/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 35 dns_name_t signer; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 36 dns_name_t signer; member in struct:dns_rdata_sig_t
|
H A D | rrsig_46.c | 406 RETERR(name_tobuffer(&sig->signer, target)); 418 dns_name_t signer; local 472 dns_name_init(&signer, NULL); 473 dns_name_fromregion(&signer, &sr); 474 dns_name_init(&sig->signer, NULL); 475 RETERR(name_duporclone(&signer, mctx, &sig->signer)); 476 isc_region_consume(&sr, name_length(&sig->signer)); 492 dns_name_free(&sig->signer, mctx); 506 dns_name_free(&sig->signer, si [all...] |
H A D | sig_24.c | 411 RETERR(name_tobuffer(&sig->signer, target)); 423 dns_name_t signer; local 477 dns_name_init(&signer, NULL); 478 dns_name_fromregion(&signer, &sr); 479 dns_name_init(&sig->signer, NULL); 480 RETERR(name_duporclone(&signer, mctx, &sig->signer)); 481 isc_region_consume(&sr, name_length(&sig->signer)); 497 dns_name_free(&sig->signer, mctx); 511 dns_name_free(&sig->signer, si [all...] |
/bind-9.6-ESV-R11/lib/dns/ |
H A D | ssu.c | 347 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, argument 360 REQUIRE(signer == NULL || dns_name_isabsolute(signer)); 363 if (signer == NULL && tcpaddr == NULL) 377 if (signer == NULL) 380 if (!dns_name_matcheswildcard(signer, 384 if (!dns_name_equal(signer, rule->identity)) 392 if (signer == NULL) 416 if (!dns_name_equal(signer, name)) 420 if (!dns_name_issubdomain(name, signer)) [all...] |
H A D | gssapictx.c | 344 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, argument 361 result = dns_name_toprincipal(signer, &buffer); 380 * Find the host portion of the signer's name. We do this by 409 UNUSED(signer); 417 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, argument 435 result = dns_name_toprincipal(signer, &buffer); 461 * Find the host portion of the signer's name. Zero out the $ so 462 * it terminates the signer's name, and skip past the @ for 500 UNUSED(signer);
|
H A D | tkey.c | 266 process_dhtkey(dns_message_t *msg, dns_name_t *signer, dns_name_t *name, argument 399 ISC_TRUE, signer, tkeyin->inception, 555 process_deletetkey(dns_name_t *signer, dns_name_t *name, argument 574 if (identity == NULL || !dns_name_equal(identity, signer)) { 599 dns_name_t *qname, *name, *keyname, *signer, tsigner; local 669 signer = NULL; 677 signer = &tsigner; 774 RETERR(process_dhtkey(msg, signer, keyname, &tkeyin, 785 RETERR(process_deletetkey(signer, keyname, &tkeyin,
|
H A D | message.c | 2792 * n bytes for the signer's name 2843 dns_message_signer(dns_message_t *msg, dns_name_t *signer) { argument 2848 REQUIRE(signer != NULL); 2857 if (!dns_name_hasbuffer(signer)) { 2862 dns_name_setbuffer(signer, dynbuf); 2881 dns_name_clone(&sig.signer, signer); 2916 dns_name_clone(identity, signer); 3019 result = dns_view_simplefind(view, &sig.signer, 3045 result = dst_key_fromdns(&sig.signer, rdat [all...] |
/bind-9.6-ESV-R11/bin/named/include/named/ |
H A D | client.h | 134 dns_name_t * signer; /*%< NULL if not valid sig */ member in struct:ns_client
|
/bind-9.6-ESV-R11/bin/named/ |
H A D | client.c | 636 client->signer = NULL; 1220 allowed(isc_netaddr_t *addr, dns_name_t *signer, dns_acl_t *acl) { argument 1226 result = dns_acl_match(addr, signer, acl, &ns_g_server->aclenv, 1731 client->signer = NULL; 1749 client->signer = &client->signername; 2062 client->signer = NULL; 2599 result = dns_acl_match(&netaddr, client->signer, acl,
|
H A D | update.c | 322 if (client->signer != NULL) { 323 dns_name_format(client->signer, namebuf, sizeof(namebuf)); 326 "signer \"%s\" %s", namebuf, msg); 804 dns_name_t *signer; member in struct:__anon15 825 result = dns_ssutable_checkrules(ssuinfo->table, ssuinfo->signer, 833 dns_ssutable_t *ssutable, dns_name_t *signer, 841 ssuinfo.signer = signer; 3630 else if (client->signer == NULL && !TCPCLIENT(client)) 3726 client->signer, 832 ssu_checkall(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name, dns_ssutable_t *ssutable, dns_name_t *signer, isc_netaddr_t *tcpaddr) argument [all...] |