/bind-9.11.3/bin/tools/ |
H A D | isc-hmac-fixup.c | 32 char secret[1024]; local 38 fprintf(stderr, "Usage:\t%s algorithm secret\n", argv[0]); 49 isc_buffer_init(&buf, secret, sizeof(secret));
|
/bind-9.11.3/bin/confgen/ |
H A D | keygen.c | 178 DO("bsse64 encode secret", isc_base64_totext(&key_rawregion, -1, "", 198 * the name 'keyname' and the secret in the buffer 'secret'. 202 const char *keyname, isc_buffer_t *secret, 218 (int)isc_buffer_usedlength(secret), 219 (char *)isc_buffer_base(secret)); 201 write_key_file(const char *keyfile, const char *user, const char *keyname, isc_buffer_t *secret, dns_secalg_t alg) argument
|
/bind-9.11.3/bin/named/ |
H A D | tsigconf.c | 39 unsigned char *secret = NULL; local 66 (void)cfg_map_get(key, "secret", &secretobj); 96 secret = isc_mem_get(mctx, secretlen); 97 if (secret == NULL) { 101 isc_buffer_init(&secretbuf, secret, secretlen); 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, 111 isc_mem_put(mctx, secret, secretalloc); 112 secret = NULL; 129 if (secret != NULL) 130 isc_mem_put(mctx, secret, secretallo [all...] |
H A D | controlconf.c | 65 isc_region_t secret; member in struct:controlkey 116 if (key->secret.base != NULL) 117 isc_mem_put(mctx, key->secret.base, key->secret.length); 328 isccc_region_t secret; local 346 secret.rstart = NULL; 370 secret.rstart = isc_mem_get(listener->mctx, key->secret.length); 371 if (secret.rstart == NULL) 373 memmove(secret 753 char secret[1024]; local 849 char secret[1024]; local [all...] |
/bind-9.11.3/lib/dns/tests/ |
H A D | tsig_test.c | 261 unsigned char secret[16] = { 0 }; local 281 secret, sizeof(secret), ISC_FALSE,
|
/bind-9.11.3/lib/dns/ |
H A D | pkcs11dh_link.c | 153 isc_buffer_t *secret) 232 isc_buffer_availableregion(secret, &r); 236 isc_buffer_add(secret, attr->ulValueLen - i); 152 pkcs11dh_computesecret(const dst_key_t *pub, const dst_key_t *priv, isc_buffer_t *secret) argument
|
H A D | openssldh_link.c | 136 isc_buffer_t *secret) 151 isc_buffer_availableregion(secret, &r); 160 isc_buffer_add(secret, len); 135 openssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv, isc_buffer_t *secret) argument
|
H A D | tkey.c | 234 isc_region_t *serverrandomness, isc_buffer_t *secret) 265 isc_buffer_availableregion(secret, &r); 273 isc_buffer_add(secret, r2.length); 278 isc_buffer_add(secret, sizeof(digests)); 285 UNUSED(secret); 307 isc_buffer_t secret; local 403 tkey_log("process_dhtkey: failed to compute shared secret: %s", 409 isc_buffer_init(&secret, secretdata, sizeof(secretdata)); 427 RETERR(compute_secret(shared, &r2, &r, &secret)); 431 isc_buffer_base(&secret), 233 compute_secret(isc_buffer_t *shared, isc_region_t *queryrandomness, isc_region_t *serverrandomness, isc_buffer_t *secret) argument 1158 isc_buffer_t *shared = NULL, secret; local [all...] |
H A D | tsig.c | 672 unsigned char *secret, int length, isc_boolean_t generated, 682 REQUIRE(secret != NULL); 686 if (secret != NULL) { 689 isc_buffer_init(&b, secret, length); 702 if (secret != NULL) { 705 isc_buffer_init(&b, secret, length); 716 if (secret != NULL) { 719 isc_buffer_init(&b, secret, length); 730 if (secret != NULL) { 733 isc_buffer_init(&b, secret, lengt 671 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm, unsigned char *secret, int length, isc_boolean_t generated, dns_name_t *creator, isc_stdtime_t inception, isc_stdtime_t expire, isc_mem_t *mctx, dns_tsig_keyring_t *ring, dns_tsigkey_t **key) argument [all...] |
