Searched defs:keys (Results 1 - 12 of 12) sorted by relevance

/bind-9.6-ESV-R11/contrib/zkt/
H A Dzone.h52 dki_t *keys; /* ptr to keylist */ member in struct:Zone
/bind-9.6-ESV-R11/lib/dns/include/dns/
H A Dtsig.h61 dns_rbt_t *keys; member in struct:dns_tsig_keyring
66 * LRU list of generated key along with a count of the keys on the
112 * not NULL, *key will contain a copy of the key. The keys validity
/bind-9.6-ESV-R11/unit/atf-src/atf-c/detail/
H A Dmap_test.c289 char keys[10][5]; local
307 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]);
308 RE(atf_map_insert(&map, keys[i], &nums[i], false));
330 char keys[10][5]; local
348 snprintf(keys[i], sizeof(keys[i]), "%d", nums[i]);
349 RE(atf_map_insert(&map, keys[i], &nums[i], false));
369 atf_tc_set_md_var(tc, "descr", "Checks that the keys do not change "
/bind-9.6-ESV-R11/bin/named/
H A Dconfig.c458 dns_name_t **keys = NULL; local
594 memmove(new, keys, oldsize);
595 isc_mem_put(mctx, keys, oldsize);
597 keys = new;
604 keys[i] = NULL;
608 keys[i - 1] = isc_mem_get(mctx, sizeof(dns_name_t));
609 if (keys[i - 1] == NULL)
611 dns_name_init(keys[i - 1], NULL);
622 keys[i - 1]);
655 memmove(new, keys, newsiz
701 dns_name_t **keys = *keysp; local
[all...]
H A Dcontrolconf.c99 controlkeylist_t keys; member in struct:controllistener
147 free_controlkeylist(&listener->keys, listener->mctx);
361 for (key = ISC_LIST_HEAD(listener->keys);
722 * Find the keys corresponding to the keyids used by this listener.
899 control_keylist = cfg_tuple_get(control, "keys");
923 controlkeylist_t keys; local
964 ISC_LIST_INIT(keys);
966 listener->mctx, &keys);
968 free_controlkeylist(&listener->keys, listener->mctx);
969 listener->keys
[all...]
H A Dupdate.c1842 dst_key_t **keys, unsigned int *nkeys)
1849 directory, mctx, maxkeys, keys, nkeys));
1900 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys,
1929 (dst_key_flags(keys[i]) & DNS_KEYFLAG_KSK) != 0)
1932 if (!dst_key_isprivate(keys[i]))
1936 CHECK(dns_dnssec_sign(name, &rdataset, keys[i],
1950 "found no private keys, "
1969 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys)
2004 if (rrsig.keyid == dst_key_id(keys[i])) {
2006 if (!dst_key_isprivate(keys[
1840 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
1898 add_sigs(ns_client_t *client, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk) argument
1968 del_keysigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys) argument
2040 add_exposed_sigs(ns_client_t *client, dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, isc_boolean_t cut, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk) argument
[all...]
H A Dserver.c517 * Configure DNSSEC keys for a view. Currently used only for
528 const cfg_obj_t *keys = NULL; local
540 keys = NULL;
542 (void)cfg_map_get(voptions, "trusted-keys", &keys);
543 if (keys == NULL)
544 (void)cfg_map_get(config, "trusted-keys", &keys);
546 for (element = cfg_list_first(keys);
863 (void)cfg_map_get(cpeer, "keys",
[all...]
/bind-9.6-ESV-R11/bin/rndc/
H A Drndc.c139 tsig-list List all currently active TSIG keys, including both statically\n\
140 configured and TKEY-negotiated keys.\n\
443 const cfg_obj_t *keys = NULL; local
533 DO("get config key list", cfg_map_get(config, "key", &keys));
534 for (elt = cfg_list_first(keys);
/bind-9.6-ESV-R11/lib/dns/
H A Ddnssec.c608 unsigned int maxkeys, dst_key_t **keys,
618 REQUIRE(keys != NULL);
635 keys[count] = NULL;
641 mctx, &keys[count]);
643 keys[count] = pubkey;
650 if ((dst_key_flags(keys[count]) & DNS_KEYTYPE_NOAUTH) != 0) {
652 dst_key_free(&keys[count]);
676 dst_key_free(&keys[--count]);
684 unsigned int maxkeys, dst_key_t **keys,
688 maxkeys, keys, nkey
605 dns_dnssec_findzonekeys2(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, const char *directory, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
682 dns_dnssec_findzonekeys(dns_db_t *db, dns_dbversion_t *ver, dns_dbnode_t *node, dns_name_t *name, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
[all...]
H A Dzone.c2204 * OpenSSL verification of RSA keys with exponent 3 is known to be
2205 * broken prior OpenSSL 0.9.8c/0.9.7k. Look for such keys and warn
3772 dst_key_t **keys, unsigned int *nkeys)
3780 directory, mctx, maxkeys, keys,
3842 dns_rdatatype_t type, zonediff_t *zonediff, dst_key_t **keys,
3895 if (rrsig.algorithm == dst_key_alg(keys[i]) &&
3896 rrsig.keyid == dst_key_id(keys[i])) {
3903 if (!dst_key_isprivate(keys[i])) {
3965 dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys,
3998 (dst_key_flags(keys[
3770 find_zone_keys(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, isc_mem_t *mctx, unsigned int maxkeys, dst_key_t **keys, unsigned int *nkeys) argument
3841 del_sigs(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, zonediff_t *zonediff, dst_key_t **keys, unsigned int nkeys, isc_stdtime_t now) argument
3964 add_sigs(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_rdatatype_t type, dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys, isc_mem_t *mctx, isc_stdtime_t inception, isc_stdtime_t expire, isc_boolean_t check_ksk) argument
[all...]
/bind-9.6-ESV-R11/lib/bind9/
H A Dcheck.c1492 * are valid domain names as these keys are used for TSIG.
1497 check_keylist(const cfg_obj_t *keys, isc_symtab_t *symtab, argument
1509 for (element = cfg_list_first(keys);
1576 * RNDC keys are not normalised unlike TSIG keys.
1609 const cfg_obj_t *v1, *v2, *keys; local
1680 keys = NULL;
1681 cfg_map_get(v1, "keys", &keys);
1682 if (keys !
1784 const cfg_obj_t *keys = NULL; local
[all...]
/bind-9.6-ESV-R11/bin/dnssec/
H A Ddnssec-signzone.c305 * Finds the key that generated a RRSIG, if possible. First look at the keys
1559 fatal("no self signing keys found");
1596 * Check that all the other records were signed by keys that are
2648 * Finds all public zone keys in the zone, and attempts to load the
2649 * private keys from disk.
2656 dst_key_t *keys[20]; local
2669 mctx, 20, keys, &nkeys);
2673 fatal("failed to find the zone keys: %s",
2679 key = newkeystruct(keys[i], dst_key_isprivate(keys[
[all...]

Completed in 98 milliseconds