/bind-9.6-ESV-R11/contrib/zkt/ |
H A D | zkt.h | 40 extern const dki_t *zkt_search (const dki_t *data, int searchtag, const char *keyname); 41 extern void zkt_list_keys (const dki_t *data); 42 extern void zkt_list_trustedkeys (const dki_t *data); 43 extern void zkt_list_dnskeys (const dki_t *data); 44 extern void zkt_setkeylifetime (dki_t *data);
|
/bind-9.6-ESV-R11/bin/tests/system/dlv/ |
H A D | setup.sh | 19 ../../genrandom 400 random.data
|
/bind-9.6-ESV-R11/bin/tests/system/formerr/ |
H A D | formerr.pl | 84 my $data = pack("H*", $input); 85 my $len = length $data; 87 my $output = unpack("H*", $data); 95 $bytes = $sock->syswrite($data, $len); 96 $bytes = $sock->sysread($data, 2); 97 $len = unpack("n", $data); 98 $bytes = $sock->sysread($data, $len); 99 print "got: ", unpack("H*", $data). "\n";
|
/bind-9.6-ESV-R11/bin/tests/system/pending/ |
H A D | setup.sh | 19 ../../genrandom 400 random.data
|
H A D | prereq.sh | 19 ../../genrandom 400 random.data 20 if $KEYGEN -a RSAMD5 -b 512 -n zone -r random.data foo > /dev/null 2>&1
|
/bind-9.6-ESV-R11/bin/tests/system/tkey/ |
H A D | setup.sh | 20 RANDFILE=random.data
|
H A D | prereq.sh | 20 ../../genrandom 400 random.data 22 if $KEYGEN -a RSAMD5 -b 512 -n zone -r random.data foo > /dev/null 2>&1
|
/bind-9.6-ESV-R11/bin/tests/system/wildcard/ |
H A D | setup.sh | 19 ../../genrandom 400 random.data
|
/bind-9.6-ESV-R11/bin/tests/system/dnssec/ |
H A D | prereq.sh | 20 ../../genrandom 400 random.data 22 if $KEYGEN -a RSAMD5 -b 512 -n zone -r random.data foo > /dev/null 2>&1
|
/bind-9.6-ESV-R11/contrib/sdb/ldap/ |
H A D | ldapdb.c | 83 void *data; member in struct:ldapdb_entry 119 /* data == NULL means cleanup */ 121 ldapdb_getconn(struct ldapdb_data *data) argument 127 if (data == NULL) { 134 while (threaddata->data != NULL) { 135 conndata = threaddata->data; 137 if (conndata->data != NULL) 138 ldap_unbind((LDAP *)conndata->data); 139 threaddata->data = conndata->next; 149 /* look for connection data fo 192 ldapdb_bind(struct ldapdb_data *data, LDAP **ldp) argument 223 struct ldapdb_data *data = dbdata; local 411 parseextensions(char *extensions, struct ldapdb_data *data) argument 461 free_data(struct ldapdb_data *data) argument 479 struct ldapdb_data *data; local 630 struct ldapdb_data *data = *dbdata; local [all...] |
/bind-9.6-ESV-R11/unit/atf-src/atf-c/ |
H A D | error.c | 63 error_init(atf_error_t err, const char *type, void *data, size_t datalen, argument 68 PRE(data != NULL || datalen == 0); 69 PRE(datalen != 0 || data == NULL); 76 if (data == NULL) { 83 memcpy(err->m_data, data, datalen); 94 atf_error_new(const char *type, void *data, size_t datalen, argument 100 PRE(data != NULL || datalen == 0); 101 PRE(datalen != 0 || data == NULL); 107 if (!error_init(err, type, data, datalen, format)) { 193 const atf_libc_error_data_t *data; local 205 atf_libc_error_data_t data; local 221 const struct atf_libc_error_data *data; local 233 const struct atf_libc_error_data *data; local [all...] |
/bind-9.6-ESV-R11/lib/dns/ |
H A D | spnego_asn1.c | 36 void *data; member in struct:octet_string 177 encode_MechType(unsigned char *p, size_t len, const MechType * data, size_t * size) argument 183 e = encode_oid(p, len, data, &l); 192 decode_MechType(const unsigned char *p, size_t len, MechType * data, size_t * size) argument 198 memset(data, 0, sizeof(*data)); 199 e = decode_oid(p, len, data, &l); 205 free_MechType(data); 210 free_MechType(MechType * data) argument 212 free_oid(data); 225 encode_MechTypeList(unsigned char *p, size_t len, const MechTypeList * data, size_t * size) argument 245 decode_MechTypeList(const unsigned char *p, size_t len, MechTypeList * data, size_t * size) argument 288 free_MechTypeList(MechTypeList * data) argument 308 encode_ContextFlags(unsigned char *p, size_t len, const ContextFlags * data, size_t * size) argument 355 decode_ContextFlags(const unsigned char *p, size_t len, ContextFlags * data, size_t * size) argument 388 free_ContextFlags(ContextFlags * data) argument 414 encode_NegTokenInit(unsigned char *p, size_t len, const NegTokenInit * data, size_t * size) argument 462 decode_NegTokenInit(const unsigned char *p, size_t len, NegTokenInit * data, size_t * size) argument 607 free_NegTokenInit(NegTokenInit * data) argument 637 encode_NegTokenResp(unsigned char *p, size_t len, const NegTokenResp * data, size_t * size) argument 686 decode_NegTokenResp(const unsigned char *p, size_t len, NegTokenResp * data, size_t * size) argument 834 free_NegTokenResp(NegTokenResp * data) argument [all...] |
