|
|
* id, and places it in the buffer 'buf'. If directory is NULL, the
|
|
|
|
* current directory is assumed.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* \li "name" is a valid absolute dns name.
|
|
|
|
* \li "id" is a valid key tag identifier.
|
|
|
|
* \li "alg" is a supported key algorithm.
|
|
|
|
* \li "type" is DST_TYPE_PUBLIC, DST_TYPE_PRIVATE, or the bitwise union.
|
|
|
|
* DST_TYPE_KEY look for a KEY record otherwise DNSKEY
|
|
|
|
* \li "mctx" is a valid memory context.
|
|
|
|
* \li "buf" is not NULL.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2001-05-21 22:10:23 +00:00
|
|
|
dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type,
|
2000-06-06 21:58:16 +00:00
|
|
|
const char *directory, isc_mem_t *mctx, dst_key_t **keyp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Reads a key from permanent storage. The key can either be a public or
|
2019-09-12 11:45:10 +02:00
|
|
|
* private key, or a key state. It specified by name, algorithm, and id. If
|
|
|
|
* a private key or key state is specified, the public key must also be
|
|
|
|
* present. If directory is NULL, the current directory is assumed.
|
2000-05-22 23:34:24 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "name" is a valid absolute dns name.
|
|
|
|
* \li "id" is a valid key tag identifier.
|
|
|
|
* \li "alg" is a supported key algorithm.
|
2019-09-12 11:45:10 +02:00
|
|
|
* \li "type" is DST_TYPE_PUBLIC, DST_TYPE_PRIVATE or the bitwise union.
|
|
|
|
* DST_TYPE_KEY look for a KEY record otherwise DNSKEY.
|
|
|
|
* DST_TYPE_STATE to also read the key state.
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "mctx" is a valid memory context.
|
|
|
|
* \li "keyp" is not NULL and "*keyp" is NULL.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li If successful, *keyp will contain a valid key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
dst_key_fromnamedfile(const char *filename, const char *dirname, int type,
|
|
|
|
isc_mem_t *mctx, dst_key_t **keyp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-06 21:58:16 +00:00
|
|
|
* Reads a key from permanent storage. The key can either be a public or
|
2019-09-12 11:45:10 +02:00
|
|
|
* private key, or a key stae. It is specified by filename. If a private key
|
|
|
|
* or key state is specified, the public key must also be present.
|
2000-06-06 21:58:16 +00:00
|
|
|
*
|
2009-07-19 04:18:05 +00:00
|
|
|
* If 'dirname' is not NULL, and 'filename' is a relative path,
|
|
|
|
* then the file is looked up relative to the given directory.
|
|
|
|
* If 'filename' is an absolute path, 'dirname' is ignored.
|
|
|
|
*
|
2000-06-06 21:58:16 +00:00
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "filename" is not NULL
|
2019-09-12 11:45:10 +02:00
|
|
|
* \li "type" is DST_TYPE_PUBLIC, DST_TYPE_PRIVATE, or the bitwise union.
|
|
|
|
* DST_TYPE_KEY look for a KEY record otherwise DNSKEY.
|
|
|
|
* DST_TYPE_STATE to also read the key state.
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "mctx" is a valid memory context
|
|
|
|
* \li "keyp" is not NULL and "*keyp" is NULL.
|
2000-06-06 21:58:16 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-06 21:58:16 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li If successful, *keyp will contain a valid key.
|
2000-06-06 21:58:16 +00:00
|
|
|
*/
|
|
|
|
|
2004-10-14 05:55:52 +00:00
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
dst_key_read_public(const char *filename, int type, isc_mem_t *mctx,
|
|
|
|
dst_key_t **keyp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2004-10-14 05:55:52 +00:00
|
|
|
* Reads a public key from permanent storage. The key must be a public key.
|
|
|
|
*
|
|
|
|
* Requires:
|
2019-09-12 11:45:10 +02:00
|
|
|
* \li "filename" is not NULL.
|
|
|
|
* \li "type" is DST_TYPE_KEY look for a KEY record otherwise DNSKEY.
|
|
|
|
* \li "mctx" is a valid memory context.
