/bind-9.6-ESV-R11/bin/dnssec/ |
H A D | dnssec-keygen.c | 81 fprintf(stderr, " %s -a alg -b bits [-n type] [options] name\n\n", 122 fprintf(stderr, " K<name>+<alg>+<id>.key, " 123 "K<name>+<alg>+<id>.private\n"); 138 dns_secalg_t alg; local 267 alg = DST_ALG_HMACMD5; 270 alg = DST_ALG_HMACSHA1; 273 alg = DST_ALG_HMACSHA224; 276 alg = DST_ALG_HMACSHA256; 279 alg = DST_ALG_HMACSHA384; 282 alg [all...] |
H A D | dnssec-keyfromlabel.c | 60 fprintf(stderr, " %s -a alg -l label [options] name\n\n", 80 fprintf(stderr, " K<name>+<alg>+<id>.key, " 81 "K<name>+<alg>+<id>.private\n"); 95 dns_secalg_t alg; local 199 ret = dns_secalg_fromtext(&alg, &r); 202 if (alg == DST_ALG_DH) 256 alg == DNS_KEYALG_DH) 273 ret = dst_key_fromlabel(name, alg, flags, protocol, 281 alg_format(alg, algstr, sizeof(algstr)); 288 * Try to read a key with the same name, alg an [all...] |
H A D | dnssectool.h | 48 alg_format(const dns_secalg_t alg, char *cp, unsigned int size);
|
H A D | dnssectool.c | 114 alg_format(const dns_secalg_t alg, char *cp, unsigned int size) { argument 120 result = dns_secalg_totext(alg, &b);
|
/bind-9.6-ESV-R11/bin/tests/dst/ |
H A D | dst_test.c | 138 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx) { argument 142 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key); 143 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 147 printf("write(%d) returned: %s\n", alg, isc_result_totext(ret)); 162 int alg = DST_ALG_DH; local 165 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1); 166 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 169 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2); 170 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 175 printf("write(%d) returned: %s\n", alg, isc_result_totex 216 generate(int alg, isc_mem_t *mctx) argument [all...] |
H A D | t_dst.c | 176 int alg = DST_ALG_DH; local 191 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1); 194 alg, dst_result_totext(ret)); 199 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2); 202 alg, dst_result_totext(ret)); 226 alg, dst_result_totext(ret)); 234 alg, dst_result_totext(ret)); 276 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx, argument 292 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key); 295 alg, dst_result_totex 332 generate(int alg, isc_mem_t *mctx, int size, int *nfails) argument 635 t2_sigchk(char *datapath, char *sigpath, char *keyname, int id, int alg, int type, isc_mem_t *mctx, char *expected_result, int *nfails, int *nprobs) argument 855 char *alg; local [all...] |
/bind-9.6-ESV-R11/lib/dns/ |
H A D | dst_parse.h | 50 #define TAG(alg, off) (((alg) << TAG_SHIFT) + (off)) 125 dst__privstruct_parse(dst_key_t *key, unsigned int alg, isc_lex_t *lex,
|
H A D | dst_parse.c | 107 find_value(const char *s, const unsigned int alg) { argument 114 TAG_ALG(map[i].value) == alg) 228 unsigned int alg) 235 if (priv->elements[j].tag == TAG(alg, i)) 244 check_data(const dst_private_t *priv, const unsigned int alg, argument 248 switch (alg) { 263 return (check_hmac_sha(priv, HMACSHA1_NTAGS, alg)); 265 return (check_hmac_sha(priv, HMACSHA224_NTAGS, alg)); 267 return (check_hmac_sha(priv, HMACSHA256_NTAGS, alg)); 269 return (check_hmac_sha(priv, HMACSHA384_NTAGS, alg)); 227 check_hmac_sha(const dst_private_t *priv, unsigned int ntags, unsigned int alg) argument 293 dst__privstruct_parse(dst_key_t *key, unsigned int alg, isc_lex_t *lex, isc_mem_t *mctx, dst_private_t *priv) argument [all...] |
H A D | dst_api.c | 85 unsigned int alg, 95 unsigned int alg, 101 unsigned int alg, 109 static isc_result_t algorithm_status(unsigned int alg); 121 #define CHECKALG(alg) \ 124 _r = algorithm_status(alg); \ 234 dst_algorithm_supported(unsigned int alg) { argument 237 if (alg >= DST_MAX_ALGS || dst_t_func[alg] == NULL) 391 unsigned int alg, in 390 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, const char *directory, isc_mem_t *mctx, dst_key_t **keyp) argument 560 isc_uint8_t alg, proto; local 597 dst_key_frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument 686 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, const char *engine, const char *label, const char *pin, isc_mem_t *mctx, dst_key_t **keyp) argument 728 dst_key_generate(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp) argument 942 get_key_struct(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, unsigned int bits, dns_rdataclass_t rdclass, isc_mem_t *mctx) argument 1227 buildfilename(dns_name_t *name, dns_keytag_t id, unsigned int alg, unsigned int type, const char *directory, isc_buffer_t *out) argument 1282 frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument 1321 algorithm_status(unsigned int alg) argument [all...] |