H A D | iptable.c | 82 /* If a node already contains data, don't overwrite it */ 88 if (node->data[0] == NULL) 89 node->data[0] = &dns_iptable_pos; 90 if (node->data[1] == NULL) 91 node->data[1] = &dns_iptable_pos; 93 if (node->data[0] == NULL) 94 node->data[0] = &dns_iptable_neg; 95 if (node->data[1] == NULL) 96 node->data[1] = &dns_iptable_neg; 100 if (node->data[ISC_IS [all...] |
/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | null_10.h | 28 unsigned char *data; member in struct:dns_rdata_null
|
H A D | unspec_103.h | 27 unsigned char *data; member in struct:dns_rdata_unspec_t
|
H A D | dnskey_48.h | 33 unsigned char * data; member in struct:dns_rdata_dnskey
|
H A D | key_25.h | 33 unsigned char * data; member in struct:dns_rdata_key_t
|
H A D | tlsa_52.h | 32 unsigned char *data; member in struct:dns_rdata_tlsa
|
/bind-9.6-ESV-R11/bin/tests/system/upforwd/ans4/ |
H A D | ans.pl | 55 # Now you can add TSIG, just specify key/key data with: 61 # Note that this data will still be sent with any request for 62 # pattern, only this data will be signed. Currently, this is only 169 return $packet->data; 173 # given a stream of data, reads a DNS-formatted name and returns its 176 my ($data) = @_; 180 $label_len = unpack("c", $data); 181 $data = substr($data, $label_len + 1); 188 # given a stream of data, read [all...] |
/bind-9.6-ESV-R11/bin/tests/system/ |
H A D | packet.pl | 88 my $data = pack("H*", $input); 89 my $len = length $data; 91 my $output = unpack("H*", $data); 99 $bytes = $sock->send($data); 102 $bytes += $sock->syswrite($data, $len);
|
H A D | ans.pl | 55 # Now you can add TSIG, just specify key/key data with: 61 # Note that this data will still be sent with any request for 62 # pattern, only this data will be signed. Currently, this is only 184 return $packet->data; 188 # given a stream of data, reads a DNS-formatted name and returns its 191 my ($data) = @_; 195 $label_len = unpack("c", $data); 196 $data = substr($data, $label_len + 1); 203 # given a stream of data, read [all...] |
/bind-9.6-ESV-R11/contrib/dlz/drivers/ |
H A D | dlz_bdb_driver.c | 97 DB *data; /*%< dns_data database handle */ member in struct:bdb_instance 110 char *data; member in struct:parsed_data 122 * bdb_parse_data function. The char (type & data) fields should not 123 * be "free"d as that memory is part of the DBT data field. It will be 136 * zone(a space)host(a space)ttl(a space)type(a space)remaining data 199 /* save pointer to remainder of DNS data */ 200 pd->data = tmp; 226 DBT key, data; local 235 key.data = strdup(name); 236 if (key.data 295 DBT key, data; local 402 DBT key, data; local 462 DBT key, data; local [all...] |
H A D | dlz_bdbhpt_driver.c | 96 DB *data; /*%< dns_data database handle */ member in struct:bdbhpt_instance 108 char *data; member in struct:bdbhpt_parsed_data 139 * bdbhpt_parse_data function. The char (type & data) fields should not 140 * be "free"d as that memory is part of the DBT data field. It will be 161 * remaining data 226 /* save pointer to remainder of DNS data */ 227 pd->data = tmp; 252 DBT key, data; local 261 key.data = strdup(name); 262 if (key.data 491 DBT key, data; local 542 DBT key, data; local [all...] |
/bind-9.6-ESV-R11/lib/isc/include/isc/ |
H A D | bitstring.h | 86 unsigned char * data; member in struct:isc_bitstring 97 isc_bitstring_init(isc_bitstring_t *bitstring, unsigned char *data, 101 * at 'data'. 'length' bits of the bitstring are valid. If 'lsb0' 109 *\li 'data' points to an array of unsigned char large enough to hold
|
/bind-9.6-ESV-R11/contrib/idn/idnkit-1.0-src/util/ |
H A D | generate_normalize_data.pl | 196 my %data = UCD::CompositionExclusions::parseline($_); 197 $exclusions{$data{CODE}} = 1; 208 my %data = UCD::SpecialCasing::parseline($_); 209 my $code = $data{CODE}; 210 my $lower = $data{LOWER}; 211 my $upper = $data{UPPER}; 212 my $cond = $data{CONDITION} || ''; 242 my %data = UCD::UnicodeData::parseline($_); 243 my $code = $data{CODE}; 246 if ($data{CLAS [all...] |