/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | cert_37.h | 29 isc_uint8_t algorithm; member in struct:dns_rdata_cert
|
H A D | dlv_32769.h | 27 isc_uint8_t algorithm; member in struct:dns_rdata_dlv
|
H A D | dnskey_48.h | 31 isc_uint8_t algorithm; member in struct:dns_rdata_dnskey
|
H A D | ds_43.h | 29 isc_uint8_t algorithm; member in struct:dns_rdata_ds
|
H A D | key_25.h | 31 isc_uint8_t algorithm; member in struct:dns_rdata_key_t
|
H A D | sshfp_44.h | 29 isc_uint8_t algorithm; member in struct:dns_rdata_sshfp
|
H A D | hip_55.h | 30 isc_uint8_t algorithm; member in struct:dns_rdata_hip
|
H A D | ipseckey_45.h | 27 isc_uint8_t algorithm; member in struct:dns_rdata_ipseckey
|
H A D | rrsig_46.h | 29 dns_secalg_t algorithm; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 30 dns_secalg_t algorithm; member in struct:dns_rdata_sig_t
|
H A D | tkey_249.h | 29 dns_name_t algorithm; member in struct:dns_rdata_tkey
|
H A D | dnskey_48.c | 61 /* algorithm */ 87 unsigned char algorithm; local 107 /* algorithm */ 108 algorithm = sr.base[0]; 109 sprintf(buf, "%u", algorithm); 137 sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm)); 146 unsigned char algorithm; local 164 algorithm = sr.base[3]; 165 if (algorithm == DST_ALG_RSAMD5 && sr.length < 7) 220 RETERR(uint8_tobuffer(dnskey->algorithm, targe [all...] |
H A D | key_25.c | 61 /* algorithm */ 87 unsigned char algorithm; local 107 /* algorithm */ 108 algorithm = sr.base[0]; 109 sprintf(buf, "%u", algorithm); 137 sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm)); 146 unsigned char algorithm; local 164 algorithm = sr.base[3]; 165 if (algorithm == DST_ALG_RSAMD5 && sr.length < 3) 220 RETERR(uint8_tobuffer(key->algorithm, targe [all...] |
H A D | hip_55.c | 126 unsigned char algorithm; local 137 algorithm = uint8_fromregion(®ion); 149 sprintf(buf, "%u ", algorithm); 209 isc_region_consume(®ion, 2); /* hit length + algorithm */ 276 RETERR(uint8_tobuffer(hip->algorithm, target)); 308 hip->algorithm = uint8_fromregion(®ion);
|
/bind-9.6-ESV-R11/lib/dns/rdata/any_255/ |
H A D | tsig_250.h | 27 dns_name_t algorithm; member in struct:dns_rdata_any_tsig
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | tsig.h | 80 dns_name_t *algorithm; /*%< Algorithm name */ member in struct:dns_tsigkey 98 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm, 105 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, 116 * unimplemented algorithm will cause failure only if dstkey != NULL; this 117 * allows a transient key with an invalid algorithm to exist long enough 125 *\li 'algorithm' is a valid dns_name_t 137 *\li #ISC_R_NOTIMPLEMENTED - algorithm is not implemented 224 dns_name_t *algorithm, dns_tsig_keyring_t *ring); 227 * algorithm. Also increments the key's reference counter. 233 *\li 'algorithm' i [all...] |
/bind-9.6-ESV-R11/lib/dns/ |
H A D | keytable.c | 221 dns_secalg_t algorithm, dns_keytag_t tag, 229 * Search for a key named 'name', matching 'algorithm' and 'tag' in 244 * didn't get a match on algorithm and key id arguments. 253 if (algorithm == dst_key_alg(knode->key) 220 dns_keytable_findkeynode(dns_keytable_t *keytable, dns_name_t *name, dns_secalg_t algorithm, dns_keytag_t tag, dns_keynode_t **keynodep) argument
|
H A D | opensslrsa_link.c | 1315 dst__opensslrsa_init(dst_func_t **funcp, unsigned char algorithm) { argument 1319 switch (algorithm) {
|
