/bind-9.11.3/bin/confgen/ |
H A D | keygen.h | 20 void generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, 25 dns_secalg_t alg); 27 const char *alg_totext(dns_secalg_t alg); 29 int alg_bits(dns_secalg_t alg);
|
H A D | keygen.c | 43 alg_totext(dns_secalg_t alg) { argument 44 switch (alg) { 94 alg_bits(dns_secalg_t alg) { argument 95 switch (alg) { 118 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, argument 130 switch (alg) { 148 fatal("unsupported algorithm %d\n", alg); 167 DO("generate key", dst_key_generate(dns_rootname, alg, 203 dns_secalg_t alg) { 205 const char *algname = alg_totext(alg); 201 write_key_file(const char *keyfile, const char *user, const char *keyname, isc_buffer_t *secret, dns_secalg_t alg) argument [all...] |
H A D | rndc-confgen.c | 76 -A alg: algorithm (default hmac-md5)\n\ 92 -A alg: algorithm (default hmac-sha256)\n\ 117 dns_secalg_t alg; local 139 alg = DST_ALG_HMACMD5; 141 alg = DST_ALG_HMACSHA256; 157 alg = alg_fromtext(algname); 158 if (alg == DST_ALG_UNKNOWN) 229 keysize = alg_bits(alg); 230 algname = alg_totext(alg); 235 generate_key(mctx, randomfile, alg, keysiz [all...] |
H A D | ddns-confgen.c | 67 %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone]\n\ 68 -a alg: algorithm (default hmac-sha256)\n\ 78 %s [-a alg] [-r randomfile] [keyname]\n\ 79 -a alg: algorithm (default hmac-sha256)\n\ 100 dns_secalg_t alg = DST_ALG_HMACSHA256; local 141 alg = alg_fromtext(algname); 142 if (alg == DST_ALG_UNKNOWN) 144 keysize = alg_bits(alg); 209 algname = alg_totext(alg); 235 generate_key(mctx, randomfile, alg, keysiz [all...] |
/bind-9.11.3/bin/tests/system/ |
H A D | testcrypto.sh | 17 alg="-a RSAMD5 -b 512" 29 alg="" 33 alg="-a eccgost" 38 alg="-a ecdsap256sha256" 43 alg="-a ED25519" 56 if $KEYGEN $args $alg foo > /dev/null 2>&1
|
/bind-9.11.3/bin/tests/system/pkcs11/ |
H A D | tests.sh | 33 for alg in $algs; do 34 zonefile=ns1/$alg.example.db 35 echo "I:testing PKCS#11 key generation ($alg)" 36 count=`$PK11LIST | grep robie-$alg-ksk | wc -l` 39 echo "I:testing offline signing with PKCS#11 keys ($alg)" 44 echo "I:testing inline signing with PKCS#11 keys ($alg)" 46 $DIG $DIGOPTS ns.$alg.example. @10.53.0.1 a > dig.out.$alg.0 || ret=1 49 count0=`grep RRSIG dig.out.$alg.0 | wc -l` 51 $NSUPDATE -v > upd.log.$alg <<EN [all...] |
/bind-9.11.3/contrib/scripts/ |
H A D | check-secure-delegation.pl.in | 93 foreach $alg ( keys %dnskeyalg ) { 94 print "Missing $zone DNSKEY RRSIG for algorithm $alg\n" 95 if (!exists($dnskeygood{$alg})); 101 foreach $alg ( keys %algorithms ) { 102 if (exists($dsgood{$alg})) { 103 print "$zone algorithm $alg good " . 106 print "$zone algorithm $alg bad " .
