/bind-9.11.3/lib/dns/include/dns/ |
H A D | ipkeylist.h | 16 * A structure holding a list of addresses, dscps and keys. Used to 22 dns_name_t **keys; member in struct:dns_ipkeylist
|
H A D | tsig.h | 57 dns_rbt_t *keys; member in struct:dns_tsig_keyring 62 * LRU list of generated key along with a count of the keys on the 109 * not NULL, *key will contain a copy of the key. The keys validity
|
/bind-9.11.3/lib/dns/ |
H A D | ipkeylist.c | 26 ipkl->keys = NULL; 47 if (ipkl->keys != NULL) { 49 if (ipkl->keys[i] == NULL) 51 if (dns_name_dynamic(ipkl->keys[i])) 52 dns_name_free(ipkl->keys[i], mctx); 53 isc_mem_put(mctx, ipkl->keys[i], sizeof(dns_name_t)); 55 isc_mem_put(mctx, ipkl->keys, 99 if (src->keys != NULL) { 101 if (src->keys[i] != NULL) { 102 dst->keys[ 168 dns_name_t **keys = NULL; local [all...] |
H A D | update.c | 1048 dst_key_t **keys, unsigned int *nkeys) 1055 directory, mctx, maxkeys, keys, nkeys)); 1068 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, 1100 * have both KSK and non-KSK keys that are not revoked per 1106 if (!dst_key_isprivate(keys[i])) 1108 if (dst_key_inactive(keys[i])) /* Should be redundant. */ 1111 if (check_ksk && !REVOKE(keys[i])) { 1113 if (KSK(keys[i])) { 1121 if (j == i || ALG(keys[i]) != ALG(keys[ 1046 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 1066 add_sigs(dns_update_log_t *log, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly) argument 1188 del_keysigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) argument 1262 add_exposed_sigs(dns_update_log_t *log, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, isc_boolean_t cut, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly, unsigned int *sigs) argument [all...] |
H A D | dnssec.c | 619 * keys are assumed active 734 dst_key_t **keys, unsigned int *nkeys) 743 REQUIRE(keys != NULL); 746 memset(keys, 0, sizeof(*keys) * maxkeys); 763 keys[count] = NULL; 769 mctx, &keys[count]); 788 mctx, &keys[count]); 790 dst_key_pubcompare(pubkey, keys[count], 792 dst_key_setflags(keys[coun 730 dns_dnssec_findzonekeys3(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_stdtime_t now, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 891 dns_dnssec_findzonekeys2(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 905 dns_dnssec_findzonekeys(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 1664 dns_rdataset_t keys; local 1946 dns_dnssec_syncupdate(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *rmkeys, dns_rdataset_t *cds, dns_rdataset_t *cdnskey, isc_stdtime_t now, dns_ttl_t ttl, dns_diff_t *diff, isc_mem_t *mctx) argument 2073 dns_dnssec_updatekeys(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *newkeys, dns_dnsseckeylist_t *removed, dns_name_t *origin, dns_ttl_t hint_ttl, dns_diff_t *diff, isc_boolean_t allzsk, isc_mem_t *mctx, void (*report)(const char *, ...)) argument [all...] |
H A D | zone.c | 3181 * OpenSSL verification of RSA keys with exponent 3 is known to be 3182 * broken prior OpenSSL 0.9.8c/0.9.7k. Look for such keys and warn 3524 * apex to exist and contain no keys using NSEC-only algorithms. 3824 /* Refresh new keys from the zone apex as soon as possible. */ 3948 * valid (i.e., the add holddown timer has expired) become trusted keys. 4233 * Synchronize the set of initializing keys found in managed-keys {} 4234 * statements with the set of trust anchors found in the managed-keys.bind 4235 * zone. If a domain is no longer named in managed-keys, delete all keys 6025 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_stdtime_t now, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 6101 delsig_ok(dns_rdata_rrsig_t *rrsig_ptr, dst_key_t **keys, unsigned int nkeys, isc_boolean_t *warn) argument 6155 del_sigs(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, zonediff_t *zonediff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t now, isc_boolean_t incremental) argument 6333 add_sigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_mem_t *mctx, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly) argument 17764 dns_dnsseckeylist_t dnskeys, keys, rmkeys; local [all...] |
