/bind-9.11.3/lib/dns/ |
H A D | zonekey.c | 28 dns_rdata_dnskey_t key; local 33 result = dns_rdata_tostruct(keyrdata, &key, NULL); 37 if ((key.flags & DNS_KEYTYPE_NOAUTH) != 0) 39 if ((key.flags & DNS_KEYFLAG_OWNERMASK) != DNS_KEYOWNER_ZONE) 41 if (key.protocol != DNS_KEYPROTO_DNSSEC && 42 key.protocol != DNS_KEYPROTO_ANY)
|
H A D | tsec.c | 35 dst_key_t *key; member in union:dns_tsec::__anon204 40 dns_tsec_create(isc_mem_t *mctx, dns_tsectype_t type, dst_key_t *key, argument 60 switch (dst_key_alg(key)) { 85 result = dns_tsigkey_createfromkey(dst_key_name(key), 86 algname, key, ISC_FALSE, 96 tsec->ukey.key = key; 121 dst_key_free(&tsec->ukey.key); 150 *(dst_key_t **)keyp = tsec->ukey.key;
|
H A D | ds.c | 37 dns_ds_buildrdata(dns_name_t *owner, dns_rdata_t *key, argument 54 REQUIRE(key != NULL); 55 REQUIRE(key->type == dns_rdatatype_dnskey); 72 dns_rdata_toregion(key, &r); 91 dns_rdata_toregion(key, &r); 102 dns_rdata_toregion(key, &r); 113 dns_rdata_toregion(key, &r); 121 ds.common.rdclass = key->rdclass; 148 return (dns_rdata_fromstruct(rdata, key->rdclass, dns_rdatatype_ds,
|
H A D | key.c | 9 /* $Id: key.c,v 1.11 2011/10/20 21:20:02 marka Exp $ */ 78 dst_key_name(const dst_key_t *key) { argument 79 REQUIRE(VALID_KEY(key)); 80 return (key->key_name); 84 dst_key_size(const dst_key_t *key) { argument 85 REQUIRE(VALID_KEY(key)); 86 return (key->key_size); 90 dst_key_proto(const dst_key_t *key) { argument 91 REQUIRE(VALID_KEY(key)); 92 return (key 96 dst_key_alg(const dst_key_t *key) argument 102 dst_key_flags(const dst_key_t *key) argument 108 dst_key_id(const dst_key_t *key) argument 114 dst_key_rid(const dst_key_t *key) argument 120 dst_key_class(const dst_key_t *key) argument 126 dst_key_iszonekey(const dst_key_t *key) argument 140 dst_key_isnullkey(const dst_key_t *key) argument 154 dst_key_setbits(dst_key_t *key, isc_uint16_t bits) argument 166 dst_key_getbits(const dst_key_t *key) argument 172 dst_key_setttl(dst_key_t *key, dns_ttl_t ttl) argument 178 dst_key_getttl(const dst_key_t *key) argument [all...] |
/bind-9.11.3/lib/isc/include/isc/ |
H A D | hmacmd5.h | 50 unsigned char key[ISC_HMACMD5_KEYLENGTH]; member in struct:__anon228 57 isc_hmacmd5_init(isc_hmacmd5_t *ctx, const unsigned char *key,
|
H A D | hmacsha.h | 61 unsigned char key[ISC_HMACSHA1_KEYLENGTH]; member in struct:__anon230 66 unsigned char key[ISC_HMACSHA224_KEYLENGTH]; member in struct:__anon231 71 unsigned char key[ISC_HMACSHA256_KEYLENGTH]; member in struct:__anon232 76 unsigned char key[ISC_HMACSHA384_KEYLENGTH]; member in struct:__anon233 81 unsigned char key[ISC_HMACSHA512_KEYLENGTH]; member in struct:__anon234 88 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, 109 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, 127 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, 145 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, 163 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, [all...] |
/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | hip_55.h | 20 unsigned char * key; member in struct:dns_rdata_hip
|
H A D | ipseckey_45.h | 23 unsigned char *key; member in struct:dns_rdata_ipseckey
|
H A D | tkey_249.h | 26 unsigned char * key; member in struct:dns_rdata_tkey
|
/bind-9.11.3/lib/dns/tests/ |
H A D | dh_test.c | 38 dst_key_t *key = NULL; local 59 "./", mctx, &key); 63 ret = dst_key_computesecret(key, key, &buf); 65 ret = key->func->computesecret(key, key, &buf); 68 dst_key_free(&key);
|
H A D | rsa_test.c | 186 dst_key_t *key = NULL; local 203 DST_TYPE_PUBLIC, "./", mctx, &key); 208 ret = dst_context_create3(key, mctx, DNS_LOGCATEGORY_DNSSEC, 227 key->key_alg = DST_ALG_RSAMD5; 229 ret = dst_context_create3(key, mctx, DNS_LOGCATEGORY_DNSSEC, 248 key->key_alg = DST_ALG_RSASHA256; 250 ret = dst_context_create3(key, mctx, DNS_LOGCATEGORY_DNSSEC, 268 key->key_alg = DST_ALG_RSASHA512; 270 ret = dst_context_create3(key, mctx, DNS_LOGCATEGORY_DNSSEC, 287 dst_key_free(&key); [all...] |
