Lines Matching defs:hmac
416 parse_hmac(dns_name_t **hmac, const char *hmacstr, size_t len) {
421 REQUIRE(hmac != NULL && *hmac == NULL);
430 if (strcasecmp(buf, "hmac-md5") == 0) {
431 *hmac = DNS_TSIG_HMACMD5_NAME;
432 } else if (strncasecmp(buf, "hmac-md5-", 9) == 0) {
433 *hmac = DNS_TSIG_HMACMD5_NAME;
438 } else if (strcasecmp(buf, "hmac-sha1") == 0) {
439 *hmac = DNS_TSIG_HMACSHA1_NAME;
440 } else if (strncasecmp(buf, "hmac-sha1-", 10) == 0) {
441 *hmac = DNS_TSIG_HMACSHA1_NAME;
446 } else if (strcasecmp(buf, "hmac-sha224") == 0) {
447 *hmac = DNS_TSIG_HMACSHA224_NAME;
448 } else if (strncasecmp(buf, "hmac-sha224-", 12) == 0) {
449 *hmac = DNS_TSIG_HMACSHA224_NAME;
454 } else if (strcasecmp(buf, "hmac-sha256") == 0) {
455 *hmac = DNS_TSIG_HMACSHA256_NAME;
456 } else if (strncasecmp(buf, "hmac-sha256-", 12) == 0) {
457 *hmac = DNS_TSIG_HMACSHA256_NAME;
462 } else if (strcasecmp(buf, "hmac-sha384") == 0) {
463 *hmac = DNS_TSIG_HMACSHA384_NAME;
464 } else if (strncasecmp(buf, "hmac-sha384-", 12) == 0) {
465 *hmac = DNS_TSIG_HMACSHA384_NAME;
470 } else if (strcasecmp(buf, "hmac-sha512") == 0) {
471 *hmac = DNS_TSIG_HMACSHA512_NAME;
472 } else if (strncasecmp(buf, "hmac-sha512-", 12) == 0) {
473 *hmac = DNS_TSIG_HMACSHA512_NAME;
505 fatal("key option must specify [hmac:]keyname:secret");
510 fatal("key option must specify [hmac:]keyname:secret");
1880 "key [hmac:]keyname secret (use TSIG to sign the request)\n"