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "keyp" is not NULL and "*keyp" is NULL.
|
2004-10-14 05:55:52 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li DST_R_BADKEYTYPE if the key type is not the expected one
|
|
|
|
* \li ISC_R_UNEXPECTEDTOKEN if the file can not be parsed as a public key
|
|
|
|
* \li any other result indicates failure
|
2004-10-14 05:55:52 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li If successful, *keyp will contain a valid key.
|
2004-10-14 05:55:52 +00:00
|
|
|
*/
|
|
|
|
|
2019-09-12 11:45:10 +02:00
|
|
|
isc_result_t
|
2019-09-12 11:57:55 +02:00
|
|
|
dst_key_read_state(const char *filename, isc_mem_t *mctx, dst_key_t **keyp);
|
2019-09-12 11:45:10 +02:00
|
|
|
/*%<
|
|
|
|
* Reads a key state from permanent storage.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* \li "filename" is not NULL.
|
|
|
|
* \li "mctx" is a valid memory context.
|
|
|
|
* \li "keyp" is not NULL and "*keyp" is NULL.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li ISC_R_UNEXPECTEDTOKEN if the file can not be parsed as a public key
|
|
|
|
* \li any other result indicates failure
|
|
|
|
*/
|
|
|
|
|
2000-06-06 21:58:16 +00:00
|
|
|
isc_result_t
|
2001-05-21 22:10:23 +00:00
|
|
|
dst_key_tofile(const dst_key_t *key, int type, const char *directory);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Writes a key to permanent storage. The key can either be a public or
|
|
|
|
* private key. Public keys are written in DNS format and private keys
|
2000-06-06 21:58:16 +00:00
|
|
|
* are written as a set of base64 encoded values. If directory is NULL,
|
|
|
|
* the current directory is assumed.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "key" is a valid key.
|
|
|
|
* \li "type" is DST_TYPE_PUBLIC, DST_TYPE_PRIVATE, or the bitwise union
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2016-12-30 15:45:08 +11:00
|
|
|
dst_key_fromdns(const dns_name_t *name, dns_rdataclass_t rdclass,
|
2000-09-12 09:54:36 +00:00
|
|
|
isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Converts a DNS KEY record into a DST key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "name" is a valid absolute dns name.
|
|
|
|
* \li "source" is a valid buffer. There must be at least 4 bytes available.
|
|
|
|
* \li "mctx" is a valid memory context.
|
|
|
|
* \li "keyp" is not NULL and "*keyp" is NULL.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li If successful, *keyp will contain a valid key, and the consumed
|
1999-07-12 20:08:42 +00:00
|
|
|
* pointer in data will be advanced.
|
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
|
|
|
dst_key_todns(const dst_key_t *key, isc_buffer_t *target);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Converts a DST key into a DNS KEY record.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li "key" is a valid key.
|
|
|
|
* \li "target" is a valid buffer. There must be at least 4 bytes unused.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \li If successful, the used pointer in 'target' is advanced by at least 4.
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
dst_key_frombuffer(const dns_name_t *name, unsigned int alg, unsigned int flags,
|
|
|
|
unsigned int protocol, dns_rdataclass_t rdclass,
|
2000-06-02 18:57:51 +00:00
|
|
|
isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Converts a buffer containing DNS KEY RDATA into a DST key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "name" is a valid absolute dns name.
|
|
|
|
*\li "alg" is a supported key algorithm.
|
|
|
|
*\li "source" is a valid buffer.
|
|
|
|
*\li "mctx" is a valid memory context.
|
|
|
|
*\li "keyp" is not NULL and "*keyp" is NULL.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li If successful, *keyp will contain a valid key, and the consumed
|
1999-07-12 20:08:42 +00:00
|
|
|
* pointer in source will be advanced.
|
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
|
|
|
dst_key_tobuffer(const dst_key_t *key, isc_buffer_t *target);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Converts a DST key into DNS KEY RDATA format.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key" is a valid key.
|
|
|
|
*\li "target" is a valid buffer.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li If successful, the used pointer in 'target' is advanced.
