/bind-9.11.3/lib/dns/ |
H A D | pkcs11dh_link.c | 152 pkcs11dh_computesecret(const dst_key_t *pub, const dst_key_t *priv, argument 182 REQUIRE(pub->keydata.pkey != NULL); 185 attr = pk11_attribute_bytype(pub->keydata.pkey, CKA_PRIME); 190 attr = pk11_attribute_bytype(pub->keydata.pkey, CKA_VALUE); 201 mech.pParameter = isc_mem_get(pub->mctx, mech.ulParameterLen); 219 attr->pValue = isc_mem_get(pub->mctx, attr->ulValueLen); 245 isc_mem_put(pub->mctx, 253 isc_mem_put(pub->mctx, mech.pParameter, mech.ulParameterLen); 377 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local 488 &pub, 668 CK_BYTE *prime = NULL, *base = NULL, *pub = NULL; local 744 CK_BYTE *prime = NULL, *base = NULL, *pub = NULL; local 924 CK_ATTRIBUTE *prime = NULL, *base = NULL, *pub = NULL, *prv = NULL; local 1007 pkcs11dh_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | pkcs11eddsa_link.c | 64 const char *label, dst_key_t *pub); 446 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local 512 &pub, &priv), 523 (pk11_ctx->session, pub, attr, 1), 530 (pk11_ctx->session, pub, attr, 1), 547 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 563 if (pub != CK_INVALID_HANDLE) 564 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 784 dst_key_t *pub) 808 pubec = pub 783 pkcs11eddsa_fetch(dst_key_t *key, const char *engine, const char *label, dst_key_t *pub) argument 896 pkcs11eddsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | pkcs11gost_link.c | 473 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local 520 &pub, &priv), 542 (pk11_ctx->session, pub, attr, 1), 549 (pk11_ctx->session, pub, attr, 1), 567 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 578 if (pub != CK_INVALID_HANDLE) 579 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 819 pkcs11gost_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 826 if ((pub == NULL) || (pub [all...] |
H A D | opensslecdsa_link.c | 508 ecdsa_check(EC_KEY *eckey, dst_key_t *pub) argument 515 if (pub == NULL) 517 pkey = pub->keydata.pkey; 538 opensslecdsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 558 if (pub == NULL) 560 key->keydata.pkey = pub->keydata.pkey; 561 pub->keydata.pkey = NULL; 582 if (ecdsa_check(eckey, pub) != ISC_R_SUCCESS)
|
H A D | openssleddsa_link.c | 563 eddsa_check(EVP_PKEY *privkey, dst_key_t *pub) argument 567 if (pub == NULL) 569 pkey = pub->keydata.pkey; 578 openssleddsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 596 if (pub == NULL) 598 key->keydata.pkey = pub->keydata.pkey; 599 pub->keydata.pkey = NULL; 618 if (eddsa_check(pkey, pub) != ISC_R_SUCCESS) {
|
H A D | opensslgost_link.c | 450 opensslgost_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 468 if (pub == NULL) 470 key->keydata.pkey = pub->keydata.pkey; 471 pub->keydata.pkey = NULL; 472 key->key_size = pub->key_size; 489 if ((pub != NULL) && (pub->keydata.pkey != NULL)) { 490 eckey = EVP_PKEY_get0(pub->keydata.pkey);
|
H A D | pkcs11ecdsa_link.c | 66 const char *label, dst_key_t *pub); 454 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local 520 &pub, &priv), 531 (pk11_ctx->session, pub, attr, 1), 538 (pk11_ctx->session, pub, attr, 1), 554 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 570 if (pub != CK_INVALID_HANDLE) 571 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 798 dst_key_t *pub) 822 pubec = pub 797 pkcs11ecdsa_fetch(dst_key_t *key, const char *engine, const char *label, dst_key_t *pub) argument 910 pkcs11ecdsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | pkcs11dsa_link.c | 515 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local 606 &pub, &priv), 612 (pk11_ctx->session, pub, attr, 1), 619 (pk11_ctx->session, pub, attr, 1), 637 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 649 if (pub != CK_INVALID_HANDLE) 650 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 978 pkcs11dsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 994 if (pub == NULL) 997 key->keydata.pkey = pub [all...] |
