Searched refs:alg (Results 1 - 25 of 47) sorted by relevance

12

/bind-9.11.3/bin/confgen/
H A Dkeygen.h20 void generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg,
25 dns_secalg_t alg);
27 const char *alg_totext(dns_secalg_t alg);
29 int alg_bits(dns_secalg_t alg);
H A Dkeygen.c43 alg_totext(dns_secalg_t alg) { argument
44 switch (alg) {
94 alg_bits(dns_secalg_t alg) { argument
95 switch (alg) {
118 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, argument
130 switch (alg) {
148 fatal("unsupported algorithm %d\n", alg);
167 DO("generate key", dst_key_generate(dns_rootname, alg,
203 dns_secalg_t alg) {
205 const char *algname = alg_totext(alg);
201 write_key_file(const char *keyfile, const char *user, const char *keyname, isc_buffer_t *secret, dns_secalg_t alg) argument
[all...]
H A Drndc-confgen.c76 -A alg: algorithm (default hmac-md5)\n\
92 -A alg: algorithm (default hmac-sha256)\n\
117 dns_secalg_t alg; local
139 alg = DST_ALG_HMACMD5;
141 alg = DST_ALG_HMACSHA256;
157 alg = alg_fromtext(algname);
158 if (alg == DST_ALG_UNKNOWN)
229 keysize = alg_bits(alg);
230 algname = alg_totext(alg);
235 generate_key(mctx, randomfile, alg, keysiz
[all...]
H A Dddns-confgen.c67 %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone]\n\
68 -a alg: algorithm (default hmac-sha256)\n\
78 %s [-a alg] [-r randomfile] [keyname]\n\
79 -a alg: algorithm (default hmac-sha256)\n\
100 dns_secalg_t alg = DST_ALG_HMACSHA256; local
141 alg = alg_fromtext(algname);
142 if (alg == DST_ALG_UNKNOWN)
144 keysize = alg_bits(alg);
209 algname = alg_totext(alg);
235 generate_key(mctx, randomfile, alg, keysiz
[all...]
/bind-9.11.3/bin/tests/system/
H A Dtestcrypto.sh17 alg="-a RSAMD5 -b 512"
29 alg=""
33 alg="-a eccgost"
38 alg="-a ecdsap256sha256"
43 alg="-a ED25519"
56 if $KEYGEN $args $alg foo > /dev/null 2>&1
/bind-9.11.3/bin/tests/system/pkcs11/
H A Dtests.sh33 for alg in $algs; do
34 zonefile=ns1/$alg.example.db
35 echo "I:testing PKCS#11 key generation ($alg)"
36 count=`$PK11LIST | grep robie-$alg-ksk | wc -l`
39 echo "I:testing offline signing with PKCS#11 keys ($alg)"
44 echo "I:testing inline signing with PKCS#11 keys ($alg)"
46 $DIG $DIGOPTS ns.$alg.example. @10.53.0.1 a > dig.out.$alg.0 || ret=1
49 count0=`grep RRSIG dig.out.$alg.0 | wc -l`
51 $NSUPDATE -v > upd.log.$alg <<EN
[all...]
/bind-9.11.3/contrib/scripts/
H A Dcheck-secure-delegation.pl.in93 foreach $alg ( keys %dnskeyalg ) {
94 print "Missing $zone DNSKEY RRSIG for algorithm $alg\n"
95 if (!exists($dnskeygood{$alg}));
101 foreach $alg ( keys %algorithms ) {
102 if (exists($dsgood{$alg})) {
103 print "$zone algorithm $alg good " .
106 print "$zone algorithm $alg bad " .
H A Dcheck5011.pl30 m{ alg = (\S+)\s*; key id = (\d+)};
31 $k->{alg} = $1;
89 printf "%s %s", fmtkey $k, $k->{alg};
115 printf "%s %s missing;", fmtkey $a, $a->{alg};
/bind-9.11.3/lib/dns/include/dns/
H A Dsecalg.h62 dns_secalg_format(dns_secalg_t alg, char *cp, unsigned int size);
/bind-9.11.3/bin/tests/dst/
H A Ddst_test.c133 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx) { argument
137 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key);
138 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
142 printf("write(%d) returned: %s\n", alg, isc_result_totext(ret));
157 int alg = DST_ALG_DH; local
160 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1);
161 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
164 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2);
165 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
170 printf("write(%d) returned: %s\n", alg, isc_result_totex
211 generate(int alg, isc_mem_t *mctx) argument
[all...]