/bind-9.11.3/lib/irs/ |
H A D | dnsconf.c | 50 const cfg_obj_t *keys = NULL; local 67 cfg_map_get(cfgobj, "trusted-keys", &keys); 68 if (keys == NULL) 71 for (element = cfg_list_first(keys);
|
/bind-9.11.3/unit/atf-src/atf-c/detail/ |
H A D | map_test.c | 285 char keys[10][5]; local 303 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]); 304 RE(atf_map_insert(&map, keys[i], &nums[i], false)); 326 char keys[10][5]; local 344 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]); 345 RE(atf_map_insert(&map, keys[i], &nums[i], false)); 365 atf_tc_set_md_var(tc, "descr", "Checks that the keys do not change "
|
/bind-9.11.3/bin/named/ |
H A D | config.c | 41 #include <bind.keys.h> 47 bindkeys-file \"" NS_SYSCONFDIR "/bind.keys\";\n\ 290 # sysconfdir/bind.keys doesn't exist).\n\ 294 /* Imported from bind.keys.h: */ 586 dns_name_t **keys = NULL; local 597 REQUIRE(ipkl->keys == NULL); 760 memmove(tmp, keys, oldsize); 761 isc_mem_put(mctx, keys, oldsize); 763 keys = tmp; 773 keys[ [all...] |
H A D | controlconf.c | 90 controlkeylist_t keys; member in struct:controllistener 139 free_controlkeylist(&listener->keys, listener->mctx); 362 for (key = ISC_LIST_HEAD(listener->keys); 758 * Find the keys corresponding to the keyids used by this listener. 948 control_keylist = cfg_tuple_get(control, "keys"); 972 controlkeylist_t keys; local 1013 ISC_LIST_INIT(keys); 1015 listener->mctx, &keys); 1017 free_controlkeylist(&listener->keys, listener->mctx); 1018 listener->keys [all...] |
H A D | server.c | 810 load_view_keys(const cfg_obj_t *keys, const cfg_obj_t *vconfig, argument 822 for (elt = cfg_list_first(keys); 888 * Configure DNSSEC keys for a view. 920 (void) cfg_map_get(voptions, "trusted-keys", 922 (void) cfg_map_get(voptions, "managed-keys", 929 (void)cfg_map_get(config, "trusted-keys", &global_keys); 930 (void)cfg_map_get(config, "managed-keys", &global_managed_keys); 961 * If bind.keys exists and is populated, it overrides 962 * the managed-keys clause hard-coded in ns_g_config. 971 (void)cfg_map_get(bindkeys, "trusted-keys", [all...] |
/bind-9.11.3/bin/rndc/ |
H A D | rndc.c | 122 Update keys without signing immediately.\n\ 123 managed-keys refresh [class [view]]\n\ 125 managed-keys status [class [view]]\n\ 126 Display RFC 5011 managed keys information\n\ 127 managed-keys sync [class [view]]\n\ 128 Write RFC 5011 managed keys to disk\n\ 164 Update zone keys, and sign as needed.\n\ 166 Remove the private records for all keys that have\n\ 198 tsig-list List all currently active TSIG keys, including both statically\n\ 199 configured and TKEY-negotiated keys 522 const cfg_obj_t *keys = NULL; local [all...] |
/bind-9.11.3/bin/delv/ |
H A D | delv.c | 10 #include <bind.keys.h> 137 /* Default bind.keys contents */ 663 load_keys(const cfg_obj_t *keys, dns_client_t *client) { argument 668 for (elt = cfg_list_first(keys); 693 const cfg_obj_t *keys = NULL; local 703 filename = SYSCONFDIR "/bind.keys"; 707 strlcat(buf, "\\bind.keys", sizeof(buf)); 733 fatal("Unable to load keys from '%s'", 745 fatal("Unable to parse built-in keys"); 749 cfg_map_get(bindkeys, "trusted-keys", [all...] |
/bind-9.11.3/lib/bind9/ |
H A D | check.c | 2588 * are valid domain names as these keys are used for TSIG. 2593 check_keylist(const cfg_obj_t *keys, isc_symtab_t *symtab, argument 2605 for (element = cfg_list_first(keys); 2672 * RNDC keys are not normalised unlike TSIG keys. 2705 const cfg_obj_t *v1, *v2, *keys; local 2776 keys = NULL; 2777 cfg_map_get(v1, "keys", &keys); 2778 if (keys ! 3085 const cfg_obj_t *keys = NULL; local [all...] |