/bind-9.11.3/bin/tests/system/mkeys/ns1/ |
H A D | sign.sh | 15 keyname=`$KEYGEN -qfk -r $RANDFILE $zone` 21 cat $keyname.key | grep -v '^; ' | $PERL -n -e ' 34 cat $keyname.key | grep -v '^; ' | $PERL -n -e ' 45 # Save keyname and keyid for managed key id test. 47 echo "$keyname" > managed.key 48 keyid=`expr $keyname : 'K\.+00.+\([0-9]*\)'`
|
/bind-9.11.3/bin/tests/system/upforwd/ |
H A D | setup.sh | 22 keyname=`$KEYGEN -q -r $RANDFILE -n HOST -a RSASHA1 -b 1024 -T KEY sig0.example2 2>/dev/null | $D2U` 23 if test -n "$keyname" 25 cat ns1/example1.db $keyname.key > ns1/example2.db 26 echo $keyname > keyname 29 rm -f keyname
|
/bind-9.11.3/bin/tests/system/tkey/ns1/ |
H A D | setup.sh | 12 keyname=`$KEYGEN -T KEY -a DH -b 768 -n host -r $RANDFILE server` 13 keyid=`echo $keyname | $PERL -p -e 's/^.*\+0*//;'`
|
/bind-9.11.3/bin/tests/system/unknown/ns3/ |
H A D | sign.sh | 17 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 768 -n zone $zone` 18 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone -f KSK $zone`
|
/bind-9.11.3/bin/tests/system/sfcache/ns1/ |
H A D | sign.sh | 20 keyname=`$KEYGEN -q -r $RANDFILE -a RSAMD5 -b 768 -n zone $zone` 22 cat $infile $keyname.key > $zonefile 27 cat $keyname.key | grep -v '^; ' | $PERL -n -e ' 38 cat $keyname.key | grep -v '^; ' | $PERL -n -e '
|
/bind-9.11.3/bin/tests/system/dnssec/ns5/ |
H A D | sign.sh | 16 keyname=`$KEYGEN -r $RANDFILE -qfk $zone` 19 cat $keyname.key | grep -v '^; ' | $PERL -n -e ' 29 $SETTIME -R now ${keyname}.key > /dev/null
|
/bind-9.11.3/bin/tests/system/inline/ns7/ |
H A D | sign.sh | 18 keyname=`$KEYGEN -q -r $RANDFILE -a NSEC3RSASHA1 -b 1024 -n zone $zone` 19 keyname=`$KEYGEN -q -r $RANDFILE -a NSEC3RSASHA1 -b 1024 -n zone $zone` 20 keyname=`$KEYGEN -q -r $RANDFILE -a NSEC3RSASHA1 -b 1024 -n zone -f KSK $zone`
|
/bind-9.11.3/bin/tests/system/inline/ns3/ |
H A D | sign.sh | 15 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 768 -n zone $zone` 16 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone -f KSK $zone` 17 $DSFROMKEY -T 1200 $keyname >> ../ns1/root.db 22 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 768 -n zone $zone` 23 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone -f KSK $zone` 24 $DSFROMKEY -T 1200 $keyname >> ../ns1/root.db 29 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 768 -n zone $zone` 30 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone -f KSK $zone` 31 $DSFROMKEY -T 1200 $keyname >> ../ns1/root.db 36 keyname [all...] |
/bind-9.11.3/bin/confgen/ |
H A D | ddns-confgen.c | 67 %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone]\n\ 69 -k keyname: name of the key as it will be used in named.conf\n\ 78 %s [-a alg] [-r randomfile] [keyname]\n\ 96 const char *keyname = NULL; local 151 keyname = isc_commandline_argument; 198 keyname = argv[isc_commandline_index++]; 213 if (keyname == NULL) { 216 keyname = ((progmode == progmode_keygen) 224 len = strlen(keyname) + strlen(suffix) + 2; 227 fatal("failed to allocate memory for keyname"); [all...] |
H A D | rndc-confgen.c | 73 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] [-r randomfile] \ 79 -k keyname: the name as it will be used in named.conf and rndc.conf\n\ 89 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] [-r randomfile] \ 95 -k keyname: the name as it will be used in named.conf and rndc.conf\n\ 114 const char *keyname = NULL; local 137 keyname = DEFAULT_KEYNAME; 173 keyname = isc_commandline_argument; 239 keyname, &key_txtbuffer, alg); 250 write_key_file(buf, user, keyname, &key_txtbuffer, alg); 279 keyname, algnam [all...] |
H A D | keygen.h | 24 const char *keyname, isc_buffer_t *secret,
|
/bind-9.11.3/bin/tests/virtual-time/autosign-zsk/ns1/ |
