Searched defs:keys (Results 1 - 14 of 14) sorted by relevance

/bind-9.11.3/lib/dns/include/dns/
H A Dipkeylist.h16 * A structure holding a list of addresses, dscps and keys. Used to
22 dns_name_t **keys; member in struct:dns_ipkeylist
H A Dtsig.h57 dns_rbt_t *keys; member in struct:dns_tsig_keyring
62 * LRU list of generated key along with a count of the keys on the
109 * not NULL, *key will contain a copy of the key. The keys validity
/bind-9.11.3/lib/dns/
H A Dipkeylist.c26 ipkl->keys = NULL;
47 if (ipkl->keys != NULL) {
49 if (ipkl->keys[i] == NULL)
51 if (dns_name_dynamic(ipkl->keys[i]))
52 dns_name_free(ipkl->keys[i], mctx);
53 isc_mem_put(mctx, ipkl->keys[i], sizeof(dns_name_t));
55 isc_mem_put(mctx, ipkl->keys,
99 if (src->keys != NULL) {
101 if (src->keys[i] != NULL) {
102 dst->keys[
168 dns_name_t **keys = NULL; local
[all...]
H A Dupdate.c1048 dst_key_t **keys, unsigned int *nkeys)
1055 directory, mctx, maxkeys, keys, nkeys));
1068 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys,
1100 * have both KSK and non-KSK keys that are not revoked per
1106 if (!dst_key_isprivate(keys[i]))
1108 if (dst_key_inactive(keys[i])) /* Should be redundant. */
1111 if (check_ksk && !REVOKE(keys[i])) {
1113 if (KSK(keys[i])) {
1121 if (j == i || ALG(keys[i]) != ALG(keys[
1046 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
1066 add_sigs(dns_update_log_t *log, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly) argument
1188 del_keysigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) argument
1262 add_exposed_sigs(dns_update_log_t *log, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, isc_boolean_t cut, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly, unsigned int *sigs) argument
[all...]
H A Ddnssec.c619 * keys are assumed active
734 dst_key_t **keys, unsigned int *nkeys)
743 REQUIRE(keys != NULL);
746 memset(keys, 0, sizeof(*keys) * maxkeys);
763 keys[count] = NULL;
769 mctx, &keys[count]);
788 mctx, &keys[count]);
790 dst_key_pubcompare(pubkey, keys[count],
792 dst_key_setflags(keys[coun
730 dns_dnssec_findzonekeys3(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_stdtime_t now, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
891 dns_dnssec_findzonekeys2(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
905 dns_dnssec_findzonekeys(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
1664 dns_rdataset_t keys; local
1946 dns_dnssec_syncupdate(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *rmkeys, dns_rdataset_t *cds, dns_rdataset_t *cdnskey, isc_stdtime_t now, dns_ttl_t ttl, dns_diff_t *diff, isc_mem_t *mctx) argument
2073 dns_dnssec_updatekeys(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *newkeys, dns_dnsseckeylist_t *removed, dns_name_t *origin, dns_ttl_t hint_ttl, dns_diff_t *diff, isc_boolean_t allzsk, isc_mem_t *mctx, void (*report)(const char *, ...)) argument
[all...]
H A Dzone.c3181 * OpenSSL verification of RSA keys with exponent 3 is known to be
3182 * broken prior OpenSSL 0.9.8c/0.9.7k. Look for such keys and warn
3524 * apex to exist and contain no keys using NSEC-only algorithms.
3824 /* Refresh new keys from the zone apex as soon as possible. */
3948 * valid (i.e., the add holddown timer has expired) become trusted keys.
4233 * Synchronize the set of initializing keys found in managed-keys {}
4234 * statements with the set of trust anchors found in the managed-keys.bind
4235 * zone. If a domain is no longer named in managed-keys, delete all keys
6025 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_stdtime_t now, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
6101 delsig_ok(dns_rdata_rrsig_t *rrsig_ptr, dst_key_t **keys, unsigned int nkeys, isc_boolean_t *warn) argument
6155 del_sigs(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, zonediff_t *zonediff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t now, isc_boolean_t incremental) argument
6333 add_sigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_mem_t *mctx, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk, isc_boolean_t keyset_kskonly) argument
17764 dns_dnsseckeylist_t dnskeys, keys, rmkeys; local
[all...]
