/bind-9.11.3/lib/dns/ |
H A D | keydata.c | 27 dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) 29 REQUIRE(keydata != NULL && dnskey != NULL); 31 dnskey->common.rdtype = dns_rdatatype_dnskey; 32 dnskey->common.rdclass = keydata->common.rdclass; 33 dnskey->mctx = mctx; 34 dnskey->flags = keydata->flags; 35 dnskey->protocol = keydata->protocol; 36 dnskey->algorithm = keydata->algorithm; 38 dnskey->datalen = keydata->datalen; 41 dnskey 26 dns_keydata_todnskey(dns_rdata_keydata_t *keydata, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) argument 53 dns_keydata_fromdnskey(dns_rdata_keydata_t *keydata, dns_rdata_dnskey_t *dnskey, isc_uint32_t refresh, isc_uint32_t addhd, isc_uint32_t removehd, isc_mem_t *mctx) argument [all...] |
H A D | nsec.c | 241 dns_rdata_dnskey_t dnskey; local 266 result = dns_rdata_tostruct(&rdata, &dnskey, NULL); 269 if (dnskey.algorithm == DST_ALG_RSAMD5 || 270 dnskey.algorithm == DST_ALG_RSASHA1 || 271 dnskey.algorithm == DST_ALG_DSA || 272 dnskey.algorithm == DST_ALG_ECC)
|
H A D | view.c | 1945 dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) 1958 dnskey->flags &= ~DNS_KEYFLAG_REVOKE; 1960 /* Convert dnskey to DST key. */ 1962 dns_rdata_fromstruct(&rdata, dnskey->common.rdclass, 1963 dns_rdatatype_dnskey, dnskey, &buffer); 1944 dns_view_untrust(dns_view_t *view, dns_name_t *keyname, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) argument
|
H A D | dnssec.c | 1864 dns_rdata_t dnskey = DNS_RDATA_INIT; local 1867 dns_rdata_reset(&dnskey); 1868 RETERR(make_dnskey(key->key, buf, sizeof(buf), &dnskey)); 1890 &dnskey, &tuple)); 1906 dns_rdata_t dnskey = DNS_RDATA_INIT; local 1913 RETERR(make_dnskey(key->key, buf, sizeof(buf), &dnskey)); 1914 RETERR(dns_difftuple_create(mctx, DNS_DIFFOP_DEL, origin, ttl, &dnskey,
|
H A D | zone.c | 3189 dns_rdata_dnskey_t dnskey; local 3212 result = dns_rdata_tostruct(&rdata, &dnskey, NULL); 3215 if ((dnskey.algorithm == DST_ALG_RSASHA1 || 3216 dnskey.algorithm == DST_ALG_RSAMD5) && 3217 dnskey.datalen > 1 && dnskey.data[0] == 1 && 3218 dnskey.data[1] == 3) 3220 if (dnskey.algorithm == DST_ALG_RSASHA1) { 3233 dnskey.algorithm); 3777 dns_rdata_dnskey_t dnskey; local 3874 compute_tag(dns_name_t *name, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx, dns_keytag_t *tag) argument 3899 trust_key(dns_zone_t *zone, dns_name_t *keyname, dns_rdata_dnskey_t *dnskey, isc_mem_t *mctx) argument 3955 dns_rdata_dnskey_t dnskey; local 8769 dns_rdata_dnskey_t dnskey; local 8973 dns_rdata_dnskey_t dnskey; local 9052 dns_rdata_dnskey_t dnskey; local 17483 dns_rdata_dnskey_t dnskey; local 18172 dns_rdataset_t dnskey, cds, cdnskey; local [all...] |
/bind-9.11.3/bin/tests/system/checkds/ |
H A D | dig.bat | 14 if "%arg%" == "dnskey" goto dnskey 15 if "%arg%" == "DNSKEY" goto dnskey 27 :dnskey label 28 set ext=dnskey