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2002-02-27 22:12:06 +00:00
|
|
|
isc_result_t
|
|
|
|
dst_key_privatefrombuffer(dst_key_t *key, isc_buffer_t *buffer);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2002-02-27 22:12:06 +00:00
|
|
|
* Converts a public key into a private key, reading the private key
|
|
|
|
* information from the buffer. The buffer should contain the same data
|
|
|
|
* as the .private key file would.
|
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key" is a valid public key.
|
|
|
|
*\li "buffer" is not NULL.
|
2002-02-27 22:12:06 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2002-02-27 22:12:06 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li If successful, key will contain a valid private key.
|
2002-02-27 22:12:06 +00:00
|
|
|
*/
|
|
|
|
|
2006-12-04 01:54:53 +00:00
|
|
|
gss_ctx_id_t
|
|
|
|
dst_key_getgssctx(const dst_key_t *key);
|
|
|
|
/*%<
|
|
|
|
* Returns the opaque key data.
|
|
|
|
* Be cautions when using this value unless you know what you are doing.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
*\li "key" is not NULL.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
*\li gssctx key data, possibly NULL.
|
|
|
|
*/
|
2002-02-27 22:12:06 +00:00
|
|
|
|
2000-08-17 02:04:22 +00:00
|
|
|
isc_result_t
|
2016-12-30 15:45:08 +11:00
|
|
|
dst_key_fromgssapi(const dns_name_t *name, gss_ctx_id_t gssctx, isc_mem_t *mctx,
|
2010-12-18 01:56:23 +00:00
|
|
|
dst_key_t **keyp, isc_region_t *intoken);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-08-17 02:04:22 +00:00
|
|
|
* Converts a GSSAPI opaque context id into a DST key.
|
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "name" is a valid absolute dns name.
|
2006-12-04 01:54:53 +00:00
|
|
|
*\li "gssctx" is a GSSAPI context id.
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "mctx" is a valid memory context.
|
|
|
|
*\li "keyp" is not NULL and "*keyp" is NULL.
|
2000-08-17 02:04:22 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-08-17 02:04:22 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li If successful, *keyp will contain a valid key and be responsible for
|
2000-08-17 02:04:22 +00:00
|
|
|
* the context id.
|
|
|
|
*/
|
|
|
|
|
2012-06-14 15:44:20 +10:00
|
|
|
#ifdef DST_KEY_INTERNAL
|
|
|
|
isc_result_t
|
2016-12-30 15:45:08 +11:00
|
|
|
dst_key_buildinternal(const dns_name_t *name, unsigned int alg,
|
2012-06-14 15:44:20 +10:00
|
|
|
unsigned int bits, unsigned int flags,
|
|
|
|
unsigned int protocol, dns_rdataclass_t rdclass,
|
|
|
|
void *data, isc_mem_t *mctx, dst_key_t **keyp);
|
2020-02-13 21:48:23 +01:00
|
|
|
#endif /* ifdef DST_KEY_INTERNAL */
|
2012-06-14 15:44:20 +10:00
|
|
|
|
2008-03-31 14:42:51 +00:00
|
|
|
isc_result_t
|
2016-12-30 15:45:08 +11:00
|
|
|
dst_key_fromlabel(const dns_name_t *name, int alg, unsigned int flags,
|
2008-04-01 23:47:10 +00:00
|
|
|
unsigned int protocol, dns_rdataclass_t rdclass,
|
|
|
|
const char *engine, const char *label, const char *pin,
|
|
|
|
isc_mem_t *mctx, dst_key_t **keyp);
|
2008-03-31 14:42:51 +00:00
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
dst_key_generate(const dns_name_t *name, unsigned int alg, unsigned int bits,
|
|
|
|
unsigned int param, unsigned int flags, unsigned int protocol,
|
|
|
|
dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp,
|
2018-04-04 09:44:50 +02:00
|
|
|
void (*callback)(int));
|
2012-06-14 15:44:20 +10:00
|
|
|
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Generate a DST key (or keypair) with the supplied parameters. The
|
|
|
|
* interpretation of the "param" field depends on the algorithm:
|
2005-04-27 04:57:32 +00:00
|
|
|
* \code
|
2000-06-02 18:57:51 +00:00
|
|
|
* RSA: exponent
|
|
|
|
* 0 use exponent 3
|
|
|
|
* !0 use Fermat4 (2^16 + 1)
|
|
|
|
* DH: generator
|
|
|
|
* 0 default - use well known prime if bits == 768 or 1024,
|
|
|
|
* otherwise use 2 as the generator.
|
|
|
|
* !0 use this value as the generator.
|
|
|
|
* DSA: unused
|
2001-05-31 18:34:51 +00:00
|
|
|
* HMACMD5: entropy
|
|
|
|
* 0 default - require good entropy
|
|
|
|
* !0 lack of good entropy is ok
|
2005-04-27 04:57:32 +00:00
|
|
|
*\endcode
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "name" is a valid absolute dns name.
