| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
Use DS signature inception time as the DNSSEC validation time.
Validate input data a bit more.
Set TTL in DS to "Original TTL" of RRSIG (this time for real).
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add README.dnssec.
Do start the dnssecport server.
Add config option 'trust_anchors_file'.
Pass correct data to validation server.
Change URL for submitting to match draft (add-rr-chain).
Make add-rr-chain take a base64-encoded string of RR's instead of JSON
list with one RR per entry.
TODO: Make the python tools know enough DNS to be able to verify SCT's
and such (i.e. 'make tests').
|
| |
|
|
|
|
|
|
| |
Rename split_rrset/1 -> decode_rrset/1.
Add type rr() and use it.
Canonicalise DS RR.
|
|
|
|
|
|
|
|
| |
- The port now returns the RRset (DS, chain, trust root and all
RRSIG's). This in preparatino for when this data will be normalised.
- dnssecport decodes and encodes DNS data.
- v1 stores the DS RR in the leaf and the rest, including the DS
RRSIG, in the chain.
|
|
|