/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | cert_37.h | 20 isc_uint8_t algorithm; member in struct:dns_rdata_cert
|
H A D | ds_43.h | 20 isc_uint8_t algorithm; member in struct:dns_rdata_ds
|
H A D | key_25.h | 22 isc_uint8_t algorithm; member in struct:dns_rdata_key
|
H A D | sshfp_44.h | 20 isc_uint8_t algorithm; member in struct:dns_rdata_sshfp
|
H A D | hip_55.h | 22 isc_uint8_t algorithm; member in struct:dns_rdata_hip
|
H A D | ipseckey_45.h | 19 isc_uint8_t algorithm; member in struct:dns_rdata_ipseckey
|
H A D | keydata_65533.h | 22 isc_uint8_t algorithm; member in struct:dns_rdata_keydata
|
H A D | rrsig_46.h | 20 dns_secalg_t algorithm; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 21 dns_secalg_t algorithm; member in struct:dns_rdata_sig_t
|
H A D | tkey_249.h | 20 dns_name_t algorithm; member in struct:dns_rdata_tkey
|
H A D | key_25.c | 50 /* algorithm */ 76 unsigned char algorithm; local 106 /* algorithm */ 107 algorithm = sr.base[0]; 108 snprintf(buf, sizeof(buf), "%u", algorithm); 117 algorithm == DNS_KEYALG_PRIVATEDNS) { 123 dns_secalg_format((dns_secalg_t) algorithm, algbuf, 141 dst_region_computeid(&tmpr, algorithm)); 165 dst_region_computeid(&tmpr, algorithm)); 173 unsigned char algorithm; local [all...] |
H A D | keydata_65533.c | 66 /* algorithm */ 92 unsigned char algorithm; local 142 /* algorithm */ 143 algorithm = sr.base[0]; 144 snprintf(buf, sizeof(buf), "%u", algorithm); 179 dns_secalg_format((dns_secalg_t) algorithm, algbuf, 188 dst_region_computeid(&tmpr, algorithm)); 305 RETERR(uint8_tobuffer(keydata->algorithm, target)); 358 keydata->algorithm = uint8_fromregion(&sr);
|
H A D | hip_55.c | 120 unsigned char algorithm; local 131 algorithm = uint8_fromregion(®ion); 143 snprintf(buf, sizeof(buf), "%u ", algorithm); 203 isc_region_consume(®ion, 2); /* hit length + algorithm */ 270 RETERR(uint8_tobuffer(hip->algorithm, target)); 302 hip->algorithm = uint8_fromregion(®ion); 470 isc_region_consume(&r1, 2); /* hit length + algorithm */
|
/bind-9.11.3/lib/dns/rdata/any_255/ |
H A D | tsig_250.h | 18 dns_name_t algorithm; member in struct:dns_rdata_any_tsig
|
/bind-9.11.3/lib/dns/include/dns/ |
H A D | tsig.h | 77 dns_name_t *algorithm; /*%< Algorithm name */ member in struct:dns_tsigkey 95 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm, 102 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, 113 * unimplemented algorithm will cause failure only if dstkey != NULL; this 114 * allows a transient key with an invalid algorithm to exist long enough 122 *\li 'algorithm' is a valid dns_name_t 134 *\li #ISC_R_NOTIMPLEMENTED - algorithm is not implemented 221 dns_name_t *algorithm, dns_tsig_keyring_t *ring); 224 * algorithm. Also increments the key's reference counter. 230 *\li 'algorithm' i [all...] |
/bind-9.11.3/lib/dns/ |
H A D | keytable.c | 378 dns_secalg_t algorithm, dns_keytag_t tag, 386 * Search for a key named 'name', matching 'algorithm' and 'tag' in 401 * didn't get a match on algorithm and key id arguments. 414 if (algorithm == dst_key_alg(knode->key) 377 dns_keytable_findkeynode(dns_keytable_t *keytable, dns_name_t *name, dns_secalg_t algorithm, dns_keytag_t tag, dns_keynode_t **keynodep) argument
|
H A D | opensslrsa_link.c | 1779 dst__opensslrsa_init(dst_func_t **funcp, unsigned char algorithm) { argument 1783 switch (algorithm) {
|
H A D | tkey.c | 318 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_HMACMD5_NAME)) { 430 RETERR(dns_tsigkey_create(name, &tkeyin->algorithm, 484 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPI_NAME) && 485 !dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPIMS_NAME)) { 499 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring); 548 RETERR(dns_tsigkey_createfromkey(name, &tkeyin->algorithm, 613 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring); 735 dns_name_init(&tkeyout.algorithm, NULL); 736 dns_name_clone(&tkeyin.algorithm, &tkeyout.algorithm); 971 dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name, dns_name_t *algorithm, isc_buffer_t *nonce, isc_uint32_t lifetime) argument [all...] |
