Searched refs:ksk (Results 1 - 11 of 11) sorted by relevance

/bind-9.6-ESV-R11/bin/tests/system/resolver/ns6/
H A Dkeygen.sh28 ksk=`$KEYGEN -a RSASHA256 -b 1024 -r $RANDFILE -f KSK $zone`
30 cat $ksk.key $zsk.key >> $zonefile
/bind-9.6-ESV-R11/contrib/zkt/
H A Dzkt.c275 int ksk; local
283 ksk = dki_isksk (dkp);
284 if ( (ksk && !kskflag) || (!ksk && !zskflag) )
303 int ksk;
307 ksk = dki_isksk (dkp);
308 if ( (ksk && !kskflag) || (!ksk && !zskflag) )
325 int ksk; local
333 ksk
[all...]
H A Drollover.c65 static dki_t *genkey (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument
72 if ( ksk )
82 static dki_t *genkey2 (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument
89 if ( ksk )
224 static int kskrollover (dki_t *ksk, zone_t *zonelist, zone_t *zp) argument
238 assert ( ksk != NULL );
242 /* check ksk lifetime */
243 if ( (lifetime = dki_lifetime (ksk)) == 0 ) /* if lifetime of key is not set.. */
247 age = dki_age (ksk, currtime);
252 /* check if we have to change the ksk
[all...]
H A Ddki.h179 extern dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days);
187 extern const dki_t *dki_find (const dki_t *list, int ksk, int status, int first);
188 extern const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no);
H A Ddnssec-zkt.c92 {"ksk-rollover", no_argument, NULL, '9'},
93 {"ksk-status", required_argument, NULL, '0'},
94 {"ksk-roll-status", required_argument, NULL, '0'},
95 {"ksk-newkey", required_argument, NULL, '1'},
96 {"ksk-publish", required_argument, NULL, '2'},
97 {"ksk-delkey", required_argument, NULL, '3'},
98 {"ksk-roll-phase1", required_argument, NULL, '1'},
99 {"ksk-roll-phase2", required_argument, NULL, '2'},
100 {"ksk-roll-phase3", required_argument, NULL, '3'},
103 {"ksk", no_argumen
551 int ksk; local
[all...]
H A Dzkt-keyman.c91 {"ksk-rollover", no_argument, NULL, '9'},
92 {"ksk-status", required_argument, NULL, '0'},
93 {"ksk-roll-status", required_argument, NULL, '0'},
94 {"ksk-newkey", required_argument, NULL, '1'},
95 {"ksk-publish", required_argument, NULL, '2'},
96 {"ksk-delkey", required_argument, NULL, '3'},
97 {"ksk-roll-phase1", required_argument, NULL, '1'},
98 {"ksk-roll-phase2", required_argument, NULL, '2'},
99 {"ksk-roll-phase3", required_argument, NULL, '3'},
100 {"ksk", no_argumen
458 int ksk; local
[all...]
H A Ddki.c240 dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days) argument
251 if ( ksk )
1191 ** dki_find () find the n'th ksk or zsk key with given status
1193 const dki_t *dki_find (const dki_t *list, int ksk, int status, int no) argument
1200 if ( dki_isksk (dkp) == ksk && dki_status (dkp) == status )
1210 ** dki_findalgo () find the n'th ksk or zsk key with given
1213 const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no) argument
1220 if ( dki_isksk (dkp) == ksk && dki_algo (dkp) == alg &&
H A Dzkt-signer.c507 dbg_msg("parsezonedir check rfc 5011 ksk ");
511 verbmesg (2, zp->conf, "\t\t->not a rfc5011 zone, looking for a regular ksk rollover\n");
513 dbg_msg("parsezonedir check ksk ");
795 int ksk; local
808 ksk = 1;
811 if ( ksk && !dki_isksk (dkp) )
814 ksk = 0;
980 /* check if special parent-file exist (ksk rollover) */
/bind-9.6-ESV-R11/contrib/pkcs11-keygen/
H A Dwritekey.sh56 label=$zone,ksk,$ext
/bind-9.6-ESV-R11/bin/dnssec/
H A Ddnssec-keyfromlabel.c94 isc_uint16_t flags = 0, ksk = 0; local
130 ksk = DNS_KEYFLAG_KSK;
242 flags |= ksk;
H A Ddnssec-keygen.c137 isc_uint16_t flags = 0, ksk = 0; local
187 ksk = DNS_KEYFLAG_KSK;
419 flags |= ksk;

Completed in 1567 milliseconds