/bind-9.6-ESV-R11/bin/tests/system/tkey/ns1/ |
H A D | setup.sh | 23 keyid=`echo $keyname | $PERL -p -e 's/^.*\+0*//;'` 25 perl -p -e "s/KEYID/$keyid/;" < named.conf.in > named.conf
|
/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 34 isc_uint16_t keyid; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 35 isc_uint16_t keyid; member in struct:dns_rdata_sig_t
|
H A D | rrsig_46.c | 401 RETERR(uint16_tobuffer(sig->keyid, target)); 469 sig->keyid = uint16_fromregion(&sr);
|
H A D | sig_24.c | 406 RETERR(uint16_tobuffer(sig->keyid, target)); 474 sig->keyid = uint16_fromregion(&sr);
|
/bind-9.6-ESV-R11/bin/named/ |
H A D | tsigconf.c | 46 const char *keyid = NULL; local 69 keyid = cfg_obj_asstring(cfg_map_getname(key)); 81 isc_buffer_constinit(&keynamesrc, keyid, strlen(keyid)); 82 isc_buffer_add(&keynamesrc, strlen(keyid)); 97 keyid, algstr); 134 "configuring key '%s': %s", keyid,
|
H A D | controlconf.c | 715 controlkey_t *keyid, *next; local 724 for (keyid = ISC_LIST_HEAD(*keyids); keyid != NULL; keyid = next) { 725 next = ISC_LIST_NEXT(keyid, link); 727 result = cfgkeylist_find(keylist, keyid->keyname, &keydef); 732 keyid->keyname, socktext); 733 ISC_LIST_UNLINK(*keyids, keyid, link); 734 free_controlkey(keyid, mctx); 756 algstr, keyid 810 controlkey_t *keyid = NULL; local [all...] |
H A D | update.c | 1181 * Replace existing RRSIG with the same keyid, 1188 if (dbsig.keyid == updatesig.keyid && 2004 if (rrsig.keyid == dst_key_id(keys[i])) { 3260 isc_uint16_t keyid; local 3345 keyid = dst_region_computeid(&r, dnskey.algorithm); 3348 buf[1] = (keyid & 0xff00) >> 8; 3349 buf[2] = (keyid & 0xff); 4167 isc_uint16_t keyid; local 4180 keyid [all...] |
H A D | query.c | 2398 * there may be multiple keys with the same keyid. 2441 rrsig->keyid == (dns_keytag_t)dst_key_id(*keyp) &&
|
/bind-9.6-ESV-R11/lib/dns/ |
H A D | validator.c | 1211 siginfo->keyid == 1433 sig.keyid == keytag) 1451 isc_uint16_t keyid) 1472 "accepted expired %sRRSIG (keyid=%u)", 1474 "wildcard " : "", keyid); 1477 "verify failed due to bad signature (keyid=%u): " 1478 "%s", keyid, isc_result_totext(result)); 1481 "verify rdataset (keyid=%u): %s", 1482 keyid, isc_result_totext(result)); 1580 val->siginfo->keyid); 1450 verify(dns_validator_t *val, dst_key_t *key, dns_rdata_t *rdata, isc_uint16_t keyid) argument [all...] |
H A D | dnssec.c | 253 sig.keyid = dst_key_id(key); 733 sig.keyid = dst_key_id(key); 1000 sig.keyid == keytag) {
|
H A D | zone.c | 515 isc_uint16_t keyid; member in struct:dns_signing 635 isc_uint16_t keyid, isc_boolean_t delete); 3896 rrsig.keyid == dst_key_id(keys[i])) { 4312 rrsig.keyid == dst_key_id(key)) { 4556 rdata.data[1] != ((signing->keyid >> 8) & 0xff) || 4557 rdata.data[2] != (signing->keyid & 0xff)) { 4574 data[1] = (signing->keyid >> 8) & 0xff; 4575 data[2] = signing->keyid & 0xff; 5578 isc_uint16_t keyid, dns_diff_t *diff) 5623 rrsig.keyid ! 5576 del_sig(dns_db_t *db, dns_dbversion_t *version, dns_name_t *name, dns_dbnode_t *node, unsigned int nkeys, dns_secalg_t algorithm, isc_uint16_t keyid, dns_diff_t *diff) argument 11831 dns_zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, isc_uint16_t keyid, isc_boolean_t delete) argument 11914 zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, isc_uint16_t keyid, isc_boolean_t delete) argument [all...] |
H A D | message.c | 3050 dst_key_id(key) != sig.keyid ||
|
/bind-9.6-ESV-R11/bin/dnssec/ |
H A D | dnssectool.c | 133 snprintf(cp, size, "%s/%s/%d", namestr, algstr, sig->keyid);
|
H A D | dnssec-signzone.c | 295 if (rrsig->keyid == dst_key_id(key->key) && 335 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid, 343 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid, 1305 sig.keyid != dst_key_id(dstkey) || 1368 namebuf, typebuf, sig.keyid);
|
/bind-9.6-ESV-R11/bin/tests/dst/ |
H A D | t_dst.c | 846 * av == datafile, sigpath, keyname, keyid, alg, exp_result. 854 int keyid; local 869 keyid = atoi(key); 919 t2_sigchk(datapath, sigpath, keyname, keyid,
|
/bind-9.6-ESV-R11/lib/bind9/ |
H A D | check.c | 1514 const char *keyid = cfg_obj_asstring(cfg_map_getname(key)); local 1519 isc_buffer_constinit(&b, keyid, strlen(keyid)); 1520 isc_buffer_add(&b, strlen(keyid)); 1525 "key '%s': bad key name", keyid); 1554 keyid, file, line);
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | zone.h | 1769 isc_uint16_t keyid, isc_boolean_t deleteit); 1772 * that match the given algorithm and keyid.
|
/bind-9.6-ESV-R11/lib/dns/tests/ |
H A D | dbversion_test.c | 658 rrsig.keyid = 0;
|
/bind-9.6-ESV-R11/bin/dig/ |
H A D | dighost.c | 4559 if (siginfo.keyid == dst_key_id(dnsseckey)) {
|