Miek Gieben
537b644ed2
Fix the Makefile-less go version of dns
2012-02-05 10:53:15 +01:00
Miek Gieben
09ac6c8dc5
gofmt
2012-01-28 00:35:37 +01:00
Miek Gieben
6e6b67afd5
Fix NSEC(3) with no bitmap
2012-01-23 11:30:26 +01:00
Miek Gieben
74181dee8e
More tests
2012-01-22 20:44:52 +01:00
Miek Gieben
d78647b17d
Typo in test
2012-01-22 19:56:13 +01:00
Miek Gieben
3159bab78c
more testing stuff
2012-01-22 19:08:47 +01:00
Miek Gieben
5917838cbb
gofmt
2012-01-20 12:24:20 +01:00
Miek Gieben
84700f043f
Fix sign test
2012-01-15 20:32:53 +01:00
Miek Gieben
5a7fb7a15f
Documentation
2012-01-15 16:09:17 +01:00
Miek Gieben
6e5d3005d6
Fix the test
2012-01-08 15:56:53 +01:00
Miek Gieben
e522a6daf7
Make all tests fully qualified
2012-01-08 15:34:42 +01:00
Miek Gieben
d1b0ee219f
Digest fixes
2011-12-16 15:06:24 +01:00
Miek Gieben
131f6962d1
gofmt
2011-12-09 21:45:57 +01:00
Miek Gieben
406edadf20
Make the tests compile again
2011-09-10 21:22:42 +02:00
Miek Gieben
4671072027
Error handling
...
Handle semantic errors in the input stream.
Try to use Ragel's error handling when seeing a non-supported
class. This does not work yet.
2011-07-24 17:08:33 +02:00
Miek Gieben
da0603089a
gofmt -w
2011-07-23 23:43:43 +02:00
Miek Gieben
fd0064c805
Parsings works - clean up the tests
...
RR_DNSKEY has now a
* Read (to read an RR)
* ReadPrivateKey (to read an private key file)
Together you have enough data to sign and verify DNSSEC data.
I'm thinking about a better API, but I think one will emerge
whenever I complete the zone parsin.
2011-07-17 20:51:27 +02:00
Miek Gieben
e21ae18160
Fix the tests too. They fail now btw; its on the TODO
2011-07-08 17:30:04 +02:00
Miek Gieben
328931d079
implement (part of) ecdsa256/384
2011-07-08 10:41:07 +02:00
Miek Gieben
8368f4ce60
Actually remove resolver.go
2011-07-04 20:19:44 +02:00
Miek Gieben
be6f2365cb
Test compile again, but fail
2011-03-23 19:03:37 +01:00
Miek Gieben
98e4b33cb5
formatting and documentation
2011-02-24 16:22:14 +01:00
Miek Gieben
7e1f9490f2
Cert RR added
...
PubKey is named PublicKey in the RR_DNSKEY
2011-01-25 13:57:54 +01:00
Miek Gieben
96a55dee9b
Less verbose tests
2011-01-17 20:29:40 +01:00
Miek Gieben
48cbf55a23
completely fix private key reading
2011-01-17 20:18:51 +01:00
Miek Gieben
8ed6c8a8f4
more parsing: from private key file - not finished
2011-01-16 16:22:31 +01:00
Miek Gieben
582c89299b
Only 3 testfiles left
2011-01-15 22:57:17 +01:00
Miek Gieben
3856fa250f
remove this test too
2011-01-15 22:53:45 +01:00
Miek Gieben
a1e2d21553
Fold more tests into 1 file
2011-01-15 22:53:04 +01:00
Miek Gieben
f1e3496e8d
Fold some tests back together
2011-01-15 22:48:39 +01:00
Miek Gieben
15bf984f3f
LabelCount() made public and various other tweaks
2011-01-14 18:55:18 +01:00
Miek Gieben
232b6e62a5
re-add tests
2011-01-09 20:07:13 +01:00
Miek Gieben
15dd65171b
Split the package in multiple packages
...
dns - the standard rrtypes and such
dnssec - validation, keytag calculation, etc
resolver - for talking to servers
2010-12-30 13:42:52 +01:00
Miek Gieben
504ab27f6f
en weer terug
2010-12-29 16:12:01 +01:00
Miek Gieben
de5b30f781
zo dan
2010-12-29 16:11:23 +01:00
Miek Gieben
5ced9e2152
almost ready for DNSSEC validation
...
only need call the crypto/rsa func
2010-12-28 14:57:30 +01:00
Miek Gieben
0cea39ac49
Second stab a DNSSEC validation
...
- still need: sorting, numOfLabels, wildcard handling
2010-12-28 10:40:20 +01:00
Miek Gieben
fc2373cd15
more more more
2010-12-28 10:18:10 +01:00
Miek Gieben
e339e8bce6
more tests
2010-12-28 10:17:27 +01:00
Miek Gieben
c1d45f507e
First stab at DNSSEC validation
2010-12-28 09:49:45 +01:00
Miek Gieben
d0d1847b61
add dnssec testing
2010-12-28 09:43:33 +01:00
Miek Gieben
4ed14b9785
More cleansup and robustness
...
* make the resolver more robust
* more dnssec functions
2010-12-28 09:41:54 +01:00