/bind-9.6-ESV-R11/lib/dns/ |
H A D | zonekey.c | 37 dns_rdata_dnskey_t key; local 42 result = dns_rdata_tostruct(keyrdata, &key, NULL); 46 if ((key.flags & DNS_KEYTYPE_NOAUTH) != 0) 48 if ((key.flags & DNS_KEYFLAG_OWNERMASK) != DNS_KEYOWNER_ZONE) 50 if (key.protocol != DNS_KEYPROTO_DNSSEC && 51 key.protocol != DNS_KEYPROTO_ANY)
|
H A D | ds.c | 42 dns_ds_buildrdata(dns_name_t *owner, dns_rdata_t *key, argument 53 REQUIRE(key != NULL); 54 REQUIRE(key->type == dns_rdatatype_dnskey); 71 dns_rdata_toregion(key, &r); 80 dns_rdata_toregion(key, &r); 87 ds.common.rdclass = key->rdclass; 96 return (dns_rdata_fromstruct(rdata, key->rdclass, dns_rdatatype_ds,
|
H A D | key.c | 60 dst_key_name(const dst_key_t *key) { argument 61 REQUIRE(VALID_KEY(key)); 62 return (key->key_name); 66 dst_key_size(const dst_key_t *key) { argument 67 REQUIRE(VALID_KEY(key)); 68 return (key->key_size); 72 dst_key_proto(const dst_key_t *key) { argument 73 REQUIRE(VALID_KEY(key)); 74 return (key->key_proto); 78 dst_key_alg(const dst_key_t *key) { argument 84 dst_key_flags(const dst_key_t *key) argument 90 dst_key_id(const dst_key_t *key) argument 96 dst_key_class(const dst_key_t *key) argument 102 dst_key_iszonekey(const dst_key_t *key) argument 116 dst_key_isnullkey(const dst_key_t *key) argument 130 dst_key_setbits(dst_key_t *key, isc_uint16_t bits) argument 142 dst_key_getbits(const dst_key_t *key) argument [all...] |
H A D | gssapi_link.c | 57 gssapi_create_signverify_ctx(dst_key_t *key, dst_context_t *dctx) { argument 61 UNUSED(key); 137 gss_ctx_id_t gssctx = dctx->key->keydata.gssctx; 192 gss_ctx_id_t gssctx = dctx->key->keydata.gssctx; 257 gssapi_generate(dst_key_t *key, int unused) { argument 258 UNUSED(key); 266 gssapi_isprivate(const dst_key_t *key) { argument 267 UNUSED(key); 272 gssapi_destroy(dst_key_t *key) { argument 273 REQUIRE(key ! [all...] |
/bind-9.6-ESV-R11/lib/isc/include/isc/ |
H A D | hmacmd5.h | 36 unsigned char key[ISC_HMACMD5_KEYLENGTH]; member in struct:__anon159 42 isc_hmacmd5_init(isc_hmacmd5_t *ctx, const unsigned char *key,
|
H A D | hmacsha.h | 40 unsigned char key[ISC_HMACSHA1_KEYLENGTH]; member in struct:__anon160 45 unsigned char key[ISC_HMACSHA224_KEYLENGTH]; member in struct:__anon161 50 unsigned char key[ISC_HMACSHA256_KEYLENGTH]; member in struct:__anon162 55 unsigned char key[ISC_HMACSHA384_KEYLENGTH]; member in struct:__anon163 60 unsigned char key[ISC_HMACSHA512_KEYLENGTH]; member in struct:__anon164 66 isc_hmacsha1_init(isc_hmacsha1_t *ctx, const unsigned char *key, 84 isc_hmacsha224_init(isc_hmacsha224_t *ctx, const unsigned char *key, 102 isc_hmacsha256_init(isc_hmacsha256_t *ctx, const unsigned char *key, 120 isc_hmacsha384_init(isc_hmacsha384_t *ctx, const unsigned char *key, 138 isc_hmacsha512_init(isc_hmacsha512_t *ctx, const unsigned char *key, [all...] |
/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | hip_55.h | 28 unsigned char * key; member in struct:dns_rdata_hip
|
H A D | ipseckey_45.h | 31 unsigned char *key; member in struct:dns_rdata_ipseckey
|
H A D | tkey_249.h | 35 unsigned char * key; member in struct:dns_rdata_tkey
|
