mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-30 06:38:37 -04:00 
			
		
		
		
	Vendor Update (#16121)
* update github.com/PuerkitoBio/goquery * update github.com/alecthomas/chroma * update github.com/blevesearch/bleve/v2 * update github.com/caddyserver/certmagic * update github.com/go-enry/go-enry/v2 * update github.com/go-git/go-billy/v5 * update github.com/go-git/go-git/v5 * update github.com/go-redis/redis/v8 * update github.com/go-testfixtures/testfixtures/v3 * update github.com/jaytaylor/html2text * update github.com/json-iterator/go * update github.com/klauspost/compress * update github.com/markbates/goth * update github.com/mattn/go-isatty * update github.com/mholt/archiver/v3 * update github.com/microcosm-cc/bluemonday * update github.com/minio/minio-go/v7 * update github.com/prometheus/client_golang * update github.com/unrolled/render * update github.com/xanzy/go-gitlab * update github.com/yuin/goldmark * update github.com/yuin/goldmark-highlighting Co-authored-by: techknowlogick <techknowlogick@gitea.io>
This commit is contained in:
		
							
								
								
									
										13
									
								
								vendor/github.com/miekg/dns/dnssec.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										13
									
								
								vendor/github.com/miekg/dns/dnssec.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -4,6 +4,7 @@ import ( | ||||
| 	"bytes" | ||||
| 	"crypto" | ||||
| 	"crypto/ecdsa" | ||||
| 	"crypto/ed25519" | ||||
| 	"crypto/elliptic" | ||||
| 	"crypto/rand" | ||||
| 	"crypto/rsa" | ||||
| @@ -17,8 +18,6 @@ import ( | ||||
| 	"sort" | ||||
| 	"strings" | ||||
| 	"time" | ||||
|  | ||||
| 	"golang.org/x/crypto/ed25519" | ||||
| ) | ||||
|  | ||||
| // DNSSEC encryption algorithm codes. | ||||
| @@ -373,6 +372,8 @@ func sign(k crypto.Signer, hashed []byte, hash crypto.Hash, alg uint8) ([]byte, | ||||
| // Verify validates an RRSet with the signature and key. This is only the | ||||
| // cryptographic test, the signature validity period must be checked separately. | ||||
| // This function copies the rdata of some RRs (to lowercase domain names) for the validation to work. | ||||
| // It also checks that the Zone Key bit (RFC 4034 2.1.1) is set on the DNSKEY | ||||
| // and that the Protocol field is set to 3 (RFC 4034 2.1.2). | ||||
| func (rr *RRSIG) Verify(k *DNSKEY, rrset []RR) error { | ||||
| 	// First the easy checks | ||||
| 	if !IsRRset(rrset) { | ||||
| @@ -393,6 +394,12 @@ func (rr *RRSIG) Verify(k *DNSKEY, rrset []RR) error { | ||||
| 	if k.Protocol != 3 { | ||||
| 		return ErrKey | ||||
| 	} | ||||
| 	// RFC 4034 2.1.1 If bit 7 has value 0, then the DNSKEY record holds some | ||||
| 	// other type of DNS public key and MUST NOT be used to verify RRSIGs that | ||||
| 	// cover RRsets. | ||||
| 	if k.Flags&ZONE == 0 { | ||||
| 		return ErrKey | ||||
| 	} | ||||
|  | ||||
| 	// IsRRset checked that we have at least one RR and that the RRs in | ||||
| 	// the set have consistent type, class, and name. Also check that type and | ||||
| @@ -500,7 +507,7 @@ func (rr *RRSIG) ValidityPeriod(t time.Time) bool { | ||||
| 	return ti <= utc && utc <= te | ||||
| } | ||||
|  | ||||
| // Return the signatures base64 encodedig sigdata as a byte slice. | ||||
| // Return the signatures base64 encoding sigdata as a byte slice. | ||||
| func (rr *RRSIG) sigBuf() []byte { | ||||
| 	sigbuf, err := fromBase64([]byte(rr.Signature)) | ||||
| 	if err != nil { | ||||
|   | ||||
		Reference in New Issue
	
	Block a user