H A D | key.c | 35 dst_region_computeid(const isc_region_t *source, unsigned int alg) { argument 46 if (alg == DST_ALG_RSAMD5)
|
H A D | tsig.c | 68 static unsigned char hmacmd5_ndata[] = "\010hmac-md5\007sig-alg\003reg\003int"; 812 * Digest the name, class, ttl, alg. 989 unsigned int alg; local 1113 alg = dst_key_alg(key); 1117 if (alg == DST_ALG_HMACMD5 || alg == DST_ALG_HMACSHA1 || 1118 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || 1119 alg == DST_ALG_HMACSHA384 || alg [all...] |
H A D | resolver.c | 8430 unsigned int alg) 8439 if (alg > 255) 8452 len = alg/8 + 2; 8453 mask = 1 << (alg%8); 8487 unsigned int alg) 8504 len = alg/8 + 2; 8505 mask = 1 << (alg%8); 8516 return (dst_algorithm_supported(alg)); 8429 dns_resolver_disable_algorithm(dns_resolver_t *resolver, dns_name_t *name, unsigned int alg) argument 8486 dns_resolver_algorithm_supported(dns_resolver_t *resolver, dns_name_t *name, unsigned int alg) argument
|
/bind-9.6-ESV-R11/lib/dns/include/dst/ |
H A D | dst.h | 114 dst_algorithm_supported(unsigned int alg); 229 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, 240 * \li "alg" is a supported key algorithm. 356 dst_key_frombuffer(dns_name_t *name, unsigned int alg, 365 *\li "alg" is a supported key algorithm. 450 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, 456 dst_key_generate(dns_name_t *name, unsigned int alg, 630 dst_region_computeid(const isc_region_t *source, unsigned int alg);
|
/bind-9.6-ESV-R11/bin/named/ |
H A D | tsigconf.c | 61 dns_name_t *alg; local 93 if (ns_config_getkeyalgorithm(algstr, &alg, &bits) 116 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen,
|
H A D | server.c | 419 isc_uint32_t flags, proto, alg; local 434 alg = cfg_obj_asuint32(cfg_tuple_get(key, "algorithm")); 458 if (alg > 0xff) 462 keystruct.algorithm = (isc_uint8_t)alg; 940 dns_secalg_t alg; local 945 result = dns_secalg_fromtext(&alg, &r); 949 alg = ui; 957 CHECK(dns_resolver_disable_algorithm(resolver, name, alg));
|
/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | dnskey_48.c | 37 dns_secalg_t alg; local 64 RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion)); 65 RETERR(mem_tobuffer(target, &alg, 1)); 76 if (alg == DST_ALG_RSAMD5 && isc_buffer_usedlength(target) < 7)
|
H A D | key_25.c | 37 dns_secalg_t alg; local 64 RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion)); 65 RETERR(mem_tobuffer(target, &alg, 1)); 76 if (alg == DST_ALG_RSAMD5 && isc_buffer_usedlength(target) < 7)
|
H A D | tkey_249.c | 407 dns_name_t alg; local 423 dns_name_init(&alg, NULL); 424 dns_name_fromregion(&alg, &sr); 426 RETERR(name_duporclone(&alg, mctx, &tkey->algorithm));
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | resolver.h | 457 unsigned int alg); 470 unsigned int alg);
|
/bind-9.6-ESV-R11/lib/dns/rdata/any_255/ |
H A D | tsig_250.c | 427 dns_name_t alg; local 444 dns_name_init(&alg, NULL); 445 dns_name_fromregion(&alg, &sr); 447 RETERR(name_duporclone(&alg, mctx, &tsig->algorithm));
|
/bind-9.6-ESV-R11/contrib/zkt/ |
H A D | dki.h | 63 # define DK_ALGO_NSEC3DSA 6 /* symlink to alg 3 RFC5155 */ 64 # define DK_ALGO_NSEC3RSASHA1 7 /* symlink to alg 5 RFC5155 */ 188 extern const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no);
|
H A D | dki.c | 1213 const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no) argument 1220 if ( dki_isksk (dkp) == ksk && dki_algo (dkp) == alg &&
|
/bind-9.6-ESV-R11/lib/bind9/ |
H A D | check.c | 282 dns_secalg_t alg; local 288 tresult = dns_secalg_fromtext(&alg, &r); 1409 { "hmac-md5.sig-alg.reg.int", 0 }, 1410 { "hmac-md5.sig-alg.reg.int.", 0 }, 1721 isc_uint32_t flags, proto, alg; local 1726 alg = cfg_obj_asuint32(cfg_tuple_get(key, "algorithm")); 1750 if (alg > 0xff) { 1752 "algorithm too big: %u\n", alg); 1768 if ((alg == DST_ALG_RSASHA1 || alg [all...] |