Searched defs:dnskey (Results 1 - 14 of 14) sorted by relevance

/bind-9.11.3/lib/dns/
H A Dkeydata.c27 dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx)
29 REQUIRE(keydata != NULL && dnskey != NULL);
31 dnskey->common.rdtype = dns_rdatatype_dnskey;
32 dnskey->common.rdclass = keydata->common.rdclass;
33 dnskey->mctx = mctx;
34 dnskey->flags = keydata->flags;
35 dnskey->protocol = keydata->protocol;
36 dnskey->algorithm = keydata->algorithm;
38 dnskey->datalen = keydata->datalen;
41 dnskey
26 dns_keydata_todnskey(dns_rdata_keydata_t *keydata, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) argument
53 dns_keydata_fromdnskey(dns_rdata_keydata_t *keydata, dns_rdata_dnskey_t *dnskey, isc_uint32_t refresh, isc_uint32_t addhd, isc_uint32_t removehd, isc_mem_t *mctx) argument
[all...]
H A Dnsec.c241 dns_rdata_dnskey_t dnskey; local
266 result = dns_rdata_tostruct(&rdata, &dnskey, NULL);
269 if (dnskey.algorithm == DST_ALG_RSAMD5 ||
270 dnskey.algorithm == DST_ALG_RSASHA1 ||
271 dnskey.algorithm == DST_ALG_DSA ||
272 dnskey.algorithm == DST_ALG_ECC)
H A Dview.c1945 dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx)
1958 dnskey->flags &= ~DNS_KEYFLAG_REVOKE;
1960 /* Convert dnskey to DST key. */
1962 dns_rdata_fromstruct(&rdata, dnskey->common.rdclass,
1963 dns_rdatatype_dnskey, dnskey, &buffer);
1944 dns_view_untrust(dns_view_t *view, dns_name_t *keyname, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) argument
H A Ddnssec.c1864 dns_rdata_t dnskey = DNS_RDATA_INIT; local
1867 dns_rdata_reset(&dnskey);
1868 RETERR(make_dnskey(key->key, buf, sizeof(buf), &dnskey));
1890 &dnskey, &tuple));
1906 dns_rdata_t dnskey = DNS_RDATA_INIT; local
1913 RETERR(make_dnskey(key->key, buf, sizeof(buf), &dnskey));
1914 RETERR(dns_difftuple_create(mctx, DNS_DIFFOP_DEL, origin, ttl, &dnskey,
H A Dzone.c3189 dns_rdata_dnskey_t dnskey; local
3212 result = dns_rdata_tostruct(&rdata, &dnskey, NULL);
3215 if ((dnskey.algorithm == DST_ALG_RSASHA1 ||
3216 dnskey.algorithm == DST_ALG_RSAMD5) &&
3217 dnskey.datalen > 1 && dnskey.data[0] == 1 &&
3218 dnskey.data[1] == 3)
3220 if (dnskey.algorithm == DST_ALG_RSASHA1) {
3233 dnskey.algorithm);
3777 dns_rdata_dnskey_t dnskey; local
3874 compute_tag(dns_name_t *name, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx, dns_keytag_t *tag) argument
3899 trust_key(dns_zone_t *zone, dns_name_t *keyname, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) argument
3955 dns_rdata_dnskey_t dnskey; local
8769 dns_rdata_dnskey_t dnskey; local
8973 dns_rdata_dnskey_t dnskey; local
9052 dns_rdata_dnskey_t dnskey; local
17483 dns_rdata_dnskey_t dnskey; local
18172 dns_rdataset_t dnskey, cds, cdnskey; local
[all...]
/bind-9.11.3/bin/tests/system/checkds/
H A Ddig.bat14 if "%arg%" == "dnskey" goto dnskey
15 if "%arg%" == "DNSKEY" goto dnskey
27 :dnskey label
28 set ext=dnskey
/bind-9.11.3/lib/dns/rdata/generic/
H A Dcdnskey_60.c86 dns_rdata_cdnskey_t *dnskey = target; local
88 REQUIRE(dnskey != NULL);
92 dnskey->common.rdclass = rdata->rdclass;
93 dnskey->common.rdtype = rdata->type;
94 ISC_LINK_INIT(&dnskey->common, link);
101 dns_rdata_cdnskey_t *dnskey = (dns_rdata_cdnskey_t *) source; local
103 REQUIRE(dnskey != NULL);
104 REQUIRE(dnskey->common.rdtype == dns_rdatatype_cdnskey);
H A Ddnskey_48.c93 dns_rdata_dnskey_t *dnskey = target; local
95 REQUIRE(dnskey != NULL);
99 dnskey->common.rdclass = rdata->rdclass;
100 dnskey->common.rdtype = rdata->type;
101 ISC_LINK_INIT(&dnskey->common, link);
108 dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *) source; local
110 REQUIRE(dnskey != NULL);
111 REQUIRE(dnskey->common.rdtype == dns_rdatatype_dnskey);
/bind-9.11.3/contrib/kasp/
H A Dkasp2policy.py24 from isc import dnskey namespace
194 print("\talgorithm %s;" % dnskey.algstr(int(algnum)))
/bind-9.11.3/lib/dns/tests/
H A Dmaster_test.c300 ATF_TC(dnskey); variable
301 ATF_TC_HEAD(dnskey, tc) {
305 ATF_TC_BODY(dnskey, tc) {
666 ATF_TP_ADD_TC(tp, dnskey);
/bind-9.11.3/bin/dnssec/
H A Ddnssec-dsfromkey.c247 dns_rdata_dnskey_t dnskey; local
255 result = dns_rdata_tostruct(rdata, &dnskey, NULL);
259 if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0 && !showall)
H A Ddnssectool.c1483 dns_rdata_dnskey_t dnskey; local
1582 result = dns_rdata_tostruct(&rdata, &dnskey, NULL);
1585 if ((dnskey.flags & DNS_KEYOWNER_ZONE) == 0)
1587 else if ((dnskey.flags & DNS_KEYFLAG_REVOKE) != 0) {
1588 if ((dnskey.flags & DNS_KEYFLAG_KSK) != 0 &&
1605 if ((dnskey.flags & DNS_KEYFLAG_KSK) != 0 &&
1606 revoked_ksk[dnskey.algorithm] != 255)
1607 revoked_ksk[dnskey.algorithm]++;
1608 else if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0 &&
1609 revoked_zsk[dnskey
[all...]
H A Ddnssec-signzone.c288 fatal("dnskey '%s' failed to sign data: %s",
553 "private dnskey not found\n",
557 vbprintf(2, "\trrsig by %s %s - dnskey not found\n",
579 vbprintf(2, "\trrsig by %s dropped - dnskey removed\n",
637 "resigning with dnskey");
682 "signing with dnskey");
687 "signing with dnskey");
2559 fatal("cannot load dnskey %s: %s", keyfiles[i],
2566 fatal("cannot sign zone with non-private dnskey %s",
2653 dns_rdata_dnskey_t dnskey; local
[all...]
/bind-9.11.3/bin/named/
H A Dupdate.c2334 dns_rdata_dnskey_t dnskey; local
2417 result = dns_rdata_tostruct(&tuple->rdata, &dnskey, NULL);
2419 if ((dnskey.flags &
2426 keyid = dst_region_computeid(&r, dnskey.algorithm);
2428 buf[0] = dnskey.algorithm;
2500 dns_rdata_dnskey_t dnskey; local
3259 dns_rdata_tostruct(&tuple->rdata, &dnskey, NULL);
3260 if ((dnskey.flags &
3266 algorithm = dnskey.algorithm;

Completed in 81 milliseconds