/bind-9.11.3/lib/isc/tests/ |
H A D | symtab_test.c | 25 undefine(char *key, unsigned int type, isc_symvalue_t value, void *arg) { argument 29 isc_mem_free(mctx, key); 64 char str[16], *key; local 67 key = isc_mem_strdup(mctx, str); 68 ATF_REQUIRE(key != NULL); 71 result = isc_symtab_define(st, key, 1, value, policy); 74 undefine(key, 1, value, NULL); 81 char str[16], *key; local 84 key = isc_mem_strdup(mctx, str); 85 ATF_REQUIRE(key ! [all...] |
H A D | aes_test.c | 43 unsigned char key[ISC_AES256_KEYLENGTH + 1]; variable 71 const char *key; member in struct:aes_testcase 126 while (testcase->key != NULL) { 127 len = fromhexstr(testcase->key, key); 131 isc_aes128_crypt(key, plaintext, ciphertext); 188 while (testcase->key != NULL) { 189 len = fromhexstr(testcase->key, key); 193 isc_aes192_crypt(key, plaintex [all...] |
H A D | ht_test.c | 59 * to ensure we are always filling the 16 byte key. 61 unsigned char key[16]; local 62 snprintf((char *)key, sizeof(key), "%u", (unsigned int)i); 63 strlcat((char *)key, " key of a raw hashtable!!", sizeof(key)); 64 result = isc_ht_add(ht, key, 16, (void *) i); 69 unsigned char key[16]; local 71 snprintf((char *)key, sizeo 79 unsigned char key[16]; local 87 char key[64]; local 100 unsigned char key[16]; local 113 char key[64]; local 124 unsigned char key[16]; local 136 unsigned char key[16]; local 147 char key[64]; local 162 unsigned char key[16]; local 175 unsigned char key[16]; local 197 unsigned char key[16]; local [all...] |
/bind-9.11.3/bin/tools/ |
H A D | isc-hmac-fixup.c | 31 unsigned char key[1024]; local 64 isc_md5_final(&md5ctx, key); 66 r.base = key; 77 isc_sha1_final(&sha1ctx, key); 79 r.base = key; 88 isc_sha224_final(key, &sha224ctx); 90 r.base = key; 99 isc_sha256_final(key, &sha256ctx); 101 r.base = key; 110 isc_sha384_final(key, [all...] |
H A D | named-nzd2nzf.c | 31 MDB_val key, data; local 75 for (status = mdb_cursor_get(cursor, &key, &data, MDB_FIRST); 77 status = mdb_cursor_get(cursor, &key, &data, MDB_NEXT)) 79 if (key.mv_data == NULL || key.mv_size == 0 || 90 (int) key.mv_size, (char *) key.mv_data,
|
/bind-9.11.3/lib/isc/win32/ |
H A D | thread.c | 67 isc_thread_key_getspecific(isc_thread_key_t key) { argument 68 return(TlsGetValue(key)); 72 isc_thread_key_setspecific(isc_thread_key_t key, void *value) { argument 73 return (TlsSetValue(key, value) ? 0 : GetLastError()); 77 isc_thread_key_create(isc_thread_key_t *key, void (*func)(void *)) { argument 78 *key = TlsAlloc(); 80 return ((*key != -1) ? 0 : GetLastError()); 84 isc_thread_key_delete(isc_thread_key_t key) { argument 85 return (TlsFree(key) ? 0 : GetLastError());
|
/bind-9.11.3/bin/tests/ |
H A D | sym_test.c | 25 undefine_action(char *key, unsigned int type, isc_symvalue_t value, void *arg) argument 30 isc_mem_free(mctx, key); 36 char s[1000], *cp, *key; local 82 key = cp; 86 result = isc_symtab_lookup(st, key, 0, &value); 88 printf("lookup('%s'): %s", key, 98 key = isc_mem_strdup(mctx, key); 100 result = isc_symtab_define(st, key, 1, value, 104 key, c [all...] |
H A D | hash_test.c | 58 unsigned char key[20]; local 103 memset(key, 0x0b, 16); 104 isc_hmacmd5_init(&hmacmd5, key, 16); 111 strlcpy((char *)key, "Jefe", sizeof(key)); 112 isc_hmacmd5_init(&hmacmd5, key, 4); 123 memset(key, 0xaa, 16); 124 isc_hmacmd5_init(&hmacmd5, key, 16); 135 memset(key, 0x0b, 20); 136 isc_hmacsha1_init(&hmacsha1, key, 2 [all...] |
/bind-9.11.3/lib/isc/ |