H A D | opensslrsa_link.c | 1419 rsa_check(RSA *rsa, RSA *pub) { argument 1429 if (pub != NULL) { 1430 RSA_get0_key(pub, &n2, &e2, NULL); 1457 opensslrsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 1483 if (pub == NULL) 1485 key->keydata.pkey = pub->keydata.pkey; 1486 pub->keydata.pkey = NULL; 1487 key->key_size = pub->key_size; 1494 if (pub != NULL && pub [all...] |
H A D | dst_internal.h | 201 isc_result_t (*computesecret)(const dst_key_t *pub, 218 dst_key_t *pub);
|
H A D | hmac_link.c | 273 hmacmd5_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 280 UNUSED(pub); 581 hmacsha1_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 588 UNUSED(pub); 874 hmacsha224_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 881 UNUSED(pub); 1161 hmacsha256_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 1168 UNUSED(pub); 1448 hmacsha384_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 1455 UNUSED(pub); 1735 hmacsha512_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | pkcs11rsa_link.c | 46 const char *label, dst_key_t *pub); 1168 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local 1260 &pub, &priv), 1285 (pk11_ctx->session, pub, attr, 2), 1294 (pk11_ctx->session, pub, attr, 2), 1312 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 1323 if (pub != CK_INVALID_HANDLE) 1324 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub); 1698 dst_key_t *pub) 1722 pubrsa = pub 1697 pkcs11rsa_fetch(dst_key_t *key, const char *engine, const char *label, dst_key_t *pub) argument 1879 pkcs11rsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument [all...] |
H A D | openssldh_link.c | 135 openssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv, argument 144 REQUIRE(pub->keydata.dh != NULL); 147 dhpub = pub->keydata.dh; 623 openssldh_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 632 UNUSED(pub);
|
H A D | openssldsa_link.c | 691 openssldsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument 709 if (pub == NULL) 711 key->keydata.pkey = pub->keydata.pkey; 712 pub->keydata.pkey = NULL; 713 key->key_size = pub->key_size;
|
H A D | dst_api.c | 470 dst_key_computesecret(const dst_key_t *pub, const dst_key_t *priv, argument 474 REQUIRE(VALID_KEY(pub) && VALID_KEY(priv)); 477 CHECKALG(pub->key_alg); 480 if (pub->keydata.generic == NULL || priv->keydata.generic == NULL) 483 if (pub->key_alg != priv->key_alg || 484 pub->func->computesecret == NULL || 491 return (pub->func->computesecret(pub, priv, secret));
|
/bind-9.11.3/bin/tests/system/metadata/ |
H A D | tests.sh | 186 pub=`$SETTIME -upP $key | awk '{print $2}'` 188 [ $pub -eq $act ] || ret=1 190 pub=`$SETTIME -upP $key | awk '{print $2}'` 192 [ $pub -lt $act ] || ret=1 194 pub=`$SETTIME -upP $key | awk '{print $2}'` 195 [ $pub = "UNSET" ] || ret=1
|
/bind-9.11.3/bin/dnssec/ |
H A D | dnssec-settime.c | 151 isc_stdtime_t pub = 0, act = 0, rev = 0, inact = 0, del = 0; local 292 pub = strtotime(isc_commandline_argument, 435 pub = previnact - prepub; 465 if (setpub && setact && (act - prepub) < pub) 472 act = pub + prepub; 475 pub = act - prepub; 545 dst_key_settime(key, DST_TIME_PUBLISH, pub);
|
H A D | dnssec-importkey.c | 61 static isc_stdtime_t pub = 0, del = 0; variable 231 dst_key_settime(key, DST_TIME_PUBLISH, pub); 368 pub = strtotime(isc_commandline_argument,
|
/bind-9.11.3/lib/dns/include/dst/ |
H A D | dst.h | 280 dst_key_computesecret(const dst_key_t *pub, const dst_key_t *priv, 286 * \li "pub" is a valid key that can be used to derive a shared secret
|