H A D | tsig.c | 243 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, argument 255 REQUIRE(algorithm != NULL); 270 if (dns_name_equal(algorithm, DNS_TSIG_HMACMD5_NAME)) { 271 tkey->algorithm = DNS_TSIG_HMACMD5_NAME; 278 if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA1_NAME)) { 279 tkey->algorithm = DNS_TSIG_HMACSHA1_NAME; 284 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA224_NAME)) { 285 tkey->algorithm = DNS_TSIG_HMACSHA224_NAME; 291 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA256_NAME)) { 292 tkey->algorithm 495 dst_alg_fromname(dns_name_t *algorithm) argument 529 dns_name_t *name, *creator, *algorithm; local 671 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm, unsigned char *secret, int length, isc_boolean_t generated, dns_name_t *creator, isc_stdtime_t inception, isc_stdtime_t expire, isc_mem_t *mctx, dns_tsig_keyring_t *ring, dns_tsigkey_t **key) argument 1846 dns_tsigkey_find(dns_tsigkey_t **tsigkey, dns_name_t *name, dns_name_t *algorithm, dns_tsig_keyring_t *ring) argument [all...] |
H A D | validator.c | 227 * Check that we have atleast one supported algorithm in the DLV RRset. 245 dlv.algorithm)) 1229 if (siginfo->algorithm == 1409 return (dst_region_computeid(&r, key->algorithm)); 1458 if (sig.algorithm != key.algorithm || 1598 * At this point we could check that the signature algorithm 1603 val->siginfo->algorithm)) { 1713 dns_secalg_t algorithm) 1728 if (keyid != sig.keyid || algorithm ! 1712 checkkey(dns_validator_t *val, dns_rdata_t *keyrdata, isc_uint16_t keyid, dns_secalg_t algorithm) argument 1754 keyfromds(dns_validator_t *val, dns_rdataset_t *rdataset, dns_rdata_t *dsrdata, isc_uint8_t digest, isc_uint16_t keyid, dns_secalg_t algorithm, dns_rdata_t *keyrdata) argument [all...] |
/bind-9.11.3/lib/isccc/ |
H A D | cc.c | 82 0x00, /*%< algorithm */ 248 isc_uint32_t algorithm, isccc_region_t *secret) 267 switch (algorithm) { 334 if (algorithm == ISCCC_ALG_HMACMD5) 344 isc_uint32_t algorithm, isccc_region_t *secret) 351 4 + ((algorithm == ISCCC_ALG_HMACMD5) ? 355 if (algorithm == ISCCC_ALG_HMACMD5) 374 if (algorithm == ISCCC_ALG_HMACMD5) { 388 *hmac_alg = algorithm; 408 algorithm, secre 247 sign(unsigned char *data, unsigned int length, unsigned char *hmac, isc_uint32_t algorithm, isccc_region_t *secret) argument 343 isccc_cc_towire(isccc_sexpr_t *alist, isc_buffer_t **buffer, isc_uint32_t algorithm, isccc_region_t *secret) argument 413 verify(isccc_sexpr_t *alist, unsigned char *data, unsigned int length, isc_uint32_t algorithm, isccc_region_t *secret) argument 599 table_fromwire(isccc_region_t *source, isccc_region_t *secret, isc_uint32_t algorithm, isccc_sexpr_t **alistp) argument 684 isccc_cc_fromwire(isccc_region_t *source, isccc_sexpr_t **alistp, isc_uint32_t algorithm, isccc_region_t *secret) argument [all...] |
/bind-9.11.3/bin/rndc/ |
H A D | rndc.c | 72 static isc_uint32_t algorithm; variable 168 signing -clear <keyid>/<algorithm> zone [class [view]]\n\ 278 isccc_cc_fromwire(&source, &response, algorithm, &secret)); 342 "* the key signing algorithm is incorrect, or\n" 352 isccc_cc_fromwire(&source, &response, algorithm, &secret)); 383 isccc_cc_towire(request, &databuf, algorithm, &secret)); 449 isccc_cc_towire(request, &databuf, algorithm, &secret)); 630 (void)cfg_map_get(key, "algorithm", &algorithmobj); 632 fatal("key must have algorithm and secret"); 639 algorithm [all...] |
/bind-9.11.3/bin/named/ |
H A D | controlconf.c | 64 isc_uint32_t algorithm; member in struct:controlkey 327 isc_uint32_t algorithm; local 345 algorithm = DST_ALG_UNKNOWN; 375 algorithm = key->algorithm; 377 algorithm, &secret); 503 result = isccc_cc_towire(response, &conn->buffer, algorithm, &secret); 731 key->algorithm = DST_ALG_UNKNOWN; 778 (void)cfg_map_get(keydef, "algorithm", &algobj); 790 "unsupported algorithm ' [all...] |
H A D | update.c | 1242 * covered and algorithm. 1250 dbsig.algorithm == updatesig.algorithm) 2426 keyid = dst_region_computeid(&r, dnskey.algorithm); 2428 buf[0] = dnskey.algorithm; 3253 dns_secalg_t algorithm; local 3266 algorithm = dnskey.algorithm; 3267 keyid = dst_region_computeid(&r, algorithm); 3269 result = dns_zone_signwithkey(zone, algorithm, keyi [all...] |
/bind-9.11.3/lib/bind9/ |
H A D | check.c | 301 ISC_LOG_ERROR, "invalid algorithm '%s'", 1372 (void) cfg_map_get(options, "cookie-algorithm", &obj); 1378 "cookie-algorithm: '%s' not supported", ccalg); 2456 const char *algorithm; local 2476 (void)cfg_map_get(key, "algorithm", &algobj); 2481 "'algorithm' defined", 2494 algorithm = cfg_obj_asstring(algobj); 2497 if (strncasecmp(algorithms[i].name, algorithm, len) == 0 && 2498 (algorithm[len] == '\0' || 2499 (algorithms[i].size != 0 && algorithm[le [all...] |