|
/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | cdnskey_60.c | 86 dns_rdata_cdnskey_t *dnskey = target; local 88 REQUIRE(dnskey != NULL); 92 dnskey->common.rdclass = rdata->rdclass; 93 dnskey->common.rdtype = rdata->type; 94 ISC_LINK_INIT(&dnskey->common, link); 101 dns_rdata_cdnskey_t *dnskey = (dns_rdata_cdnskey_t *) source; local 103 REQUIRE(dnskey != NULL); 104 REQUIRE(dnskey->common.rdtype == dns_rdatatype_cdnskey);
|
H A D | dnskey_48.c | 93 dns_rdata_dnskey_t *dnskey = target; local 95 REQUIRE(dnskey != NULL); 99 dnskey->common.rdclass = rdata->rdclass; 100 dnskey->common.rdtype = rdata->type; 101 ISC_LINK_INIT(&dnskey->common, link); 108 dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *) source; local 110 REQUIRE(dnskey != NULL); 111 REQUIRE(dnskey->common.rdtype == dns_rdatatype_dnskey);
|
/bind-9.11.3/contrib/kasp/ |
H A D | kasp2policy.py | 24 from isc import dnskey namespace 194 print("\talgorithm %s;" % dnskey.algstr(int(algnum)))
|
/bind-9.11.3/lib/dns/tests/ |
H A D | master_test.c | 300 ATF_TC(dnskey); variable 301 ATF_TC_HEAD(dnskey, tc) { 305 ATF_TC_BODY(dnskey, tc) { 666 ATF_TP_ADD_TC(tp, dnskey);
|
/bind-9.11.3/bin/dnssec/ |
H A D | dnssec-dsfromkey.c | 247 dns_rdata_dnskey_t dnskey; local 255 result = dns_rdata_tostruct(rdata, &dnskey, NULL); 259 if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0 && !showall)
|
H A D | dnssectool.c | 1483 dns_rdata_dnskey_t dnskey; local 1582 result = dns_rdata_tostruct(&rdata, &dnskey, NULL); 1585 if ((dnskey.flags & DNS_KEYOWNER_ZONE) == 0) 1587 else if ((dnskey.flags & DNS_KEYFLAG_REVOKE) != 0) { 1588 if ((dnskey.flags & DNS_KEYFLAG_KSK) != 0 && 1605 if ((dnskey.flags & DNS_KEYFLAG_KSK) != 0 && 1606 revoked_ksk[dnskey.algorithm] != 255) 1607 revoked_ksk[dnskey.algorithm]++; 1608 else if ((dnskey.flags & DNS_KEYFLAG_KSK) == 0 && 1609 revoked_zsk[dnskey [all...] |
H A D | dnssec-signzone.c | 288 fatal("dnskey '%s' failed to sign data: %s", 553 "private dnskey not found\n", 557 vbprintf(2, "\trrsig by %s %s - dnskey not found\n", 579 vbprintf(2, "\trrsig by %s dropped - dnskey removed\n", 637 "resigning with dnskey"); 682 "signing with dnskey"); 687 "signing with dnskey"); 2559 fatal("cannot load dnskey %s: %s", keyfiles[i], 2566 fatal("cannot sign zone with non-private dnskey %s", 2653 dns_rdata_dnskey_t dnskey; local [all...] |
/bind-9.11.3/bin/named/ |
H A D | update.c | 2334 dns_rdata_dnskey_t dnskey; local 2417 result = dns_rdata_tostruct(&tuple->rdata, &dnskey, NULL); 2419 if ((dnskey.flags & 2426 keyid = dst_region_computeid(&r, dnskey.algorithm); 2428 buf[0] = dnskey.algorithm; 2500 dns_rdata_dnskey_t dnskey; local 3259 dns_rdata_tostruct(&tuple->rdata, &dnskey, NULL); 3260 if ((dnskey.flags & 3266 algorithm = dnskey.algorithm;
|