/bind-9.6-ESV-R11/bin/tests/system/resolver/ns6/ |
H A D | keygen.sh | 28 ksk=`$KEYGEN -a RSASHA256 -b 1024 -r $RANDFILE -f KSK $zone` 30 cat $ksk.key $zsk.key >> $zonefile
|
/bind-9.6-ESV-R11/contrib/zkt/ |
H A D | zkt.c | 275 int ksk; local 283 ksk = dki_isksk (dkp); 284 if ( (ksk && !kskflag) || (!ksk && !zskflag) ) 303 int ksk; 307 ksk = dki_isksk (dkp); 308 if ( (ksk && !kskflag) || (!ksk && !zskflag) ) 325 int ksk; local 333 ksk [all...] |
H A D | rollover.c | 65 static dki_t *genkey (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument 72 if ( ksk ) 82 static dki_t *genkey2 (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument 89 if ( ksk ) 224 static int kskrollover (dki_t *ksk, zone_t *zonelist, zone_t *zp) argument 238 assert ( ksk != NULL ); 242 /* check ksk lifetime */ 243 if ( (lifetime = dki_lifetime (ksk)) == 0 ) /* if lifetime of key is not set.. */ 247 age = dki_age (ksk, currtime); 252 /* check if we have to change the ksk [all...] |
H A D | dki.h | 179 extern dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days); 187 extern const dki_t *dki_find (const dki_t *list, int ksk, int status, int first); 188 extern const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no);
|
H A D | dnssec-zkt.c | 92 {"ksk-rollover", no_argument, NULL, '9'}, 93 {"ksk-status", required_argument, NULL, '0'}, 94 {"ksk-roll-status", required_argument, NULL, '0'}, 95 {"ksk-newkey", required_argument, NULL, '1'}, 96 {"ksk-publish", required_argument, NULL, '2'}, 97 {"ksk-delkey", required_argument, NULL, '3'}, 98 {"ksk-roll-phase1", required_argument, NULL, '1'}, 99 {"ksk-roll-phase2", required_argument, NULL, '2'}, 100 {"ksk-roll-phase3", required_argument, NULL, '3'}, 103 {"ksk", no_argumen 551 int ksk; local [all...] |
H A D | zkt-keyman.c | 91 {"ksk-rollover", no_argument, NULL, '9'}, 92 {"ksk-status", required_argument, NULL, '0'}, 93 {"ksk-roll-status", required_argument, NULL, '0'}, 94 {"ksk-newkey", required_argument, NULL, '1'}, 95 {"ksk-publish", required_argument, NULL, '2'}, 96 {"ksk-delkey", required_argument, NULL, '3'}, 97 {"ksk-roll-phase1", required_argument, NULL, '1'}, 98 {"ksk-roll-phase2", required_argument, NULL, '2'}, 99 {"ksk-roll-phase3", required_argument, NULL, '3'}, 100 {"ksk", no_argumen 458 int ksk; local [all...] |
H A D | dki.c | 240 dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days) argument 251 if ( ksk ) 1191 ** dki_find () find the n'th ksk or zsk key with given status 1193 const dki_t *dki_find (const dki_t *list, int ksk, int status, int no) argument 1200 if ( dki_isksk (dkp) == ksk && dki_status (dkp) == status ) 1210 ** dki_findalgo () find the n'th ksk or zsk key with given 1213 const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no) argument 1220 if ( dki_isksk (dkp) == ksk && dki_algo (dkp) == alg &&
|
H A D | zkt-signer.c | 507 dbg_msg("parsezonedir check rfc 5011 ksk "); 511 verbmesg (2, zp->conf, "\t\t->not a rfc5011 zone, looking for a regular ksk rollover\n"); 513 dbg_msg("parsezonedir check ksk "); 795 int ksk; local 808 ksk = 1; 811 if ( ksk && !dki_isksk (dkp) ) 814 ksk = 0; 980 /* check if special parent-file exist (ksk rollover) */
|
/bind-9.6-ESV-R11/contrib/pkcs11-keygen/ |
H A D | writekey.sh | 56 label=$zone,ksk,$ext
|
/bind-9.6-ESV-R11/bin/dnssec/ |
H A D | dnssec-keyfromlabel.c | 94 isc_uint16_t flags = 0, ksk = 0; local 130 ksk = DNS_KEYFLAG_KSK; 242 flags |= ksk;
|
H A D | dnssec-keygen.c | 137 isc_uint16_t flags = 0, ksk = 0; local 187 ksk = DNS_KEYFLAG_KSK; 419 flags |= ksk;
|