Lines Matching defs:rtkey

1106 	dns_rdata_tkey_t qtkey, rtkey;
1125 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1132 if (rtkey.error != dns_rcode_noerror ||
1133 rtkey.mode != DNS_TKEYMODE_DIFFIEHELLMAN ||
1134 rtkey.mode != qtkey.mode ||
1135 !dns_name_equal(&rtkey.algorithm, &qtkey.algorithm) ||
1191 r.base = rtkey.key;
1192 r.length = rtkey.keylen;
1204 result = dns_tsigkey_create(tkeyname, &rtkey.algorithm,
1206 NULL, rtkey.inception, rtkey.expire,
1209 dns_rdata_freestruct(&rtkey);
1221 dns_rdata_freestruct(&rtkey);
1234 dns_rdata_tkey_t rtkey, qtkey;
1250 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1267 if (rtkey.error != dns_rcode_noerror ||
1268 rtkey.mode != DNS_TKEYMODE_GSSAPI ||
1269 !dns_name_equal(&rtkey.algorithm, &qtkey.algorithm)) {
1271 "or error set(2) %d", rtkey.error);
1279 isc_buffer_init(&intoken, rtkey.key, rtkey.keylen);
1287 rtkey.inception, rtkey.expire,
1290 dns_rdata_freestruct(&rtkey);
1295 * XXXSRA This probably leaks memory from rtkey and qtkey.
1308 dns_rdata_tkey_t qtkey, rtkey;
1319 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1325 if (rtkey.error != dns_rcode_noerror ||
1326 rtkey.mode != DNS_TKEYMODE_DELETE ||
1327 rtkey.mode != qtkey.mode ||
1328 !dns_name_equal(&rtkey.algorithm, &qtkey.algorithm) ||
1334 dns_rdata_freestruct(&rtkey);
1340 RETERR(dns_tsigkey_find(&tsigkey, tkeyname, &rtkey.algorithm, ring));
1342 dns_rdata_freestruct(&rtkey);
1365 dns_rdata_tkey_t rtkey, qtkey;
1381 RETERR(dns_rdata_tostruct(&rtkeyrdata, &rtkey, NULL));
1392 if (rtkey.error != dns_rcode_noerror ||
1393 rtkey.mode != DNS_TKEYMODE_GSSAPI ||
1394 !dns_name_equal(&rtkey.algorithm, &qtkey.algorithm))
1402 isc_buffer_init(&intoken, rtkey.key, rtkey.keylen);
1423 rtkey.inception, rtkey.expire,
1426 dns_rdata_freestruct(&rtkey);
1433 dns_rdata_freestruct(&rtkey);