H A D | key_25.c | 75 /* Ensure there's at least enough data to compute a key ID for MD5 */ 117 /* key */ 135 RETERR(str_totext(" ; key id = ", target)); 160 * RSAMD5 computes key ID differently from other 203 dns_rdata_key_t *key = source; local 207 REQUIRE(key->common.rdtype == type); 208 REQUIRE(key->common.rdclass == rdclass); 214 RETERR(uint16_tobuffer(key->flags, target)); 217 RETERR(uint8_tobuffer(key->protocol, target)); 220 RETERR(uint8_tobuffer(key 228 dns_rdata_key_t *key = target; local 271 dns_rdata_key_t *key = (dns_rdata_key_t *) source; local [all...] |
/bind-9.6-ESV-R11/lib/isc/tests/ |
H A D | symtab_test.c | 33 undefine(char *key, unsigned int type, isc_symvalue_t value, void *arg) { argument 37 isc_mem_free(mctx, key); 72 char str[16], *key; local 75 key = isc_mem_strdup(mctx, str); 76 ATF_REQUIRE(key != NULL); 79 result = isc_symtab_define(st, key, 1, value, policy); 82 undefine(key, 1, value, NULL); 89 char str[16], *key; local 92 key = isc_mem_strdup(mctx, str); 93 ATF_REQUIRE(key ! [all...] |
/bind-9.6-ESV-R11/bin/tests/ |
H A D | sym_test.c | 33 undefine_action(char *key, unsigned int type, isc_symvalue_t value, void *arg) argument 38 isc_mem_free(mctx, key); 44 char s[1000], *cp, *key; local 90 key = cp; 94 result = isc_symtab_lookup(st, key, 0, &value); 96 printf("lookup('%s'): %s", key, 106 key = isc_mem_strdup(mctx, key); 108 result = isc_symtab_define(st, key, 1, value, 112 key, c [all...] |
H A D | hash_test.c | 62 unsigned char key[20]; local 106 memset(key, 0x0b, 16); 107 isc_hmacmd5_init(&hmacmd5, key, 16); 114 strcpy((char *)key, "Jefe"); 115 isc_hmacmd5_init(&hmacmd5, key, 4); 126 memset(key, 0xaa, 16); 127 isc_hmacmd5_init(&hmacmd5, key, 16); 137 memset(key, 0x0b, 20); 138 isc_hmacsha1_init(&hmacsha1, key, 20); 145 strcpy((char *)key, "Jef [all...] |
/bind-9.6-ESV-R11/lib/isc/ |
H A D | hmacmd5.c | 40 * Start HMAC-MD5 process. Initialize an md5 context and digest the key. 43 isc_hmacmd5_init(isc_hmacmd5_t *ctx, const unsigned char *key, argument 49 memset(ctx->key, 0, sizeof(ctx->key)); 50 if (len > sizeof(ctx->key)) { 53 isc_md5_update(&md5ctx, key, len); 54 isc_md5_final(&md5ctx, ctx->key); 56 memmove(ctx->key, key, len); 61 ipad[i] ^= ctx->key[ [all...] |
H A D | symtab.c | 33 char * key; member in struct:elt 112 (symtab->undefine_action)(elt->key, 128 hash(const char *key, isc_boolean_t case_sensitive) { argument 139 for (s = key; *s != '\0'; s++) { 143 for (s = key; *s != '\0'; s++) { 158 strcmp(e->key, (k)) == 0) \ 164 strcasecmp(e->key, (k)) == 0) \ 170 isc_symtab_lookup(isc_symtab_t *symtab, const char *key, unsigned int type, argument 177 REQUIRE(key != NULL); 179 FIND(symtab, key, typ 231 isc_symtab_define(isc_symtab_t *symtab, const char *key, unsigned int type, isc_symvalue_t value, isc_symexists_t exists_policy) argument 283 isc_symtab_undefine(isc_symtab_t *symtab, const char *key, unsigned int type) argument [all...] |
/bind-9.6-ESV-R11/lib/isc/win32/ |
H A D | thread.c | 71 isc_thread_key_getspecific(isc_thread_key_t key) { argument 72 return(TlsGetValue(key)); 76 isc_thread_key_setspecific(isc_thread_key_t key, void *value) { argument 77 return (TlsSetValue(key, value) ? 0 : GetLastError()); 81 isc_thread_key_create(isc_thread_key_t *key, void (*func)(void *)) { argument 82 *key = TlsAlloc(); 84 return ((*key != -1) ? 0 : GetLastError()); 88 isc_thread_key_delete(isc_thread_key_t key) { argument 89 return (TlsFree(key) ? 0 : GetLastError());
|
/bind-9.6-ESV-R11/contrib/pkcs11-keygen/ |