|
H A D | check5011.pl | 30 m{ alg = (\S+)\s*; key id = (\d+)}; 31 $k->{alg} = $1; 89 printf "%s %s", fmtkey $k, $k->{alg}; 115 printf "%s %s missing;", fmtkey $a, $a->{alg};
|
/bind-9.11.3/lib/dns/include/dns/ |
H A D | secalg.h | 62 dns_secalg_format(dns_secalg_t alg, char *cp, unsigned int size);
|
/bind-9.11.3/bin/tests/dst/ |
H A D | dst_test.c | 133 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx) { argument 137 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key); 138 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 142 printf("write(%d) returned: %s\n", alg, isc_result_totext(ret)); 157 int alg = DST_ALG_DH; local 160 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1); 161 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 164 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2); 165 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 170 printf("write(%d) returned: %s\n", alg, isc_result_totex 211 generate(int alg, isc_mem_t *mctx) argument [all...] |
H A D | t_dst.c | 172 int alg = DST_ALG_DH; local 187 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1); 190 alg, dst_result_totext(ret)); 195 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2); 198 alg, dst_result_totext(ret)); 226 alg, dst_result_totext(ret)); 234 alg, dst_result_totext(ret)); 276 io(dns_name_t *name, isc_uint16_t id, isc_uint16_t alg, int type, argument 292 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key); 295 alg, dst_result_totex 389 generate(int alg, isc_mem_t *mctx, int size, int *nfails) argument 703 t2_sigchk(char *datapath, char *sigpath, char *keyname, int id, int alg, int type, isc_mem_t *mctx, char *expected_result, int *nfails, int *nprobs) argument 962 char *alg; local [all...] |
/bind-9.11.3/bin/dnssec/ |
H A D | dnssec-keygen.c | 173 fprintf(stderr, " K<name>+<alg>+<id>.key, " 174 "K<name>+<alg>+<id>.private\n"); 219 dns_secalg_t alg; local 562 alg = DST_ALG_HMACMD5; 578 alg = DST_ALG_HMACSHA1; 580 alg = DST_ALG_HMACSHA224; 582 alg = DST_ALG_HMACSHA256; 584 alg = DST_ALG_HMACSHA384; 586 alg = DST_ALG_HMACSHA512; 590 ret = dns_secalg_fromtext(&alg, [all...] |
H A D | dnssec-keyfromlabel.c | 119 fprintf(stderr, " K<name>+<alg>+<id>.key, " 120 "K<name>+<alg>+<id>.private\n"); 143 dns_secalg_t alg; local 430 ret = dns_secalg_fromtext(&alg, &r); 433 if (alg == DST_ALG_DH) 438 alg != DST_ALG_NSEC3DSA && alg != DST_ALG_NSEC3RSASHA1 && 439 alg != DST_ALG_RSASHA256 && alg != DST_ALG_RSASHA512 && 440 alg ! [all...] |
/bind-9.11.3/lib/dns/include/dst/ |
H A D | dst.h | 158 dst_algorithm_supported(unsigned int alg); 299 dst_key_getfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg, 310 * \li "alg" is a supported key algorithm. 322 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, 333 * \li "alg" is a supported key algorithm. 453 dst_key_frombuffer(dns_name_t *name, unsigned int alg, 462 *\li "alg" is a supported key algorithm. 548 dst_key_buildinternal(dns_name_t *name, unsigned int alg, 555 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, 561 dst_key_generate(dns_name_t *name, unsigned int alg, [all...] |
/bind-9.11.3/lib/dns/ |
H A D | dst_parse.h | 43 #define TAG(alg, off) (((alg) << TAG_SHIFT) + (off)) 131 dst__privstruct_parse(dst_key_t *key, unsigned int alg, isc_lex_t *lex,
|
H A D | key.c | 26 dst_region_computeid(const isc_region_t *source, unsigned int alg) { argument 37 if (alg == DST_ALG_RSAMD5) 51 dst_region_computerid(const isc_region_t *source, unsigned int alg) { argument 62 if (alg == DST_ALG_RSAMD5)
|
