/bind-9.6-ESV-R11/contrib/zkt/ |
H A D | zone.h | 52 dki_t *keys; /* ptr to keylist */ member in struct:Zone
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | tsig.h | 61 dns_rbt_t *keys; member in struct:dns_tsig_keyring 66 * LRU list of generated key along with a count of the keys on the 112 * not NULL, *key will contain a copy of the key. The keys validity
|
/bind-9.6-ESV-R11/unit/atf-src/atf-c/detail/ |
H A D | map_test.c | 289 char keys[10][5]; local 307 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]); 308 RE(atf_map_insert(&map, keys[i], &nums[i], false)); 330 char keys[10][5]; local 348 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]); 349 RE(atf_map_insert(&map, keys[i], &nums[i], false)); 369 atf_tc_set_md_var(tc, "descr", "Checks that the keys do not change "
|
/bind-9.6-ESV-R11/bin/named/ |
H A D | config.c | 458 dns_name_t **keys = NULL; local 594 memmove(new, keys, oldsize); 595 isc_mem_put(mctx, keys, oldsize); 597 keys = new; 604 keys[i] = NULL; 608 keys[i - 1] = isc_mem_get(mctx, sizeof(dns_name_t)); 609 if (keys[i - 1] == NULL) 611 dns_name_init(keys[i - 1], NULL); 622 keys[i - 1]); 655 memmove(new, keys, newsiz 701 dns_name_t **keys = *keysp; local [all...] |
H A D | controlconf.c | 99 controlkeylist_t keys; member in struct:controllistener 147 free_controlkeylist(&listener->keys, listener->mctx); 361 for (key = ISC_LIST_HEAD(listener->keys); 722 * Find the keys corresponding to the keyids used by this listener. 899 control_keylist = cfg_tuple_get(control, "keys"); 923 controlkeylist_t keys; local 964 ISC_LIST_INIT(keys); 966 listener->mctx, &keys); 968 free_controlkeylist(&listener->keys, listener->mctx); 969 listener->keys [all...] |
H A D | update.c | 1842 dst_key_t **keys, unsigned int *nkeys) 1849 directory, mctx, maxkeys, keys, nkeys)); 1900 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, 1929 (dst_key_flags(keys[i]) & DNS_KEYFLAG_KSK) != 0) 1932 if (!dst_key_isprivate(keys[i])) 1936 CHECK(dns_dnssec_sign(name, &rdataset, keys[i], 1950 "found no private keys, " 1969 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) 2004 if (rrsig.keyid == dst_key_id(keys[i])) { 2006 if (!dst_key_isprivate(keys[ 1840 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 1898 add_sigs(ns_client_t *client, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk) argument 1968 del_keysigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) argument 2040 add_exposed_sigs(ns_client_t *client, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, isc_boolean_t cut, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk) argument [all...] |
H A D | server.c | 517 * Configure DNSSEC keys for a view. Currently used only for 528 const cfg_obj_t *keys = NULL; local 540 keys = NULL; 542 (void)cfg_map_get(voptions, "trusted-keys", &keys); 543 if (keys == NULL) 544 (void)cfg_map_get(config, "trusted-keys", &keys); 546 for (element = cfg_list_first(keys); 863 (void)cfg_map_get(cpeer, "keys", [all...] |
/bind-9.6-ESV-R11/bin/rndc/ |
H A D | rndc.c | 139 tsig-list List all currently active TSIG keys, including both statically\n\ 140 configured and TKEY-negotiated keys.\n\ 443 const cfg_obj_t *keys = NULL; local 533 DO("get config key list", cfg_map_get(config, "key", &keys)); 534 for (elt = cfg_list_first(keys);
|
/bind-9.6-ESV-R11/lib/dns/ |
H A D | dnssec.c | 608 unsigned int maxkeys, dst_key_t **keys, 618 REQUIRE(keys != NULL); 635 keys[count] = NULL; 641 mctx, &keys[count]); 643 keys[count] = pubkey; 650 if ((dst_key_flags(keys[count]) & DNS_KEYTYPE_NOAUTH) != 0) { 652 dst_key_free(&keys[count]); 676 dst_key_free(&keys[--count]); 684 unsigned int maxkeys, dst_key_t **keys, 688 maxkeys, keys, nkey 605 dns_dnssec_findzonekeys2(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 682 dns_dnssec_findzonekeys(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument [all...] |
H A D | zone.c | 2204 * OpenSSL verification of RSA keys with exponent 3 is known to be 2205 * broken prior OpenSSL 0.9.8c/0.9.7k. Look for such keys and warn 3772 dst_key_t **keys, unsigned int *nkeys) 3780 directory, mctx, maxkeys, keys, 3842 dns_rdatatype_t type, zonediff_t *zonediff, dst_key_t **keys, 3895 if (rrsig.algorithm == dst_key_alg(keys[i]) && 3896 rrsig.keyid == dst_key_id(keys[i])) { 3903 if (!dst_key_isprivate(keys[i])) { 3965 dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, 3998 (dst_key_flags(keys[ 3770 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument 3841 del_sigs(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, zonediff_t *zonediff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t now) argument 3964 add_sigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_mem_t *mctx, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk) argument [all...] |
/bind-9.6-ESV-R11/lib/bind9/ |
H A D | check.c | 1492 * are valid domain names as these keys are used for TSIG. 1497 check_keylist(const cfg_obj_t *keys, isc_symtab_t *symtab, argument 1509 for (element = cfg_list_first(keys); 1576 * RNDC keys are not normalised unlike TSIG keys. 1609 const cfg_obj_t *v1, *v2, *keys; local 1680 keys = NULL; 1681 cfg_map_get(v1, "keys", &keys); 1682 if (keys ! 1784 const cfg_obj_t *keys = NULL; local [all...] |
/bind-9.6-ESV-R11/bin/dnssec/ |
H A D | dnssec-signzone.c | 305 * Finds the key that generated a RRSIG, if possible. First look at the keys 1559 fatal("no self signing keys found"); 1596 * Check that all the other records were signed by keys that are 2648 * Finds all public zone keys in the zone, and attempts to load the 2649 * private keys from disk. 2656 dst_key_t *keys[20]; local 2669 mctx, 20, keys, &nkeys); 2673 fatal("failed to find the zone keys: %s", 2679 key = newkeystruct(keys[i], dst_key_isprivate(keys[ [all...] |