H A D | readkey.c | 33 CK_OBJECT_HANDLE key = CK_INVALID_HANDLE; local 146 rv = C_FindObjects(hSession, &key, 1, &ulObjectCount); 153 fprintf(stderr, "C_FindObjects: can't find the key\n"); 158 rv = C_GetAttributeValue(hSession, key, attr_template, 9); 187 rv = C_FindObjects(hSession, &key, 1, &ulObjectCount);
|
H A D | writekey.c | 22 /* Define static key template values */ 37 CK_OBJECT_HANDLE key = CK_INVALID_HANDLE; local 106 /* Read the key */ 169 /* check if a key with the same label already exists */ 176 rv = C_FindObjects(hSession, &key, 1, &ulObjectCount); 188 /* fill attributes for the public key */ 272 rv = C_CreateObject(hSession, template, 10, &key); 279 /* fill attributes for the private key */ 336 rv = C_CreateObject(hSession, template, 18, &key); 339 (void) C_DestroyObject(hSession, key); [all...] |
/bind-9.6-ESV-R11/contrib/sdb/bdb/ |
H A D | bdb.c | 109 DBT key, data; local 122 memset(&key, 0, sizeof(DBT)); 125 (const char *)key.data = name; 126 key.size = strlen(name); 128 ret = c->c_get(c, &key, &data, DB_SET); 130 ((char *)key.data)[key.size] = 0; 146 ret = c->c_get(c, &key, &data, DB_NEXT_DUP); 161 DBT key, data; local 174 memset(&key, [all...] |
H A D | zone2bdb.c | 66 static DBT key, data; local 75 key.data = isc_buffer_base(&keybuf); 76 key.size = isc_buffer_usedlength(&keybuf); 93 REQUIRE(db->put(db, NULL, &key, &data, 0) == 0);
|
/bind-9.6-ESV-R11/bin/dnssec/ |
H A D | dnssec-keyfromlabel.c | 65 fprintf(stderr, " -l label: label of the key\n"); 66 fprintf(stderr, " name: owner of the key\n"); 78 fprintf(stderr, " -k : generate a TYPE=KEY key\n"); 80 fprintf(stderr, " K<name>+<alg>+<id>.key, " 91 dst_key_t *key = NULL, *oldkey; local 183 fatal("the key label was not specified"); 185 fatal("the key name was not specified"); 252 fatal("specified null key with signing authority"); 257 fatal("a key with algorithm '%s' cannot be a zone key", [all...] |
/bind-9.6-ESV-R11/bin/named/ |
H A D | tsigconf.c | 45 const cfg_obj_t *key = NULL; local 68 key = cfg_listelt_value(element); 69 keyid = cfg_obj_asstring(cfg_map_getname(key)); 73 (void)cfg_map_get(key, "algorithm", &algobj); 74 (void)cfg_map_get(key, "secret", &secretobj); 78 * Create the key name. 96 "key '%s': has a unsupported algorithm '%s'", 126 dst_key_setbits(tsigkey->key, bits); 133 cfg_obj_log(key, ns_g_lctx, ISC_LOG_ERROR, 134 "configuring key ' [all...] |
/bind-9.6-ESV-R11/contrib/dlz/drivers/ |
H A D | sdlz_helper.c | 494 sdlzh_get_parameter_value(isc_mem_t *mctx, const char *input, const char* key) argument 501 if (key == NULL || input == NULL || strlen(input) < 1) 504 keylen = strlen(key); 509 keystart = strstr(input, key);
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | peer.h | 77 dns_name_t *key; member in struct:dns_peer
|
H A D | tsig.h | 66 * LRU list of generated key along with a count of the keys on the 78 dst_key_t *key; /*%< Key */ member in struct:dns_tsigkey 102 dns_tsig_keyring_t *ring, dns_tsigkey_t **key); 109 dns_tsig_keyring_t *ring, dns_tsigkey_t **key); 111 * Creates a tsig key structure and saves it in the keyring. If key is 112 * not NULL, *key will contain a copy of the key. The keys validity 114 * inception == expire. If the key was generated, the creating identity, 117 * allows a transient key wit [all...] |