ldns_dnssec_data_chain_struct(3) [centos man page]
ldns(3) Library Functions Manual ldns(3)NAME
ldns_dnssec_data_chain, ldns_dnssec_data_chain_struct, ldns_dnssec_trust_tree
SYNOPSIS
#include <stdint.h>
#include <stdbool.h>
#include <ldns/ldns.h>
ldns_dnssec_data_chain_struct();
DESCRIPTION
ldns_dnssec_data_chain
Chain structure that contains all DNSSEC data needed to
verify an rrset
struct ldns_dnssec_data_chain_struct
{
ldns_rr_list *rrset;
ldns_rr_list *signatures;
ldns_rr_type parent_type;
ldns_dnssec_data_chain *parent;
ldns_pkt_rcode packet_rcode;
ldns_rr_type packet_qtype;
bool packet_nodata;
};
typedef struct ldns_dnssec_data_chain_struct ldns_dnssec_data_chain;
ldns_dnssec_data_chain_struct()
ldns_dnssec_trust_tree
Tree structure that contains the relation of DNSSEC data,
and their cryptographic status.
This tree is derived from a data_chain, and can be used
to look whether there is a connection between an RRSET
and a trusted key. The tree only contains pointers to the
data_chain, and therefore one should *never* free() the
data_chain when there is still a trust tree derived from
that chain.
Example tree:
key key key
| /
| /
| /
ds
|
key
|
key
|
rr
For each signature there is a parent; if the parent
pointer is null, it couldn't be found and there was no
denial; otherwise is a tree which contains either a
DNSKEY, a DS, or a NSEC rr
struct ldns_dnssec_trust_tree_struct
{
ldns_rr *rr;
/* the complete rrset this rr was in */
ldns_rr_list *rrset;
ldns_dnssec_trust_tree *parents[LDNS_DNSSEC_TRUST_TREE_MAX_PARENTS];
ldns_status parent_status[LDNS_DNSSEC_TRUST_TREE_MAX_PARENTS];
/** for debugging, add signatures too (you might want
those if they contain errors) */
ldns_rr *parent_signature[LDNS_DNSSEC_TRUST_TREE_MAX_PARENTS];
size_t parent_count;
};
typedef struct ldns_dnssec_trust_tree_struct ldns_dnssec_trust_tree;
AUTHOR
The ldns team at NLnet Labs. Which consists out of Jelte Jansen and Miek Gieben.
REPORTING BUGS
Please report bugs to ldns-team@nlnetlabs.nl or in our bugzilla at http://www.nlnetlabs.nl/bugs/index.html
COPYRIGHT
Copyright (c) 2004 - 2006 NLnet Labs.
Licensed under the BSD License. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
SEE ALSO
ldns_dnssec_data_chain_new, ldns_dnssec_trust_tree_new, ldns_dnssec_verify_denial. And perldoc Net::DNS, RFC1034, RFC1035, RFC4033,
RFC4034 and RFC4035.
REMARKS
This manpage was automaticly generated from the ldns source code by use of Doxygen and some perl.
30 May 2006 ldns(3)
Check Out this Related Man Page
ldns(3) Library Functions Manual ldns(3)NAME
ldns_dnssec_trust_tree_new, ldns_dnssec_trust_tree_free, ldns_dnssec_trust_tree_depth, ldns_dnssec_derive_trust_tree,
ldns_dnssec_trust_tree_contains_keys, ldns_dnssec_trust_tree_print, ldns_dnssec_trust_tree_print_sm, ldns_dnssec_trust_tree_add_parent,
ldns_dnssec_derive_trust_tree_normal_rrset, ldns_dnssec_derive_trust_tree_dnskey_rrset, ldns_dnssec_derive_trust_tree_ds_rrset,
ldns_dnssec_derive_trust_tree_no_sig-
SYNOPSIS
#include <stdint.h>
#include <stdbool.h>
#include <ldns/ldns.h>
ldns_dnssec_trust_tree* ldns_dnssec_trust_tree_new();
void ldns_dnssec_trust_tree_free(ldns_dnssec_trust_tree *tree);
size_t ldns_dnssec_trust_tree_depth(ldns_dnssec_trust_tree *tree);
ldns_dnssec_trust_tree* ldns_dnssec_derive_trust_tree( ldns_dnssec_data_chain *data_chain, ldns_rr *rr);
ldns_status ldns_dnssec_trust_tree_contains_keys( ldns_dnssec_trust_tree *tree, ldns_rr_list *keys);
void ldns_dnssec_trust_tree_print(FILE *out, ldns_dnssec_trust_tree *tree, size_t tabs, bool extended);
ldns_dnssec_trust_tree_print_sm();
ldns_status ldns_dnssec_trust_tree_add_parent(ldns_dnssec_trust_tree *tree, const ldns_dnssec_trust_tree *parent, const ldns_rr *par-
ent_signature, const ldns_status parent_status);
void ldns_dnssec_derive_trust_tree_normal_rrset( ldns_dnssec_trust_tree *new_tree, ldns_dnssec_data_chain *data_chain, ldns_rr
*cur_sig_rr);
