SYNOPSIS
#include <stdint.h>#include <stdbool.h>
#include <ldns/ldns.h>
ldns_status ldns_dane_create_tlsa_owner(ldns_rdf** tlsa_owner, const ldns_rdf* name, uint16_t port, ldns_dane_transport transport);
ldns_status ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type);
ldns_status ldns_dane_select_certificate(X509** selected_cert, X509* cert, STACK_OF(X509)* extra_certs, X509_STORE* pkix_validation_store, ldns_tlsa_certificate_usage cert_usage, int index);
ldns_status ldns_dane_create_tlsa_rr(ldns_rr** tlsa, ldns_tlsa_certificate_usage certificate_usage, ldns_tlsa_selector selector, ldns_tlsa_matching_type matching_type, X509* cert);
DESCRIPTION
- ldns_dane_create_tlsa_owner()
- Creates a dname consisting of the given name, prefixed by the service port
and type of transport: _<EM>port</EM>._<EM>transport</EM>.<EM>name</EM>.
.br tlsa_owner: The created dname. .br name: The dname that should be prefixed. .br port: The service port number for wich the name should be created. .br transport: The transport for wich the name should be created. .br Returns LDNS_STATUS_OK on success or an error code otherwise.
- ldns_dane_cert2rdf()
- Creates a LDNS_RDF_TYPE_HEX type rdf based on the binary data choosen by
the selector and encoded using matching_type.
.br rdf: The created created rdf of type LDNS_RDF_TYPE_HEX. .br cert: The certificate from which the data is selected .br selector: The full certificate or the public key .br matching_type: The full data or the SHA256 or SHA512 hash of the selected data .br Returns LDNS_STATUS_OK on success or an error code otherwise.
- ldns_dane_select_certificate()
- Selects the certificate from cert, extra_certs or the pkix_validation_store
based on the value of cert_usage and index.
.br selected_cert: The selected cert. .br cert: The certificate to validate (or not) .br extra_certs: Intermediate certificates that might be necessary during validation. May be NULL, except when the certificate usage is "Trust Anchor Assertion" because the trust anchor has to be provided.(otherwise choose a "Domain issued certificate!" .br pkix_validation_store: Used when the certificate usage is "CA constraint" or "Service Certificate Constraint" to validate the certificate and, in case of "CA constraint", select the CA. When pkix_validation_store is NULL, validation is explicitely turned off and the behaviour is then the same as for "Trust anchor assertion" and "Domain issued certificate" respectively. .br cert_usage: Which certificate to use and how to validate. .br index: Used to select the trust anchor when certificate usage is "Trust Anchor Assertion". 0 is the last certificate in the validation chain. 1 the one but last, etc. When index is -1, the last certificate is used that MUST be self-signed. This can help to make sure that the intended (self signed) trust anchor is actually present in extra_certs (which is a DANE requirement).
.br Returns LDNS_STATUS_OK on success or an error code otherwise.
- ldns_dane_create_tlsa_rr()
- Creates a TLSA resource record from the certificate.
No PKIX validation is performed! The given certificate is used as data
regardless the value of certificate_usage.
.br tlsa: The created TLSA resource record. .br certificate_usage: The value for the Certificate Usage field .br selector: The value for the Selector field .br matching_type: The value for the Matching Type field .br cert: The certificate which data will be represented
.br Returns LDNS_STATUS_OK on success or an error code otherwise.
AUTHOR
The ldns team at NLnet Labs. Which consists out of Jelte Jansen and Miek Gieben.
REPORTING BUGS
Please report bugs to [email protected] or in our bugzilla at http://www.nlnetlabs.nl/bugs/index.html
COPYRIGHT
Copyright (c) 2004 - 2006 NLnet Labs.Licensed under the BSD License. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
REMARKS
This manpage was automaticly generated from the ldns source code by use of Doxygen and some perl.