|
|
|
|
*\li "keyp" is not NULL and "*keyp" is NULL.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
2000-06-02 18:57:51 +00:00
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li ISC_R_SUCCESS
|
|
|
|
* \li any other result indicates failure
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
1999-07-12 20:08:42 +00:00
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li If successful, *keyp will contain a valid key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2000-05-02 03:54:17 +00:00
|
|
|
dst_key_compare(const dst_key_t *key1, const dst_key_t *key2);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2009-09-23 16:01:57 +00:00
|
|
|
* Compares two DST keys. Returns true if they match, false otherwise.
|
|
|
|
*
|
|
|
|
* Keys ARE NOT considered to match if one of them is the revoked version
|
|
|
|
* of the other.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key1" is a valid key.
|
|
|
|
*\li "key2" is a valid key.
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2018-04-17 08:29:14 -07:00
|
|
|
*\li true
|
|
|
|
* \li false
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2009-09-23 16:01:57 +00:00
|
|
|
dst_key_pubcompare(const dst_key_t *key1, const dst_key_t *key2,
|
2018-04-17 08:29:14 -07:00
|
|
|
bool match_revoked_key);
|
2009-09-23 16:01:57 +00:00
|
|
|
/*%<
|
|
|
|
* Compares only the public portions of two DST keys. Returns true
|
|
|
|
* if they match, false otherwise. This allows us, for example, to
|
|
|
|
* determine whether a public key found in a zone matches up with a
|
|
|
|
* key pair found on disk.
|
|
|
|
*
|
|
|
|
* If match_revoked_key is TRUE, then keys ARE considered to match if one
|
|
|
|
* of them is the revoked version of the other. Otherwise, they are not.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
*\li "key1" is a valid key.
|
|
|
|
*\li "key2" is a valid key.
|
|
|
|
*
|
|
|
|
* Returns:
|
2018-04-17 08:29:14 -07:00
|
|
|
*\li true
|
|
|
|
* \li false
|
2009-09-23 16:01:57 +00:00
|
|
|
*/
|
2009-10-12 20:48:12 +00:00
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2000-05-02 03:54:17 +00:00
|
|
|
dst_key_paramcompare(const dst_key_t *key1, const dst_key_t *key2);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-06-02 18:57:51 +00:00
|
|
|
* Compares the parameters of two DST keys. This is used to determine if
|
|
|
|
* two (Diffie-Hellman) keys can be used to derive a shared secret.
|
1999-09-27 16:55:45 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key1" is a valid key.
|
|
|
|
*\li "key2" is a valid key.
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2018-04-17 08:29:14 -07:00
|
|
|
*\li true
|
|
|
|
* \li false
|
1999-09-27 16:55:45 +00:00
|
|
|
*/
|
|
|
|
|
2010-12-09 00:54:34 +00:00
|
|
|
void
|
|
|
|
dst_key_attach(dst_key_t *source, dst_key_t **target);
|
|
|
|
/*
|
|
|
|
* Attach to a existing key increasing the reference count.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
*\li 'source' to be a valid key.
|
|
|
|
*\li 'target' to be non-NULL and '*target' to be NULL.
|
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
void
|
2000-05-19 00:20:59 +00:00
|
|
|
dst_key_free(dst_key_t **keyp);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2009-06-10 00:27:22 +00:00
|
|
|
* Decrement the key's reference counter and, when it reaches zero,
|
|
|
|
* release all memory associated with the key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "keyp" is not NULL and "*keyp" is a valid key.
|
2009-06-10 00:27:22 +00:00
|
|
|
*\li reference counter greater than zero.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li All memory associated with "*keyp" will be freed.
