summaryrefslogtreecommitdiffstats
path: root/src/lib/dns/tsigkey.h
diff options
context:
space:
mode:
authorJINMEI Tatuya <jinmei@isc.org>2011-05-11 08:19:39 +0200
committerJINMEI Tatuya <jinmei@isc.org>2011-05-11 08:19:39 +0200
commit143b2c6769c64eb55d2f34305ad8e2b7ce681aa6 (patch)
tree00679c71273f7d32645eb1ceff611edff49b4017 /src/lib/dns/tsigkey.h
parent[trac893] make (more) sure previous_digest_.size() fits the 16-bit range. (diff)
downloadkea-143b2c6769c64eb55d2f34305ad8e2b7ce681aa6.tar.xz
kea-143b2c6769c64eb55d2f34305ad8e2b7ce681aa6.zip
[trac893] added more rationale about handling unknown algorithm names
Diffstat (limited to 'src/lib/dns/tsigkey.h')
-rw-r--r--src/lib/dns/tsigkey.h11
1 files changed, 10 insertions, 1 deletions
diff --git a/src/lib/dns/tsigkey.h b/src/lib/dns/tsigkey.h
index dd79d1f42a..f0df709a28 100644
--- a/src/lib/dns/tsigkey.h
+++ b/src/lib/dns/tsigkey.h
@@ -75,7 +75,16 @@ public:
/// Other names are still accepted as long as the secret is empty
/// (\c secret is \c NULL and \c secret_len is 0), however; in some cases
/// we might want to treat just the pair of key name and algorithm name
- /// opaquely, e.g., when generating a response TSIG with a BADKEY error.
+ /// opaquely, e.g., when generating a response TSIG with a BADKEY error
+ /// because the algorithm is unknown as specified in Section 3.2 of
+ /// RFC2845 (in which case the algorithm name would be copied from the
+ /// request to the response, and for that purpose it would be convenient
+ /// if a \c TSIGKey object can hold a name for an "unknown" algorithm).
+ ///
+ /// \note RFC2845 does not specify which algorithm name should be used
+ /// in such a BADKEY response. The behavior of using the same algorithm
+ /// is derived from the BIND 9 implementation.
+ ///
/// It is unlikely that a TSIG key with an unknown algorithm is of any
/// use with actual crypto operation, so care must be taken when dealing
/// with such keys. (The restriction for the secret will prevent