H A D | aes.c | 34 isc_aes128_crypt(const unsigned char *key, const unsigned char *in, argument 45 RUNTIME_CHECK(EVP_EncryptInit(c, EVP_aes_128_ecb(), key, NULL) == 1); 54 isc_aes192_crypt(const unsigned char *key, const unsigned char *in, argument 65 RUNTIME_CHECK(EVP_EncryptInit(c, EVP_aes_192_ecb(), key, NULL) == 1); 74 isc_aes256_crypt(const unsigned char *key, const unsigned char *in, argument 85 RUNTIME_CHECK(EVP_EncryptInit(c, EVP_aes_256_ecb(), key, NULL) == 1); 98 isc_aes128_crypt(const unsigned char *key, const unsigned char *in, argument 103 RUNTIME_CHECK(AES_set_encrypt_key(key, 128, &k) == 0); 108 isc_aes192_crypt(const unsigned char *key, const unsigned char *in, argument 113 RUNTIME_CHECK(AES_set_encrypt_key(key, 19 118 isc_aes256_crypt(const unsigned char *key, const unsigned char *in, unsigned char *out) argument 139 isc_aes128_crypt(const unsigned char *key, const unsigned char *in, unsigned char *out) argument 146 isc_aes192_crypt(const unsigned char *key, const unsigned char *in, unsigned char *out) argument 153 isc_aes256_crypt(const unsigned char *key, const unsigned char *in, unsigned char *out) argument 160 isc_aes_crypt(const unsigned char *key, CK_ULONG keylen, const unsigned char *in, unsigned char *out) argument [all...] |
/bind-9.11.3/contrib/sdb/bdb/ |
H A D | bdb.c | 115 DBT key, data; local 132 memset(&key, 0, sizeof(DBT)); 135 (const char *)key.data = name; 136 key.size = strlen(name); 138 ret = c->c_get(c, &key, &data, DB_SET); 140 ((char *)key.data)[key.size] = 0; 156 ret = c->c_get(c, &key, &data, DB_NEXT_DUP); 171 DBT key, data; local 184 memset(&key, [all...] |
/bind-9.11.3/lib/dns/include/dns/ |
H A D | dnssec.h | 33 * Indicates how the signer found this key: in the key repository, at the 44 * A DNSSEC key and hints about its intended use gleaned from metadata 47 dst_key_t *key; member in struct:dns_dnsseckey 50 isc_boolean_t hint_sign; /*% metadata says to sign with this key */ 51 isc_boolean_t force_sign; /*% sign with key regardless of metadata */ 53 isc_boolean_t is_active; /*% key is already active */ 54 isc_boolean_t first_sign; /*% key is newly becoming active */ 56 dns_keysource_t source; /*% how the key was found */ 57 isc_boolean_t ksk; /*% this is a key [all...] |
/bind-9.11.3/bin/confgen/ |
H A D | keygen.c | 114 * Generate a key of size 'keysize' using entropy source 'randomfile', 128 dst_key_t *key = NULL; local 167 DO("generate key", dst_key_generate(dns_rootname, alg, 170 dns_rdataclass_in, mctx, &key)); 174 DO("dump key to buffer", dst_key_tobuffer(key, &key_rawbuffer)); 188 if (key != NULL) 189 dst_key_free(&key); 196 * Write a key file to 'keyfile'. If 'user' is non-NULL, 197 * make that user the owner of the file. The key wil [all...] |
/bind-9.11.3/bin/dnssec/ |
H A D | dnssec-revoke.c | 60 fprintf(stderr, " -K directory: use directory for key files\n"); 67 fprintf(stderr, " K<name>+<alg>+<new id>.key, " 88 dst_key_t *key = NULL; local 161 fatal("The key file name was not specified"); 194 mctx, &key); 200 fprintf(stdout, "%u\n", dst_key_rid(key)); 203 dst_key_format(key, keystr, sizeof(keystr)); 209 set_keyversion(key); 211 check_keyversion(key, keystr); 214 flags = dst_key_flags(key); [all...] |
/bind-9.11.3/bin/tests/system/rsabigexponent/ |
H A D | bigkey.c | 53 * Use a fixed key file pair if OpenSSL doesn't support > 32 bit exponents. 69 fputs("Private-key-format: v1.3\n", fp); 96 fp = fopen("Kexample.+005+10264.key", "w"); 98 perror("fopen(Kexample.+005+10264.key)"); 102 fputs("; This is a zone-signing key, keyid 10264, for example.\n", fp); 109 perror("close(Kexample.+005+10264.key)"); 122 dst_key_t *key; variable 216 pkey, mctx, &key), 219 CHECK(dst_key_tofile(key, DST_TYPE_PRIVATE | DST_TYPE_PUBLIC, NULL), 223 CHECK(dst_key_buildfilename(key, [all...] |