|
|
|
|
*\li *keyp == NULL
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Accessor functions to obtain key fields.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Require:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key" is a valid key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
2000-05-24 23:13:32 +00:00
|
|
|
dns_name_t *
|
1999-07-12 20:08:42 +00:00
|
|
|
dst_key_name(const dst_key_t *key);
|
|
|
|
|
2000-06-02 18:57:51 +00:00
|
|
|
unsigned int
|
1999-07-12 20:08:42 +00:00
|
|
|
dst_key_size(const dst_key_t *key);
|
|
|
|
|
2000-06-02 18:57:51 +00:00
|
|
|
unsigned int
|
1999-07-12 20:08:42 +00:00
|
|
|
dst_key_proto(const dst_key_t *key);
|
|
|
|
|
2000-06-02 18:57:51 +00:00
|
|
|
unsigned int
|
1999-07-12 20:08:42 +00:00
|
|
|
dst_key_alg(const dst_key_t *key);
|
|
|
|
|
2018-03-28 14:19:37 +02:00
|
|
|
uint32_t
|
1999-07-12 20:08:42 +00:00
|
|
|
dst_key_flags(const dst_key_t *key);
|
|
|
|
|
2001-01-24 02:23:02 +00:00
|
|
|
dns_keytag_t
|
1999-07-12 20:08:42 +00:00
|
|
|
dst_key_id(const dst_key_t *key);
|
|
|
|
|
2011-10-20 21:20:02 +00:00
|
|
|
dns_keytag_t
|
|
|
|
dst_key_rid(const dst_key_t *key);
|
|
|
|
|
2000-09-12 09:54:36 +00:00
|
|
|
dns_rdataclass_t
|
|
|
|
dst_key_class(const dst_key_t *key);
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
1999-09-23 20:54:38 +00:00
|
|
|
dst_key_isprivate(const dst_key_t *key);
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2000-03-16 22:43:54 +00:00
|
|
|
dst_key_iszonekey(const dst_key_t *key);
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2000-04-18 17:39:37 +00:00
|
|
|
dst_key_isnullkey(const dst_key_t *key);
|
|
|
|
|
2000-05-15 21:02:39 +00:00
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
dst_key_buildfilename(const dst_key_t *key, int type, const char *directory,
|
|
|
|
isc_buffer_t *out);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-15 21:02:39 +00:00
|
|
|
* Generates the filename used by dst to store the specified key.
|
2000-06-06 21:58:16 +00:00
|
|
|
* If directory is NULL, the current directory is assumed.
|
2000-05-15 21:02:39 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key" is a valid key
|
|
|
|
*\li "type" is either DST_TYPE_PUBLIC, DST_TYPE_PRIVATE, or 0 for no suffix.
|
|
|
|
*\li "out" is a valid buffer
|
2000-05-15 21:02:39 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li the file name will be written to "out", and the used pointer will
|
2000-05-15 21:02:39 +00:00
|
|
|
* be advanced.
|
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2000-05-17 22:48:10 +00:00
|
|
|
dst_key_sigsize(const dst_key_t *key, unsigned int *n);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Computes the size of a signature generated by the given key.
|
1999-07-12 20:08:42 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key" is a valid key.
|
|
|
|
*\li "n" is not NULL
|
1999-10-05 15:08:52 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li #ISC_R_SUCCESS
|
|
|
|
*\li DST_R_UNSUPPORTEDALG
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "n" stores the size of a generated signature
|
1999-07-12 20:08:42 +00:00
|
|
|
*/
|
|
|
|
|
2000-05-02 03:54:17 +00:00
|
|
|
isc_result_t
|
2000-05-17 22:48:10 +00:00
|
|
|
dst_key_secretsize(const dst_key_t *key, unsigned int *n);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2000-05-02 03:54:17 +00:00
|
|
|
* Computes the size of a shared secret generated by the given key.
|
1999-10-05 15:08:52 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "key" is a valid key.
|
|
|
|
*\li "n" is not NULL
|
1999-10-05 15:08:52 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li #ISC_R_SUCCESS
|
|
|
|
*\li DST_R_UNSUPPORTEDALG
|
2000-06-02 18:57:51 +00:00
|
|
|
*
|
|
|
|
* Ensures:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "n" stores the size of a generated shared secret
|
1999-10-05 15:08:52 +00:00
|
|
|
*/
|
|
|
|
|
2018-03-28 14:19:37 +02:00
|
|
|
uint16_t
|
2018-10-25 10:27:49 +02:00
|
|
|
dst_region_computeid(const isc_region_t *source);
|
2018-03-28 14:19:37 +02:00
|
|
|
uint16_t
|
2018-10-25 10:27:49 +02:00
|
|
|
dst_region_computerid(const isc_region_t *source);
|
2005-04-27 04:57:32 +00:00
|
|
|
/*%<
|
2011-10-20 21:20:02 +00:00
|
|
|
* Computes the (revoked) key id of the key stored in the provided
|
2018-10-25 10:27:49 +02:00
|
|
|
* region.