H A Dt_dst.c172 int alg = DST_ALG_DH; local
187 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1);
190 alg, dst_result_totext(ret));
195 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2);
198 alg, dst_result_totext(ret));
226 alg, dst_result_totext(ret));
234 alg, dst_result_totext(ret));
276 io(dns_name_t *name, isc_uint16_t id, isc_uint16_t alg, int type, argument
292 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key);
295 alg, dst_result_totex
389 generate(int alg, isc_mem_t *mctx, int size, int *nfails) argument
703 t2_sigchk(char *datapath, char *sigpath, char *keyname, int id, int alg, int type, isc_mem_t *mctx, char *expected_result, int *nfails, int *nprobs) argument
962 char *alg; local
[all...]
/bind-9.11.3/bin/dnssec/
H A Ddnssec-keygen.c173 fprintf(stderr, " K<name>+<alg>+<id>.key, "
174 "K<name>+<alg>+<id>.private\n");
219 dns_secalg_t alg; local
562 alg = DST_ALG_HMACMD5;
578 alg = DST_ALG_HMACSHA1;
580 alg = DST_ALG_HMACSHA224;
582 alg = DST_ALG_HMACSHA256;
584 alg = DST_ALG_HMACSHA384;
586 alg = DST_ALG_HMACSHA512;
590 ret = dns_secalg_fromtext(&alg,
[all...]
H A Ddnssec-keyfromlabel.c119 fprintf(stderr, " K<name>+<alg>+<id>.key, "
120 "K<name>+<alg>+<id>.private\n");
143 dns_secalg_t alg; local
430 ret = dns_secalg_fromtext(&alg, &r);
433 if (alg == DST_ALG_DH)
438 alg != DST_ALG_NSEC3DSA && alg != DST_ALG_NSEC3RSASHA1 &&
439 alg != DST_ALG_RSASHA256 && alg != DST_ALG_RSASHA512 &&
440 alg !
[all...]
/bind-9.11.3/lib/dns/include/dst/
H A Ddst.h158 dst_algorithm_supported(unsigned int alg);
299 dst_key_getfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg,
310 * \li "alg" is a supported key algorithm.
322 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type,
333 * \li "alg" is a supported key algorithm.
453 dst_key_frombuffer(dns_name_t *name, unsigned int alg,
462 *\li "alg" is a supported key algorithm.
548 dst_key_buildinternal(dns_name_t *name, unsigned int alg,
555 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags,
561 dst_key_generate(dns_name_t *name, unsigned int alg,
[all...]
/bind-9.11.3/lib/dns/
H A Ddst_parse.h43 #define TAG(alg, off) (((alg) << TAG_SHIFT) + (off))
131 dst__privstruct_parse(dst_key_t *key, unsigned int alg, isc_lex_t *lex,
H A Dkey.c26 dst_region_computeid(const isc_region_t *source, unsigned int alg) { argument
37 if (alg == DST_ALG_RSAMD5)
51 dst_region_computerid(const isc_region_t *source, unsigned int alg) { argument
62 if (alg == DST_ALG_RSAMD5)
H A Ddst_api.c85 unsigned int alg,
96 unsigned int alg,
102 unsigned int alg,
110 static isc_result_t algorithm_status(unsigned int alg);
123 #define CHECKALG(alg) \
126 _r = algorithm_status(alg); \
301 dst_algorithm_supported(unsigned int alg) { argument
304 if (alg >= DST_MAX_ALGS || dst_t_func[alg] == NULL)
532 unsigned int alg, in
531 dst_key_getfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, const char *directory, isc_mem_t *mctx, isc_buffer_t *buf) argument
557 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, const char *directory, isc_mem_t *mctx, dst_key_t **keyp) argument
747 isc_uint8_t alg, proto; local
786 dst_key_frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument
888 dst_key_buildinternal(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, void *data, isc_mem_t *mctx, dst_key_t **keyp) argument
922 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, const char *engine, const char *label, const char *pin, isc_mem_t *mctx, dst_key_t **keyp) argument
964 dst_key_generate(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp) argument
975 dst_key_generate2(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp, void (*callback)(int)) argument
1394 dst_key_restore(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, const char *keystr, dst_key_t **keyp) argument
1431 get_key_struct(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, unsigned int bits, dns_rdataclass_t rdclass, dns_ttl_t ttl, isc_mem_t *mctx) argument
1836 buildfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg, unsigned int type, const char *directory, isc_buffer_t *out) argument
1893 frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument
1932 algorithm_status(unsigned int alg) argument
[all...]