void ldns_dnssec_derive_trust_tree_dnskey_rrset( ldns_dnssec_trust_tree *new_tree, ldns_dnssec_data_chain *data_chain, ldns_rr *cur_rr,
ldns_rr *cur_sig_rr);
void ldns_dnssec_derive_trust_tree_ds_rrset( ldns_dnssec_trust_tree *new_tree, ldns_dnssec_data_chain *data_chain, ldns_rr *cur_rr);
void ldns_dnssec_derive_trust_tree_no_sig( ldns_dnssec_trust_tree *new_tree, ldns_dnssec_data_chain *data_chain);
DESCRIPTION
ldns_dnssec_trust_tree_new() Creates a new (empty) dnssec_trust_tree structure
Returns ldns_dnssec_trust_tree *
ldns_dnssec_trust_tree_free() Frees the dnssec_trust_tree recursively
There is no deep free; all data in the trust tree consists of pointers to a data_chain
tree: The tree to free
ldns_dnssec_trust_tree_depth() returns the depth of the trust tree
tree: tree to calculate the depth of
Returns The depth of the tree
ldns_dnssec_derive_trust_tree() Generates a dnssec_trust_tree for the given rr from the given data_chain
This does not clone the actual data; Don't free the data_chain before you are done with this tree
*data_chain: The chain to derive the trust tree from
*rr: The RR this tree will be about
Returns ldns_dnssec_trust_tree *
ldns_dnssec_trust_tree_contains_keys() Returns OK if there is a trusted path in the tree to one of the DNSKEY or DS RRs in the given list
param *tree The trust tree so search param *keys A ldns_rr_list of DNSKEY and DS rrs to look for
Returns LDNS_STATUS_OK if there is a trusted path to one of
the keys, or the *first* error encountered
if there were no paths
ldns_dnssec_trust_tree_print() Prints the dnssec_trust_tree structure to the given file stream.
If a link status is not LDNS_STATUS_OK; the status and relevant signatures are printed too
*out: The file stream to print to
tree: The trust tree to print
tabs: Prepend each line with tabs*2 spaces
extended: If true, add little explanation lines to the output
ldns_dnssec_trust_tree_print_sm()
ldns_dnssec_trust_tree_add_parent() Adds a trust tree as a parent for the given trust tree
*tree: The tree to add the parent to
*parent: The parent tree to add
*parent_signature: The RRSIG relevant to this parent/child
connection
parent_status: The DNSSEC status for this parent, child and RRSIG
Returns LDNS_STATUS_OK if the addition succeeds, error otherwise
ldns_dnssec_derive_trust_tree_normal_rrset() Sub function for derive_trust_tree that is used for a 'normal' rrset
new_tree: The trust tree that we are building
data_chain: The data chain containing the data for the trust tree
cur_sig_rr: The currently relevant signature
ldns_dnssec_derive_trust_tree_dnskey_rrset() Sub function for derive_trust_tree that is used for DNSKEY rrsets
new_tree: The trust tree that we are building
data_chain: The data chain containing the data for the trust tree
cur_rr: The currently relevant DNSKEY RR
cur_sig_rr: The currently relevant signature
ldns_dnssec_derive_trust_tree_ds_rrset() Sub function for derive_trust_tree that is used for DS rrsets
new_tree: The trust tree that we are building
data_chain: The data chain containing the data for the trust tree
cur_rr: The currently relevant DS RR
ldns_dnssec_derive_trust_tree_no_sig() Sub function for derive_trust_tree that is used when there are no signatures
new_tree: The trust tree that we are building
data_chain: The data chain containing the data for the trust tree
AUTHOR
The ldns team at NLnet Labs. Which consists out of Jelte Jansen and Miek Gieben.
REPORTING BUGS
Please report bugs to ldns-team@nlnetlabs.nl or in our bugzilla at http://www.nlnetlabs.nl/bugs/index.html
COPYRIGHT
Copyright (c) 2004 - 2006 NLnet Labs.
Licensed under the BSD License. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
SEE ALSO
ldns_dnssec_data_chain, ldns_dnssec_trust_tree. And perldoc Net::DNS, RFC1034, RFC1035, RFC4033, RFC4034 and RFC4035.
REMARKS
This manpage was automaticly generated from the ldns source code by use of Doxygen and some perl.
30 May 2006 ldns(3)