|
2000-07-31 19:44:21 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li "source" contains a valid, non-NULL region.
|
2000-07-31 19:44:21 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2005-04-27 04:57:32 +00:00
|
|
|
*\li the key id
|
2000-07-31 19:44:21 +00:00
|
|
|
*/
|
|
|
|
|
2018-03-28 14:19:37 +02:00
|
|
|
uint16_t
|
2006-01-27 02:35:15 +00:00
|
|
|
dst_key_getbits(const dst_key_t *key);
|
2009-07-19 04:18:05 +00:00
|
|
|
/*%<
|
2006-01-27 02:35:15 +00:00
|
|
|
* Get the number of digest bits required (0 == MAX).
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
2018-03-28 14:19:37 +02:00
|
|
|
dst_key_setbits(dst_key_t *key, uint16_t bits);
|
2009-07-19 04:18:05 +00:00
|
|
|
/*%<
|
2006-01-27 02:35:15 +00:00
|
|
|
* Set the number of digest bits required (0 == MAX).
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
*/
|
|
|
|
|
2011-03-17 01:40:40 +00:00
|
|
|
void
|
|
|
|
dst_key_setttl(dst_key_t *key, dns_ttl_t ttl);
|
|
|
|
/*%<
|
|
|
|
* Set the default TTL to use when converting the key
|
|
|
|
* to a KEY or DNSKEY RR.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
*/
|
|
|
|
|
|
|
|
dns_ttl_t
|
|
|
|
dst_key_getttl(const dst_key_t *key);
|
|
|
|
/*%<
|
|
|
|
* Get the default TTL to use when converting the key
|
|
|
|
* to a KEY or DNSKEY RR.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
*/
|
|
|
|
|
2009-06-30 02:53:46 +00:00
|
|
|
isc_result_t
|
2018-03-28 14:19:37 +02:00
|
|
|
dst_key_setflags(dst_key_t *key, uint32_t flags);
|
2009-06-30 02:53:46 +00:00
|
|
|
/*
|
|
|
|
* Set the key flags, and recompute the key ID.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
*/
|
|
|
|
|
2019-09-11 16:29:33 +02:00
|
|
|
isc_result_t
|
|
|
|
dst_key_getbool(const dst_key_t *key, int type, bool *valuep);
|
|
|
|
/*%<
|
|
|
|
* Get a member of the boolean metadata array and place it in '*valuep'.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_BOOLEAN
|
|
|
|
* "valuep" is not null.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_setbool(dst_key_t *key, int type, bool value);
|
|
|
|
/*%<
|
|
|
|
* Set a member of the boolean metadata array.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_BOOLEAN
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_unsetbool(dst_key_t *key, int type);
|
|
|
|
/*%<
|
|
|
|
* Flag a member of the boolean metadata array as "not set".
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_BOOLEAN
|
|
|
|
*/
|
|
|
|
|
2009-10-09 06:09:21 +00:00
|
|
|
isc_result_t
|
2018-03-28 14:19:37 +02:00
|
|
|
dst_key_getnum(const dst_key_t *key, int type, uint32_t *valuep);
|
2009-10-09 06:09:21 +00:00
|
|
|
/*%<
|
|
|
|
* Get a member of the numeric metadata array and place it in '*valuep'.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_NUMERIC
|
2019-09-11 16:31:41 +02:00
|
|
|
* "valuep" is not null.
|
2009-10-09 06:09:21 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
2018-03-28 14:19:37 +02:00
|
|
|
dst_key_setnum(dst_key_t *key, int type, uint32_t value);
|
2009-10-09 06:09:21 +00:00
|
|
|
/*%<
|
|
|
|
* Set a member of the numeric metadata array.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_NUMERIC
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_unsetnum(dst_key_t *key, int type);
|
|
|
|
/*%<
|
|
|
|
* Flag a member of the numeric metadata array as "not set".
