* signed and maintained.
*/
-#include <time.h>
-
#include <isc/lang.h>
#include <isc/magic.h>
#include <isc/mutex.h>
ISC_LINK(struct dns_kasp_key) link;
/* Configuration */
- time_t lifetime;
+ uint32_t lifetime;
uint32_t algorithm;
int length;
uint8_t role;
/* Configuration: Keys */
dns_kasp_keylist_t keys;
- uint32_t dnskey_ttl;
+ dns_ttl_t dnskey_ttl;
/* Configuration: Timings */
uint32_t publish_safety;
/* Zone settings */
dns_ttl_t zone_max_ttl;
- time_t zone_propagation_delay;
+ uint32_t zone_propagation_delay;
/* Parent settings */
dns_ttl_t parent_ds_ttl;
- time_t parent_propagation_delay;
- time_t parent_registration_delay;
+ uint32_t parent_propagation_delay;
+ uint32_t parent_registration_delay;
// TODO: The rest of the KASP configuration
};
*\li name of 'kasp'.
*/
-time_t
+uint32_t
dns_kasp_signdelay(dns_kasp_t *kasp);
/*%<
* Get the delay that is needed to ensure that all existing RRsets have been
*\li signature refresh interval.
*/
-time_t
+uint32_t
dns_kasp_sigrefresh(dns_kasp_t *kasp);
/*%<
* Get signature refresh interval.
*\li signature refresh interval.
*/
-time_t
+uint32_t
dns_kasp_sigvalidity(dns_kasp_t *kasp);
-time_t
+uint32_t
dns_kasp_sigvalidity_dnskey(dns_kasp_t *kasp);
/*%<
* Get signature validity.
*\li DNSKEY TTL.
*/
-time_t
+uint32_t
dns_kasp_publishsafety(dns_kasp_t *kasp);
/*%<
* Get publish safety interval.
*\li Publish safety interval.
*/
-time_t
+uint32_t
dns_kasp_retiresafety(dns_kasp_t *kasp);
/*%<
* Get retire safety interval.
*\li Maximum zone TTL.
*/
-time_t
+uint32_t
dns_kasp_zonepropagationdelay(dns_kasp_t *kasp);
/*%<
* Get zone propagation delay.
*\li Expected parent DS TTL.
*/
-time_t
+uint32_t
dns_kasp_parentpropagationdelay(dns_kasp_t *kasp);
/*%<
* Get parent zone propagation delay.
*\li Parent zone propagation delay.
*/
-time_t
+uint32_t
dns_kasp_parentregistrationdelay(dns_kasp_t *kasp);
/*%<
* Get parent registration delay for submitting new DS.
* configured.
*/
-time_t
+uint32_t
dns_kasp_key_lifetime(dns_kasp_key_t *key);
/*%<
* The lifetime of this key (how long may this key be active?)
kasp->frozen = false;
}
-time_t
+uint32_t
dns_kasp_signdelay(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return (kasp->signatures_validity - kasp->signatures_refresh);
}
-time_t
+uint32_t
dns_kasp_sigrefresh(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->signatures_refresh;
}
-time_t
+uint32_t
dns_kasp_sigvalidity(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->signatures_validity;
}
-time_t
+uint32_t
dns_kasp_sigvalidity_dnskey(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->dnskey_ttl;
}
-time_t
+uint32_t
dns_kasp_publishsafety(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->publish_safety;
}
-time_t
+uint32_t
dns_kasp_retiresafety(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->zone_max_ttl;
}
-time_t
+uint32_t
dns_kasp_zonepropagationdelay(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->parent_ds_ttl;
}
-time_t
+uint32_t
dns_kasp_parentpropagationdelay(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return kasp->parent_propagation_delay;
}
-time_t
+uint32_t
dns_kasp_parentregistrationdelay(dns_kasp_t *kasp) {
REQUIRE(DNS_KASP_VALID(kasp));
REQUIRE(kasp->frozen);
return size;
}
-time_t
+uint32_t
dns_kasp_key_lifetime(dns_kasp_key_t *key) {
REQUIRE(key != NULL);