/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 25 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 26 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
|
/bind-9.11.3/lib/dns/ |
H A D | private.c | 338 dns_keytag_t keyid = (private->data[2] | private->data[1] << 8); local 353 snprintf(keybuf, sizeof(keybuf), "key %d/%s", keyid, algbuf);
|
H A D | validator.c | 1231 siginfo->keyid == 1459 sig.keyid != keytag || 1497 isc_uint16_t keyid) 1519 "accepted expired %sRRSIG (keyid=%u)", 1521 "wildcard " : "", keyid); 1524 "verify failed due to bad signature (keyid=%u): " 1525 "%s", keyid, isc_result_totext(result)); 1528 "verify rdataset (keyid=%u): %s", 1529 keyid, isc_result_totext(result)); 1627 val->siginfo->keyid); 1496 verify(dns_validator_t *val, dst_key_t *key, dns_rdata_t *rdata, isc_uint16_t keyid) argument 1712 checkkey(dns_validator_t *val, dns_rdata_t *keyrdata, isc_uint16_t keyid, dns_secalg_t algorithm) argument 1754 keyfromds(dns_validator_t *val, dns_rdataset_t *rdataset, dns_rdata_t *dsrdata, isc_uint8_t digest, isc_uint16_t keyid, dns_secalg_t algorithm, dns_rdata_t *keyrdata) argument [all...] |
H A D | dnssec.c | 245 sig.keyid = dst_key_id(key); 959 sig.keyid = dst_key_id(key); 1242 sig.keyid == keytag) { 1622 isc_uint16_t keyid, sigid; local 1624 keyid = dst_key_id(key->key); 1637 sigid = sig.keyid; 1638 if (keyid == sigid && keyalg == sigalg) {
|
H A D | zone.c | 650 isc_uint16_t keyid; member in struct:dns_signing 815 isc_uint16_t keyid, isc_boolean_t deleteit); 6140 (rrsig_ptr->keyid == dst_key_id(keys[i]))) 6245 rrsig.keyid); 6259 rrsig.keyid == dst_key_id(keys[i])) { 6706 rrsig.keyid == dst_key_id(key)) { 6939 * If we don't match the algorithm or keyid skip the record. 6943 rdata.data[1] != ((signing->keyid >> 8) & 0xff) || 6944 rdata.data[2] != (signing->keyid & 0xff)) { 6978 data[1] = (signing->keyid >> 8201 del_sig(dns_db_t *db, dns_dbversion_t *version, dns_name_t *name, dns_dbnode_t *node, unsigned int nkeys, dns_secalg_t algorithm, isc_uint16_t keyid, dns_diff_t *diff) argument 17226 dns_zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, isc_uint16_t keyid, isc_boolean_t deleteit) argument 17311 zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, isc_uint16_t keyid, isc_boolean_t deleteit) argument 17488 isc_uint16_t keyid; local 18660 dns_keytag_t keyid; local [all...] |
/bind-9.11.3/lib/dns/tests/ |
H A D | private_test.c | 34 dns_keytag_t keyid; member in struct:__anon201 59 buf[1] = (testcase->keyid & 0xff00) >> 8; 60 buf[2] = (testcase->keyid & 0xff);
|
/bind-9.11.3/bin/named/ |
H A D | tsigconf.c | 38 const char *keyid = NULL; local 61 keyid = cfg_obj_asstring(cfg_map_getname(key)); 73 isc_buffer_constinit(&keynamesrc, keyid, strlen(keyid)); 74 isc_buffer_add(&keynamesrc, strlen(keyid)); 89 keyid, algstr); 126 "configuring key '%s': %s", keyid,
|
H A D | controlconf.c | 751 controlkey_t *keyid, *next; local 760 for (keyid = ISC_LIST_HEAD(*keyids); keyid != NULL; keyid = next) { 761 next = ISC_LIST_NEXT(keyid, link); 763 result = cfgkeylist_find(keylist, keyid->keyname, &keydef); 768 keyid->keyname, socktext); 769 ISC_LIST_UNLINK(*keyids, keyid, link); 770 free_controlkey(keyid, mctx); 793 algstr, keyid 848 controlkey_t *keyid = NULL; local [all...] |
H A D | update.c | 1241 * Replace existing RRSIG with the same keyid, 1248 if (dbsig.keyid == updatesig.keyid && 2339 isc_uint16_t keyid; local 2426 keyid = dst_region_computeid(&r, dnskey.algorithm); 2429 buf[1] = (keyid & 0xff00) >> 8; 2430 buf[2] = (keyid & 0xff); 3254 isc_uint16_t keyid; local 3267 keyid = dst_region_computeid(&r, algorithm); 3269 result = dns_zone_signwithkey(zone, algorithm, keyid, [all...] |
H A D | server.c | 6121 * of the keyid. 12992 char keystr[DNS_SECALG_FORMATSIZE + 7]; /* <5-digit keyid>/<alg> */ 13814 dns_keytag_t keyid; local 13826 keyid = dst_region_computeid(&r, kd.algorithm); 13828 snprintf(buf, sizeof(buf), "\n keyid: %u", keyid);
|
/bind-9.11.3/bin/tests/dst/ |
H A D | t_dst.c | 953 * av == datafile, sigpath, keyname, keyid, alg, exp_result. 961 int keyid; local 973 keyid = atoi(key); 995 t2_sigchk(datapath, sigpath, keyname, keyid,
|
/bind-9.11.3/lib/bind9/ |
H A D | check.c | 2610 const char *keyid = cfg_obj_asstring(cfg_map_getname(key)); local 2615 isc_buffer_constinit(&b, keyid, strlen(keyid)); 2616 isc_buffer_add(&b, strlen(keyid)); 2621 "key '%s': bad key name", keyid); 2650 keyid, file, line);
|