H A D | sign.sh | 29 keyname=`$KEYGEN -q -r $RANDFILE2 -a RSASHA1 -b 768 -n zone \ 32 echo $keyname > keyname
|
/bind-9.11.3/bin/tests/system/inline/ns1/ |
H A D | sign.sh | 17 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 768 -n zone $zone` 18 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone -f KSK $zone` 22 cat ${keyname}.key | grep -v '^; ' | $PERL -n -e '
|
/bind-9.11.3/bin/tests/system/rsabigexponent/ns1/ |
H A D | sign.sh | 18 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone` 20 cat $infile $keyname.key > $zonefile 25 cat $keyname.key | grep -v '^; ' | $PERL -n -e '
|
/bind-9.11.3/bin/tests/system/dnssec/ns6/ |
H A D | sign.sh | 18 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA256 -b 768 -n zone $zone` 20 cat $infile $keyname.key >$zonefile
|
/bind-9.11.3/bin/tests/system/dnssec/ns1/ |
H A D | sign.sh | 27 keyname=`$KEYGEN -q -r $RANDFILE -a RSAMD5 -b 768 -n zone $zone` 29 cat $infile $keyname.key > $zonefile 34 cat $keyname.key | grep -v '^; ' | $PERL -n -e ' 45 cat $keyname.key | grep -v '^; ' | $PERL -n -e ' 63 keyid=`expr $keyname : 'K.+001+\(.*\)'`
|
/bind-9.11.3/lib/irs/ |
H A D | dnsconf.c | 53 dns_name_t *keyname_base, *keyname; local 80 keyname = NULL; 146 keyname = isc_mem_get(mctx, sizeof(*keyname)); 147 if (keyname == NULL) { 151 dns_name_init(keyname, NULL); 152 result = dns_name_dup(keyname_base, mctx, keyname); 159 dns_name_free(keyname, mctx); 163 keyent->keyname = keyname; [all...] |
/bind-9.11.3/bin/tests/system/tkey/ |
H A D | tests.sh | 33 keyname=`$KEYCREATE $dhkeyname $owner` || ret=1 44 $DIG $DIGOPTS . ns -k $keyname > dig.out.1 || ret=1 55 $KEYDELETE $keyname || ret=1 63 $DIG $DIGOPTS . ns -k $keyname > dig.out.2 || ret=1 75 keyname=`$KEYCREATE $dhkeyname bar.example.` || ret=1 95 $DIG $DIGOPTS -k $keyname txt.example txt > dig.out.3 || ret=1 107 $DIG $DIGOPTS -k $keyname txt.example txt > dig.out.4 || ret=1 116 keyname=`$KEYCREATE $dhkeyname bar.example.` || ret=1 136 $DIG $DIGOPTS -k $keyname txt.example txt > dig.out.5 || ret=1
|
/bind-9.11.3/bin/tests/virtual-time/autosign-ksk/ns1/ |
H A D | sign.sh | 29 keyname=`$KEYGEN -q -r $RANDFILE2 -a RSASHA1 -b 1024 -n zone \ 32 echo $keyname > keyname
|
/bind-9.11.3/bin/tests/virtual-time/autosign-ksk/ |
H A D | clean.sh | 18 rm -f ns1/keyname
|
/bind-9.11.3/bin/tests/virtual-time/autosign-zsk/ |
H A D | clean.sh | 18 rm -f ns1/keyname
|
/bind-9.11.3/lib/irs/include/irs/ |
H A D | dnsconf.h | 32 * validation. A dns_key_t object will be created using the 'keyname' and 36 dns_name_t *keyname; member in struct:irs_dnsconf_dnskey
|
/bind-9.11.3/bin/tests/system/dnssec/ns3/ |
H A D | sign.sh | 18 keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 768 -n zone $zone` 20 cat $infile $cnameandkey.key $dnameandkey.key $keyname.key >$zonefile 28 keyname=`$KEYGEN -q -r $RANDFILE -a RSAMD5 -b 768 -n zone $zone` 30 cat $infile $keyname.key >$zonefile 49 keyname=`$KEYGEN -q -r $RANDFILE -a RSAMD5 -b 768 -n zone $zone` 51 cat $infile $keyname.key >$zonefile 69 keyname=`$KEYGEN -q -r $RANDFILE -a RSAMD5 -b 768 -n zone $zone` 71 cat $infile $keyname.key >$zonefile 82 keyname=`$KEYGEN -q -r $RANDFILE -a NSEC3RSASHA1 -b 768 -n zone $zone` 84 cat $infile $keyname [all...] |
/bind-9.11.3/contrib/idn/idnkit-1.0-src/wsock/common/ |
H A D | encoding.c | 146 char keyname[256]; local 151 if (GetPerProgKey(keyname, sizeof(keyname)) != NULL) { 153 GetRegistry(HKEY_CURRENT_USER, keyname, name, 155 GetRegistry(HKEY_LOCAL_MACHINE, keyname, name,
|
/bind-9.11.3/bin/named/ |
H A D | tsigconf.c | 52 dns_name_t keyname; local 72 dns_name_init(&keyname, NULL); 76 ret = dns_name_fromtext(&keyname, &keynamesrc, dns_rootname, 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen,
|