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_NUMERIC
|
|
|
|
*/
|
|
|
|
|
2009-07-19 04:18:05 +00:00
|
|
|
isc_result_t
|
|
|
|
dst_key_gettime(const dst_key_t *key, int type, isc_stdtime_t *timep);
|
|
|
|
/*%<
|
|
|
|
* Get a member of the timing metadata array and place it in '*timep'.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_TIMES
|
|
|
|
* "timep" is not null.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_settime(dst_key_t *key, int type, isc_stdtime_t when);
|
|
|
|
/*%<
|
|
|
|
* Set a member of the timing metadata array.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_TIMES
|
|
|
|
*/
|
|
|
|
|
2009-09-02 06:29:01 +00:00
|
|
|
void
|
|
|
|
dst_key_unsettime(dst_key_t *key, int type);
|
|
|
|
/*%<
|
|
|
|
* Flag a member of the timing metadata array as "not set".
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_TIMES
|
|
|
|
*/
|
|
|
|
|
2019-09-12 11:57:55 +02:00
|
|
|
isc_result_t
|
|
|
|
dst_key_getstate(const dst_key_t *key, int type, dst_key_state_t *statep);
|
|
|
|
/*%<
|
|
|
|
* Get a member of the keystate metadata array and place it in '*statep'.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_KEYSTATES
|
|
|
|
* "statep" is not null.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_setstate(dst_key_t *key, int type, dst_key_state_t state);
|
|
|
|
/*%<
|
|
|
|
* Set a member of the keystate metadata array.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "state" is a valid state.
|
|
|
|
* "type" is no larger than DST_MAX_KEYSTATES
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_unsetstate(dst_key_t *key, int type);
|
|
|
|
/*%<
|
|
|
|
* Flag a member of the keystate metadata array as "not set".
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "type" is no larger than DST_MAX_KEYSTATES
|
|
|
|
*/
|
|
|
|
|
2009-09-02 06:29:01 +00:00
|
|
|
isc_result_t
|
|
|
|
dst_key_getprivateformat(const dst_key_t *key, int *majorp, int *minorp);
|
|
|
|
/*%<
|
|
|
|
* Get the private key format version number. (If the key does not have
|
|
|
|
* a private key associated with it, the version will be 0.0.) The major
|
|
|
|
* version number is placed in '*majorp', and the minor version number in
|
|
|
|
* '*minorp'.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
* "majorp" is not NULL.
|
|
|
|
* "minorp" is not NULL.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
dst_key_setprivateformat(dst_key_t *key, int major, int minor);
|
|
|
|
/*%<
|
|
|
|
* Set the private key format version number.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
|
|
|
*/
|
|
|
|
|
2009-10-12 20:48:12 +00:00
|
|
|
#define DST_KEY_FORMATSIZE (DNS_NAME_FORMATSIZE + DNS_SECALG_FORMATSIZE + 7)
|
|
|
|
|
|
|
|
void
|
2010-12-18 01:56:23 +00:00
|
|
|
dst_key_format(const dst_key_t *key, char *cp, unsigned int size);
|
2009-10-12 20:48:12 +00:00
|
|
|
/*%<
|
|
|
|
* Write the uniquely identifying information about the key (name,
|
|
|
|
* algorithm, key ID) into a string 'cp' of size 'size'.
|
|
|
|
*/
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
isc_buffer_t *
|
|
|
|
dst_key_tkeytoken(const dst_key_t *key);
|
|
|
|
/*%<
|
|
|
|
* Return the token from the TKEY request, if any. If this key was
|
|
|
|
* not negotiated via TKEY, return NULL.
|
2011-03-21 19:54:03 +00:00
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* "key" is a valid key.
|
2010-12-18 01:56:23 +00:00
|
|
|
*/
|
|
|
|
|
2011-01-10 05:32:04 +00:00
|
|
|
isc_result_t
|
|
|
|
dst_key_dump(dst_key_t *key, isc_mem_t *mctx, char **buffer, int *length);
|
|
|
|
/*%<
|
|
|
|
* Allocate 'buffer' and dump the key into it in base64 format. The buffer
|
|
|
|
* is not NUL terminated. The length of the buffer is returned in *length.
|
|
|
|
*
|
|
|
|
* 'buffer' needs to be freed using isc_mem_put(mctx, buffer, length);
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'buffer' to be non NULL and *buffer to be NULL.
|
|
|
|
* 'length' to be non NULL and *length to be zero.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* ISC_R_SUCCESS
|
|
|
|
* ISC_R_NOMEMORY
|
|
|
|
* ISC_R_NOTIMPLEMENTED
|
|
|
|
* others.