H A Ddst_parse.c143 find_value(const char *s, const unsigned int alg) { argument
148 (TAG_ALG(map[i].value) == alg))
378 unsigned int alg)
385 if (priv->elements[j].tag == TAG(alg, i))
394 check_data(const dst_private_t *priv, const unsigned int alg, argument
401 switch (alg) {
432 return (check_hmac_sha(priv, HMACSHA1_NTAGS, alg));
434 return (check_hmac_sha(priv, HMACSHA224_NTAGS, alg));
436 return (check_hmac_sha(priv, HMACSHA256_NTAGS, alg));
438 return (check_hmac_sha(priv, HMACSHA384_NTAGS, alg));
377 check_hmac_sha(const dst_private_t *priv, unsigned int ntags, unsigned int alg) argument
462 dst__privstruct_parse(dst_key_t *key, unsigned int alg, isc_lex_t *lex, isc_mem_t *mctx, dst_private_t *priv) argument
[all...]
H A Dtsig.c73 static unsigned char hmacmd5_ndata[] = "\010hmac-md5\007sig-alg\003reg\003int";
982 * Digest the name, class, ttl, alg.
1166 unsigned int alg; local
1279 alg = dst_key_alg(key);
1285 alg == DST_ALG_HMACMD5 ||
1287 alg == DST_ALG_HMACSHA1 ||
1288 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 ||
1289 alg == DST_ALG_HMACSHA384 || alg
1527 unsigned int alg; local
[all...]
/bind-9.11.3/bin/tests/system/pkcs11ssl/
H A Dtests.sh19 alg=rsa
36 update add `grep -v ';' ns1/${alg}.key`
/bind-9.11.3/bin/named/
H A Dtsigconf.c53 dns_name_t *alg; local
85 if (ns_config_getkeyalgorithm(algstr, &alg, &bits)
108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen,
/bind-9.11.3/lib/irs/
H A Ddnsconf.c56 isc_uint32_t flags, proto, alg; local
87 alg = cfg_obj_asuint32(cfg_tuple_get(key,
101 if (alg > 0xff)
105 keystruct.algorithm = (isc_uint8_t)alg;
/bind-9.11.3/bin/tests/system/inline/ns3/
H A Dsign.sh113 for alg in ECCGOST ECDSAP256SHA256 NSEC3RSASHA1 DSA
115 case $alg in
138 k1=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone -f KSK $zone`
139 k2=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone $zone`
140 k3=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone $zone`
141 k4=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone -f KSK $zone`
148 ( echo "importkey failed: $alg"; rm -f $checkfile )
152 ( echo "importkey failed: $alg"; rm -f $checkfile )
/bind-9.11.3/contrib/dnsperf-2.1.0.0-1/
H A Ddns.c78 #define TSIG_HMACMD5_NAME "\010hmac-md5\007sig-alg\003reg\003int"
105 isc_constregion_t alg; member in struct:perf_dnstsigkey
196 (key)->alg.base = TSIG_HMAC ## type ## _NAME; \
197 (key)->alg.length = sizeof(TSIG_HMAC ## type ## _NAME); \
206 const char *sep1, *sep2, *alg, *name, *secret; local
218 perf_log_warning("invalid TSIG [alg:]name:secret");
226 alg = NULL;
232 /* [alg:]name:secret */
233 alg = arg;
242 if (alg
[all...]
/bind-9.11.3/lib/dns/tests/
H A Dprivate_test.c33 unsigned char alg; member in struct:__anon201
58 buf[0] = testcase->alg;

Completed in 39 milliseconds

12