diff options
author | JINMEI Tatuya <jinmei@isc.org> | 2011-05-11 08:19:39 +0200 |
---|---|---|
committer | JINMEI Tatuya <jinmei@isc.org> | 2011-05-11 08:19:39 +0200 |
commit | 143b2c6769c64eb55d2f34305ad8e2b7ce681aa6 (patch) | |
tree | 00679c71273f7d32645eb1ceff611edff49b4017 /src/lib/dns/tsigkey.h | |
parent | [trac893] make (more) sure previous_digest_.size() fits the 16-bit range. (diff) | |
download | kea-143b2c6769c64eb55d2f34305ad8e2b7ce681aa6.tar.xz kea-143b2c6769c64eb55d2f34305ad8e2b7ce681aa6.zip |
[trac893] added more rationale about handling unknown algorithm names
Diffstat (limited to 'src/lib/dns/tsigkey.h')
-rw-r--r-- | src/lib/dns/tsigkey.h | 11 |
1 files changed, 10 insertions, 1 deletions
diff --git a/src/lib/dns/tsigkey.h b/src/lib/dns/tsigkey.h index dd79d1f42a..f0df709a28 100644 --- a/src/lib/dns/tsigkey.h +++ b/src/lib/dns/tsigkey.h @@ -75,7 +75,16 @@ public: /// Other names are still accepted as long as the secret is empty /// (\c secret is \c NULL and \c secret_len is 0), however; in some cases /// we might want to treat just the pair of key name and algorithm name - /// opaquely, e.g., when generating a response TSIG with a BADKEY error. + /// opaquely, e.g., when generating a response TSIG with a BADKEY error + /// because the algorithm is unknown as specified in Section 3.2 of + /// RFC2845 (in which case the algorithm name would be copied from the + /// request to the response, and for that purpose it would be convenient + /// if a \c TSIGKey object can hold a name for an "unknown" algorithm). + /// + /// \note RFC2845 does not specify which algorithm name should be used + /// in such a BADKEY response. The behavior of using the same algorithm + /// is derived from the BIND 9 implementation. + /// /// It is unlikely that a TSIG key with an unknown algorithm is of any /// use with actual crypto operation, so care must be taken when dealing /// with such keys. (The restriction for the secret will prevent |