Lines Matching defs:keys

2588  * are valid domain names as these keys are used for TSIG.
2593 check_keylist(const cfg_obj_t *keys, isc_symtab_t *symtab,
2605 for (element = cfg_list_first(keys);
2672 * RNDC keys are not normalised unlike TSIG keys.
2705 const cfg_obj_t *v1, *v2, *keys;
2776 keys = NULL;
2777 cfg_map_get(v1, "keys", &keys);
2778 if (keys != NULL) {
2782 keyval = cfg_obj_asstring(keys);
2790 cfg_obj_log(keys, logctx, ISC_LOG_ERROR,
2798 cfg_obj_log(keys, logctx, ISC_LOG_ERROR,
3085 const cfg_obj_t *keys = NULL;
3204 * there are no duplicate keys.
3211 (void)cfg_map_get(config, "key", &keys);
3212 tresult = check_keylist(keys, symtab, mctx, logctx);
3221 keys = NULL;
3222 (void)cfg_map_get(voptions, "key", &keys);
3223 tresult = check_keylist(keys, symtab, mctx, logctx);
3233 * Global servers can refer to keys in views.
3275 * Check trusted-keys and managed-keys.
3277 keys = NULL;
3279 (void)cfg_map_get(voptions, "trusted-keys", &keys);
3280 if (keys == NULL)
3281 (void)cfg_map_get(config, "trusted-keys", &keys);
3284 for (element = cfg_list_first(keys);
3301 cfg_obj_log(keys, logctx, ISC_LOG_WARNING,
3308 cfg_obj_log(keys, logctx, ISC_LOG_WARNING,
3313 keys = NULL;
3315 (void)cfg_map_get(voptions, "managed-keys", &keys);
3316 if (keys == NULL)
3317 (void)cfg_map_get(config, "managed-keys", &keys);
3320 for (element = cfg_list_first(keys);
3337 cfg_obj_log(keys, logctx, ISC_LOG_WARNING,
3343 cfg_obj_log(keys, logctx, ISC_LOG_WARNING,
3351 cfg_obj_log(keys, logctx, ISC_LOG_WARNING,
3352 "both trusted-keys and managed-keys for the ICANN "
3526 control_keylist = cfg_tuple_get(control, "keys");