H A D | dst_api.c | 471 isc_buffer_t *secret) 475 REQUIRE(secret != NULL); 491 return (pub->func->computesecret(pub, priv, secret)); 470 dst_key_computesecret(const dst_key_t *pub, const dst_key_t *priv, isc_buffer_t *secret) argument
|
/bind-9.11.3/lib/isccc/ |
H A D | cc.c | 248 isc_uint32_t algorithm, isccc_region_t *secret) 270 isc_hmacmd5_init(&ctx.hmd5, secret->rstart, 271 REGION_SIZE(*secret)); 279 isc_hmacsha1_init(&ctx.hsha, secret->rstart, 280 REGION_SIZE(*secret)); 288 isc_hmacsha224_init(&ctx.h224, secret->rstart, 289 REGION_SIZE(*secret)); 297 isc_hmacsha256_init(&ctx.h256, secret->rstart, 298 REGION_SIZE(*secret)); 306 isc_hmacsha384_init(&ctx.h384, secret 247 sign(unsigned char *data, unsigned int length, unsigned char *hmac, isc_uint32_t algorithm, isccc_region_t *secret) argument 343 isccc_cc_towire(isccc_sexpr_t *alist, isc_buffer_t **buffer, isc_uint32_t algorithm, isccc_region_t *secret) argument 413 verify(isccc_sexpr_t *alist, unsigned char *data, unsigned int length, isc_uint32_t algorithm, isccc_region_t *secret) argument 599 table_fromwire(isccc_region_t *source, isccc_region_t *secret, isc_uint32_t algorithm, isccc_sexpr_t **alistp) argument 684 isccc_cc_fromwire(isccc_region_t *source, isccc_sexpr_t **alistp, isc_uint32_t algorithm, isccc_region_t *secret) argument [all...] |
/bind-9.11.3/bin/rndc/ |
H A D | rndc.c | 73 static isccc_region_t secret; variable 278 isccc_cc_fromwire(&source, &response, algorithm, &secret)); 352 isccc_cc_fromwire(&source, &response, algorithm, &secret)); 383 isccc_cc_towire(request, &databuf, algorithm, &secret)); 449 isccc_cc_towire(request, &databuf, algorithm, &secret)); 629 (void)cfg_map_get(key, "secret", &secretobj); 632 fatal("key must have algorithm and secret"); 655 secret.rstart = (unsigned char *)secretarray; 656 secret.rend = (unsigned char *)secretarray + sizeof(secretarray); 657 DO("decode base64 secret", isccc_base64_decod [all...] |
/bind-9.11.3/lib/dns/include/dns/ |
H A D | view.h | 220 unsigned char secret[32]; /* Client secret */ member in struct:dns_view
|
/bind-9.11.3/contrib/dnsperf-2.1.0.0-1/ |
H A D | dns.c | 111 isc_buffer_t secret; member in struct:perf_dnstsigkey 206 const char *sep1, *sep2, *alg, *name, *secret; local 218 perf_log_warning("invalid TSIG [alg:]name:secret"); 230 secret = sep1 + 1; 232 /* [alg:]name:secret */ 237 secret = sep2 + 1; 274 isc_buffer_init(&tsigkey->secret, tsigkey->secretdata, 276 result = isc_base64_decodestring(secret, &tsigkey->secret); 278 perf_log_warning("invalid TSIG secret ' 332 unsigned char *secret; local [all...] |
/bind-9.11.3/lib/bind9/ |
H A D | check.c | 1384 (void) cfg_map_get(options, "cookie-secret", &obj); 1386 unsigned char secret[32]; local 1388 memset(secret, 0, sizeof(secret)); 1389 isc_buffer_init(&b, secret, sizeof(secret)); 1393 "cookie-secret: too long"); 1396 "cookie-secret: invalid hex string"); 1405 "AES cookie-secret must be 128 bits"); 1412 "SHA1 cookie-secret mus [all...] |
/bind-9.11.3/bin/nsupdate/ |
H A D | nsupdate.c | 558 unsigned char *secret = NULL; local 578 fatal("key option must specify [hmac:]keyname:secret"); 583 fatal("key option must specify [hmac:]keyname:secret"); 608 secret = isc_mem_allocate(gmctx, secretlen); 609 if (secret == NULL) 612 isc_buffer_init(&secretbuf, secret, secretlen); 623 result = dns_tsigkey_create(mykeyname, hmacname, secret, secretlen, 632 if (secret != NULL) 633 isc_mem_free(gmctx, secret); 668 (void) cfg_map_get(key, "secret", 1584 unsigned char *secret = NULL; local [all...] |
/bind-9.11.3/bin/named/include/named/ |
H A D | server.h | 121 unsigned char secret[32]; /*%< Server Cookie Secret */ member in struct:ns_server
|