H A D | tkey.c | 291 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_HMACMD5_NAME)) { 396 RETERR(dns_tsigkey_create(name, &tkeyin->algorithm, 440 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPI_NAME) && 441 !dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPIMS_NAME)) { 455 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring); 497 RETERR(dns_tsigkey_createfromkey(name, &tkeyin->algorithm, 563 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring); 684 dns_name_init(&tkeyout.algorithm, NULL); 685 dns_name_clone(&tkeyin.algorithm, &tkeyout.algorithm); 917 dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name, dns_name_t *algorithm, isc_buffer_t *nonce, isc_uint32_t lifetime) argument [all...] |
H A D | tsig.c | 249 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, argument 261 REQUIRE(algorithm != NULL); 275 if (dns_name_equal(algorithm, DNS_TSIG_HMACMD5_NAME)) { 276 tkey->algorithm = DNS_TSIG_HMACMD5_NAME; 281 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA1_NAME)) { 282 tkey->algorithm = DNS_TSIG_HMACSHA1_NAME; 287 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA224_NAME)) { 288 tkey->algorithm = DNS_TSIG_HMACSHA224_NAME; 294 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA256_NAME)) { 295 tkey->algorithm 516 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm, unsigned char *secret, int length, isc_boolean_t generated, dns_name_t *creator, isc_stdtime_t inception, isc_stdtime_t expire, isc_mem_t *mctx, dns_tsig_keyring_t *ring, dns_tsigkey_t **key) argument 1513 dns_tsigkey_find(dns_tsigkey_t **tsigkey, dns_name_t *name, dns_name_t *algorithm, dns_tsig_keyring_t *ring) argument [all...] |
H A D | zone.c | 514 dns_secalg_t algorithm; member in struct:dns_signing 634 static isc_result_t zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, 2217 const char *algorithm; local 2238 if ((dnskey.algorithm == DST_ALG_RSASHA1 || 2239 dnskey.algorithm == DST_ALG_RSAMD5) && 2243 if (dnskey.algorithm == DST_ALG_RSASHA1) { 2246 algorithm = "RSASHA1"; 2250 algorithm = "RSAMD5"; 2255 "(exponent=3)", algorithm, 2256 dnskey.algorithm); 5576 del_sig(dns_db_t *db, dns_dbversion_t *version, dns_name_t *name, dns_dbnode_t *node, unsigned int nkeys, dns_secalg_t algorithm, isc_uint16_t keyid, dns_diff_t *diff) argument 11831 dns_zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, isc_uint16_t keyid, isc_boolean_t delete) argument 11914 zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, isc_uint16_t keyid, isc_boolean_t delete) argument [all...] |
/bind-9.6-ESV-R11/bin/rndc/ |
H A D | rndc.c | 452 const char *algorithm; local 547 (void)cfg_map_get(key, "algorithm", &algorithmobj); 549 fatal("key must have algorithm and secret"); 552 algorithm = cfg_obj_asstring(algorithmobj); 554 if (strcasecmp(algorithm, "hmac-md5") != 0) 555 fatal("unsupported algorithm: %s", algorithm);
|
/bind-9.6-ESV-R11/lib/bind9/ |
H A D | check.c | 291 ISC_LOG_ERROR, "invalid algorithm '%s'", 1401 const char *algorithm; local 1419 (void)cfg_map_get(key, "algorithm", &algobj); 1424 "'algorithm' defined", 1438 algorithm = cfg_obj_asstring(algobj); 1441 if (strncasecmp(algorithms[i].name, algorithm, len) == 0 && 1442 (algorithm[len] == '\0' || 1443 (algorithms[i].size != 0 && algorithm[len] == '-'))) 1448 "unknown algorithm '%s'", algorithm); [all...] |
/bind-9.6-ESV-R11/bin/named/ |
H A D | update.c | 1182 * covered and algorithm. 1190 dbsig.algorithm == updatesig.algorithm) 3345 keyid = dst_region_computeid(&r, dnskey.algorithm); 3347 buf[0] = dnskey.algorithm; 4166 dns_secalg_t algorithm; local 4179 algorithm = dnskey.algorithm; 4180 keyid = dst_region_computeid(&r, algorithm); 4182 result = dns_zone_signwithkey(zone, algorithm, keyi [all...] |