|
|
|
|
*/
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dst_key_restore(dns_name_t *name, unsigned int alg, unsigned int flags,
|
2011-01-11 23:47:14 +00:00
|
|
|
unsigned int protocol, dns_rdataclass_t rdclass,
|
|
|
|
isc_mem_t *mctx, const char *keystr, dst_key_t **keyp);
|
2011-01-10 05:32:04 +00:00
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2013-08-15 10:48:05 +10:00
|
|
|
dst_key_inactive(const dst_key_t *key);
|
|
|
|
/*%<
|
|
|
|
* Determines if the private key is missing due the key being deemed inactive.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
2018-04-17 08:29:14 -07:00
|
|
|
dst_key_setinactive(dst_key_t *key, bool inactive);
|
2013-08-15 10:48:05 +10:00
|
|
|
/*%<
|
|
|
|
* Set key inactive state.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
2011-01-10 05:32:04 +00:00
|
|
|
|
2013-09-04 13:53:02 +10:00
|
|
|
void
|
2018-04-17 08:29:14 -07:00
|
|
|
dst_key_setexternal(dst_key_t *key, bool value);
|
2019-10-17 10:21:12 +02:00
|
|
|
/*%<
|
|
|
|
* Set key external state.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
2013-09-04 13:53:02 +10:00
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
bool
|
2013-09-04 13:53:02 +10:00
|
|
|
dst_key_isexternal(dst_key_t *key);
|
2019-10-17 10:21:12 +02:00
|
|
|
/*%<
|
|
|
|
* Check if this is an external key.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool
|
|
|
|
dst_key_is_unused(dst_key_t *key);
|
|
|
|
/*%<
|
|
|
|
* Check if this key is unused.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool
|
|
|
|
dst_key_is_published(dst_key_t *key, isc_stdtime_t now, isc_stdtime_t *publish);
|
|
|
|
/*%<
|
|
|
|
* Check if it is safe to publish this key (e.g. put the DNSKEY in the zone).
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool
|
|
|
|
dst_key_is_active(dst_key_t *key, isc_stdtime_t now);
|
|
|
|
/*%<
|
|
|
|
* Check if this key is active. This means that it is creating RRSIG records
|
|
|
|
* (ZSK), or that it is used to create a chain of trust (KSK), or both (CSK).
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool
|
2019-10-30 14:38:28 +01:00
|
|
|
dst_key_is_signing(dst_key_t *key, int role, isc_stdtime_t now,
|
|
|
|
isc_stdtime_t *active);
|
2019-10-17 10:21:12 +02:00
|
|
|
/*%<
|
2019-10-30 14:38:28 +01:00
|
|
|
* Check if it is safe to use this key for signing, given the role.
|
2019-10-17 10:21:12 +02:00
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool
|
|
|
|
dst_key_is_revoked(dst_key_t *key, isc_stdtime_t now, isc_stdtime_t *revoke);
|
|
|
|
/*%<
|
|
|
|
* Check if this key is revoked.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
|
|
|
bool
|
|
|
|
dst_key_is_removed(dst_key_t *key, isc_stdtime_t now, isc_stdtime_t *remove);
|
|
|
|
/*%<
|
|
|
|
* Check if this key is removed from the zone (e.g. the DNSKEY record should
|
|
|
|
* no longer be in the zone).
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
2013-09-04 13:53:02 +10:00
|
|
|
|
2020-02-06 08:57:13 +01:00
|
|
|
dst_key_state_t
|
|
|
|
dst_key_goal(dst_key_t *key);
|
|
|
|
/*%<
|
|
|
|
* Get the key goal. Should be OMNIPRESENT or HIDDEN.
|
|
|
|
* This can be used to determine if the key is being introduced or
|
|
|
|
* is on its way out.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'key' to be valid.
|
|
|
|
*/
|
|
|
|
|
2019-11-04 11:12:26 +01:00
|
|
|
void
|
|
|
|
dst_key_copy_metadata(dst_key_t *to, dst_key_t *from);
|
|
|
|
/*%<
|
|
|
|
* Copy key metadata from one key to another.
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
* 'to' and 'from' to be valid.
|
|
|
|
*/
|
|
|
|
|
1999-07-12 20:08:42 +00:00
|
|
|
ISC_LANG_ENDDECLS
|
|
|
|
|
|
|
|
#endif /* DST_DST_H */
|