DNS tree was upside down (wording in comments)

According to RFC1034 Section 4.2.1., the zone's apex is at the top and delegations at the bottom.
This commit is contained in:
Willem Toorop 2015-07-14 10:49:00 +02:00
parent 554f015931
commit 587b320d95
1 changed files with 6 additions and 6 deletions

View File

@ -2317,9 +2317,9 @@ static int key_proves_nonexistance(
return 0; return 0;
} }
/* Descend down to the root along chain_nodes. Try to find a keyset /* Ascend up to the root along chain_nodes. Try to find a keyset
* authenticated by a key in ta rrset (trust anchor). When we found one, * authenticated by a key in ta rrset (trust anchor). When we found one,
* ascend back up, authenticating more specific keysets along the chain. * descend back down, authenticating more specific keysets along the chain.
* *
* The most specific keyset is returned in keys. Also a DNSSEC status is * The most specific keyset is returned in keys. Also a DNSSEC status is
* returned. BOGUS if no keyset could be found. INSECURE if the * returned. BOGUS if no keyset could be found. INSECURE if the
@ -2330,7 +2330,7 @@ static int chain_node_get_trusted_keys(
{ {
int s, keytag; int s, keytag;
/* Descend down to the root */ /* Ascend up to the root */
if (! node) if (! node)
return GETDNS_DNSSEC_BOGUS; return GETDNS_DNSSEC_BOGUS;
@ -2379,7 +2379,7 @@ static int chain_node_get_trusted_keys(
/* keys is an authenticated dnskey rrset always now (i.e. ZSK) */ /* keys is an authenticated dnskey rrset always now (i.e. ZSK) */
ta = *keys; ta = *keys;
/* Back up to the head */ /* Back down to the head */
if ((keytag = key_proves_nonexistance(ta, &node->ds, NULL))) { if ((keytag = key_proves_nonexistance(ta, &node->ds, NULL))) {
node->ds_signer = keytag; node->ds_signer = keytag;
return GETDNS_DNSSEC_INSECURE; return GETDNS_DNSSEC_INSECURE;
@ -2411,7 +2411,7 @@ static int chain_node_get_trusted_keys(
return GETDNS_DNSSEC_BOGUS; return GETDNS_DNSSEC_BOGUS;
/* Not at a zone cut, the trusted keyset must be authenticating /* Not at a zone cut, the trusted keyset must be authenticating
* something above (closer to head) this node. * something below (closer to head) this node.
*/ */
return GETDNS_DNSSEC_SECURE; return GETDNS_DNSSEC_SECURE;
} }
@ -2784,7 +2784,7 @@ static void check_chain_complete(chain_head *chain)
!rrset_has_rrs(&node->ds)) { !rrset_has_rrs(&node->ds)) {
/* Add empty DS, to prevent less /* Add empty DS, to prevent less
* specific to be able to authenticate * specific to be able to authenticate
* above a zone cut (closer to head) * below a zone cut (closer to head)
*/ */
append_empty_ds2val_chain_list( append_empty_ds2val_chain_list(
context, val_chain_list, context, val_chain_list,