H A D | dst_api.c | 85 unsigned int alg, 96 unsigned int alg, 102 unsigned int alg, 110 static isc_result_t algorithm_status(unsigned int alg); 123 #define CHECKALG(alg) \ 126 _r = algorithm_status(alg); \ 301 dst_algorithm_supported(unsigned int alg) { argument 304 if (alg >= DST_MAX_ALGS || dst_t_func[alg] == NULL) 532 unsigned int alg, in 531 dst_key_getfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, const char *directory, isc_mem_t *mctx, isc_buffer_t *buf) argument 557 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, const char *directory, isc_mem_t *mctx, dst_key_t **keyp) argument 747 isc_uint8_t alg, proto; local 786 dst_key_frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument 888 dst_key_buildinternal(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, void *data, isc_mem_t *mctx, dst_key_t **keyp) argument 922 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, const char *engine, const char *label, const char *pin, isc_mem_t *mctx, dst_key_t **keyp) argument 964 dst_key_generate(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp) argument 975 dst_key_generate2(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp, void (*callback)(int)) argument 1394 dst_key_restore(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, const char *keystr, dst_key_t **keyp) argument 1431 get_key_struct(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, unsigned int bits, dns_rdataclass_t rdclass, dns_ttl_t ttl, isc_mem_t *mctx) argument 1836 buildfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg, unsigned int type, const char *directory, isc_buffer_t *out) argument 1893 frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument 1932 algorithm_status(unsigned int alg) argument [all...] |
H A D | dst_parse.c | 143 find_value(const char *s, const unsigned int alg) { argument 148 (TAG_ALG(map[i].value) == alg)) 378 unsigned int alg) 385 if (priv->elements[j].tag == TAG(alg, i)) 394 check_data(const dst_private_t *priv, const unsigned int alg, argument 401 switch (alg) { 432 return (check_hmac_sha(priv, HMACSHA1_NTAGS, alg)); 434 return (check_hmac_sha(priv, HMACSHA224_NTAGS, alg)); 436 return (check_hmac_sha(priv, HMACSHA256_NTAGS, alg)); 438 return (check_hmac_sha(priv, HMACSHA384_NTAGS, alg)); 377 check_hmac_sha(const dst_private_t *priv, unsigned int ntags, unsigned int alg) argument 462 dst__privstruct_parse(dst_key_t *key, unsigned int alg, isc_lex_t *lex, isc_mem_t *mctx, dst_private_t *priv) argument [all...] |
H A D | tsig.c | 73 static unsigned char hmacmd5_ndata[] = "\010hmac-md5\007sig-alg\003reg\003int"; 982 * Digest the name, class, ttl, alg. 1166 unsigned int alg; local 1279 alg = dst_key_alg(key); 1285 alg == DST_ALG_HMACMD5 || 1287 alg == DST_ALG_HMACSHA1 || 1288 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || 1289 alg == DST_ALG_HMACSHA384 || alg 1527 unsigned int alg; local [all...] |
/bind-9.11.3/bin/tests/system/pkcs11ssl/ |
H A D | tests.sh | 19 alg=rsa 36 update add `grep -v ';' ns1/${alg}.key`
|
/bind-9.11.3/bin/named/ |
H A D | tsigconf.c | 53 dns_name_t *alg; local 85 if (ns_config_getkeyalgorithm(algstr, &alg, &bits) 108 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen,
|
/bind-9.11.3/lib/irs/ |
H A D | dnsconf.c | 56 isc_uint32_t flags, proto, alg; local 87 alg = cfg_obj_asuint32(cfg_tuple_get(key, 101 if (alg > 0xff) 105 keystruct.algorithm = (isc_uint8_t)alg;
|
/bind-9.11.3/bin/tests/system/inline/ns3/ |
H A D | sign.sh | 113 for alg in ECCGOST ECDSAP256SHA256 NSEC3RSASHA1 DSA 115 case $alg in 138 k1=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone -f KSK $zone` 139 k2=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone $zone` 140 k3=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone $zone` 141 k4=`$KEYGEN -q -r $RANDFILE -a $alg -b 1024 -n zone -f KSK $zone` 148 ( echo "importkey failed: $alg"; rm -f $checkfile ) 152 ( echo "importkey failed: $alg"; rm -f $checkfile )
|
/bind-9.11.3/contrib/dnsperf-2.1.0.0-1/ |
H A D | dns.c | 78 #define TSIG_HMACMD5_NAME "\010hmac-md5\007sig-alg\003reg\003int" 105 isc_constregion_t alg; member in struct:perf_dnstsigkey 196 (key)->alg.base = TSIG_HMAC ## type ## _NAME; \ 197 (key)->alg.length = sizeof(TSIG_HMAC ## type ## _NAME); \ 206 const char *sep1, *sep2, *alg, *name, *secret; local 218 perf_log_warning("invalid TSIG [alg:]name:secret"); 226 alg = NULL; 232 /* [alg:]name:secret */ 233 alg = arg; 242 if (alg [all...] |
/bind-9.11.3/lib/dns/tests/ |
H A D | private_test.c | 33 unsigned char alg; member in struct:__anon201 58 buf[0] = testcase->alg;
|