/bind-9.11.3/lib/irs/
H A Ddnsconf.c50 const cfg_obj_t *keys = NULL; local
67 cfg_map_get(cfgobj, "trusted-keys", &keys);
68 if (keys == NULL)
71 for (element = cfg_list_first(keys);
/bind-9.11.3/unit/atf-src/atf-c/detail/
H A Dmap_test.c285 char keys[10][5]; local
303 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]);
304 RE(atf_map_insert(&map, keys[i], &nums[i], false));
326 char keys[10][5]; local
344 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]);
345 RE(atf_map_insert(&map, keys[i], &nums[i], false));
365 atf_tc_set_md_var(tc, "descr", "Checks that the keys do not change "
/bind-9.11.3/bin/named/
H A Dconfig.c41 #include <bind.keys.h>
47 bindkeys-file \"" NS_SYSCONFDIR "/bind.keys\";\n\
290 # sysconfdir/bind.keys doesn't exist).\n\
294 /* Imported from bind.keys.h: */
586 dns_name_t **keys = NULL; local
597 REQUIRE(ipkl->keys == NULL);
760 memmove(tmp, keys, oldsize);
761 isc_mem_put(mctx, keys, oldsize);
763 keys = tmp;
773 keys[
[all...]
H A Dcontrolconf.c90 controlkeylist_t keys; member in struct:controllistener
139 free_controlkeylist(&listener->keys, listener->mctx);
362 for (key = ISC_LIST_HEAD(listener->keys);
758 * Find the keys corresponding to the keyids used by this listener.
948 control_keylist = cfg_tuple_get(control, "keys");
972 controlkeylist_t keys; local
1013 ISC_LIST_INIT(keys);
1015 listener->mctx, &keys);
1017 free_controlkeylist(&listener->keys, listener->mctx);
1018 listener->keys
[all...]
H A Dserver.c810 load_view_keys(const cfg_obj_t *keys, const cfg_obj_t *vconfig, argument
822 for (elt = cfg_list_first(keys);
888 * Configure DNSSEC keys for a view.
920 (void) cfg_map_get(voptions, "trusted-keys",
922 (void) cfg_map_get(voptions, "managed-keys",
929 (void)cfg_map_get(config, "trusted-keys", &global_keys);
930 (void)cfg_map_get(config, "managed-keys", &global_managed_keys);
961 * If bind.keys exists and is populated, it overrides
962 * the managed-keys clause hard-coded in ns_g_config.
971 (void)cfg_map_get(bindkeys, "trusted-keys",
[all...]
/bind-9.11.3/bin/rndc/
H A Drndc.c122 Update keys without signing immediately.\n\
123 managed-keys refresh [class [view]]\n\
125 managed-keys status [class [view]]\n\
126 Display RFC 5011 managed keys information\n\
127 managed-keys sync [class [view]]\n\
128 Write RFC 5011 managed keys to disk\n\
164 Update zone keys, and sign as needed.\n\
166 Remove the private records for all keys that have\n\
198 tsig-list List all currently active TSIG keys, including both statically\n\
199 configured and TKEY-negotiated keys
522 const cfg_obj_t *keys = NULL; local
[all...]
/bind-9.11.3/bin/delv/
H A Ddelv.c10 #include <bind.keys.h>
137 /* Default bind.keys contents */
663 load_keys(const cfg_obj_t *keys, dns_client_t *client) { argument
668 for (elt = cfg_list_first(keys);
693 const cfg_obj_t *keys = NULL; local
703 filename = SYSCONFDIR "/bind.keys";
707 strlcat(buf, "\\bind.keys", sizeof(buf));
733 fatal("Unable to load keys from '%s'",
745 fatal("Unable to parse built-in keys");
749 cfg_map_get(bindkeys, "trusted-keys",
[all...]
/bind-9.11.3/lib/bind9/
H A Dcheck.c2588 * are valid domain names as these keys are used for TSIG.
2593 check_keylist(const cfg_obj_t *keys, isc_symtab_t *symtab, argument
2605 for (element = cfg_list_first(keys);
2672 * RNDC keys are not normalised unlike TSIG keys.
2705 const cfg_obj_t *v1, *v2, *keys; local
2776 keys = NULL;
2777 cfg_map_get(v1, "keys", &keys);
2778 if (keys !
3085 const cfg_obj_t *keys = NULL; local
[all...]

Completed in 65 milliseconds