| /src/external/mpl/bind/dist/tests/dns/ |
| keytable_test.c | 222 dns_keynode_t *keynode = NULL; local 234 * Getting the keynode for the example.com key should succeed. 237 dns_keytable_find(keytable, str2name("example.com"), &keynode), 249 dns_keynode_detach(&keynode); 251 dns_keytable_find(keytable, str2name("example.com"), &keynode), 255 dns_keynode_detach(&keynode); 261 dns_keytable_find(keytable, str2name("example.com"), &keynode), 263 dns_keynode_detach(&keynode); 266 * Get the keynode for the managed.com key. Ensure the 271 dns_keytable_find(keytable, str2name("managed.com"), &keynode), 483 dns_keynode_t *keynode = NULL; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| keytable.c | 304 * Create a keynode for "ds" (or a null key node if "ds" is NULL), set 305 * "managed" and "initial" as requested and attach the keynode to 511 dns_keynode_t *keynode = NULL; local 524 keynode = pval; 527 dns_name_copy(&keynode->name, foundname); 540 dns_keynode_t *keynode = NULL; local 554 keynode = pval; 556 dns_name_copy(&keynode->name, foundname); 612 keynode_dslist_totext(dns_keynode_t *keynode, isc_buffer_t **text) { 619 if (!dns_keynode_dsset(keynode, &dsset)) 763 dns_keynode_t *keynode = NULL; local 774 dns_keynode_t *keynode = NULL; local 790 dns_keynode_t *keynode = NULL; local 822 dns_keynode_t *keynode = NULL; local 834 dns_keynode_t *keynode = pval; local 841 dns_keynode_t *keynode = pval; local 848 dns_keynode_t *keynode = pval; local [all...] |
| zoneverify.c | 1450 dns_keynode_t *keynode = NULL; local 1504 * If we don't find an exact match, or if the keynode data 1508 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); 1515 * If the keynode has any DS format trust anchors, that means 1520 if (dns_keynode_dsset(keynode, &dsset)) { 1563 if (keynode != NULL) { 1564 dns_keynode_detach(&keynode);
|
| validator.c | 2225 dns_keynode_t *keynode = NULL; local 2238 result = dns_keytable_find(val->keytable, val->name, &keynode); 2240 if (dns_keynode_dsset(keynode, &val->fdsset)) { 2243 dns_keynode_detach(&keynode);
|
| zone.c | 4229 * If keynode references a key or a DS rdataset, and if the key 4239 dns_diff_t *diff, dns_keynode_t *keynode, dns_name_t *keyname, 4248 REQUIRE(keynode != NULL); 4253 * If the keynode has no trust anchor set, we shouldn't be here. 4255 if (!dns_keynode_dsset(keynode, NULL)) { 4653 addifmissing(dns_keytable_t *keytable, dns_keynode_t *keynode, 4669 if (!dns_keynode_managed(keynode)) { 4674 * If the keynode has no trust anchor set, return. 4676 if (!dns_keynode_dsset(keynode, NULL)) { 4695 result = create_keydata(zone, db, ver, diff, keynode, keyname, changed) 4717 dns_keynode_t *keynode = NULL; local 10385 dns_keynode_t *keynode = NULL; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| keytable.c | 138 dns_keynode_t *keynode = node; local 141 keynode_detach(mctx, &keynode); 330 * Create a keynode for "ds" (or a null key node if "ds" is NULL), set 331 * "managed" and "initial" as requested and attach the keynode to 568 * Give back a keynode found via dns_keytable_findkeynode(). 651 keynode_dslist_totext(dns_name_t *name, dns_keynode_t *keynode, 661 if (!dns_keynode_dsset(keynode, &dsset)) { 678 RWLOCK(&keynode->rwlock, isc_rwlocktype_read); 681 keynode->initial ? "initializing " : "", 682 keynode->managed ? "managed" : "static") 859 dns_keynode_t *keynode; local 873 dns_keynode_t *keynode; local 892 dns_keynode_t *keynode; local 930 dns_keynode_t *keynode; local [all...] |
| zoneverify.c | 1449 dns_keynode_t *keynode = NULL; local 1503 * If we don't find an exact match, or if the keynode data 1507 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); 1514 * If the keynode has any DS format trust anchors, that means 1519 if (dns_keynode_dsset(keynode, &dsset)) { 1562 if (keynode != NULL) { 1563 dns_keytable_detachkeynode(vctx->secroots, &keynode);
|
| validator.c | 1805 dns_keynode_t *keynode = NULL; local 1816 &keynode); 1818 if (dns_keynode_dsset(keynode, &val->fdsset)) { 1821 dns_keytable_detachkeynode(val->keytable, &keynode);
|
| zone.c | 4149 * If keynode references a key or a DS rdataset, and if the key 4159 dns_diff_t *diff, dns_keynode_t *keynode, dns_name_t *keyname, 4169 REQUIRE(keynode != NULL); 4175 * If the keynode has no trust anchor set, we shouldn't be here. 4177 if (!dns_keynode_dsset(keynode, NULL)) { 4560 addifmissing(dns_keytable_t *keytable, dns_keynode_t *keynode, 4576 if (!dns_keynode_managed(keynode)) { 4581 * If the keynode has no trust anchor set, return. 4583 if (!dns_keynode_dsset(keynode, NULL)) { 4602 result = create_keydata(zone, db, ver, diff, keynode, keyname, changed) 4624 dns_keynode_t *keynode = NULL; local 10422 dns_keynode_t *keynode = NULL; local [all...] |
| /src/external/mpl/bind/dist/lib/ns/ |
| query.c | 7576 dns_keynode_t *keynode = NULL; local 7586 result = dns_keytable_find(keytable, dns_rootname, &keynode); 7588 if (keynode != NULL) { 7589 dns_keynode_detach(&keynode); 7596 if (dns_keynode_dsset(keynode, &dsset)) { 7609 dns_keynode_detach(&keynode); 7618 if (keynode != NULL) { 7619 dns_keynode_detach(&keynode);
|
| /src/external/mpl/bind/dist/bin/named/ |
| server.c | 1075 dns_keynode_t *keynode = NULL; local 1082 result = dns_keytable_find(secroots, name, &keynode); 1084 if (keynode != NULL) { 1085 dns_keynode_detach(&keynode); 7351 * anchors present at 'keynode' of 'keytable'. Store the result in 'dst' and 7352 * the domain name which 'keynode' is associated with in 'origin'. 7356 * more than 12 keys configured at 'keynode', only the first 12 will be 7360 get_tat_qname(dns_name_t *target, dns_name_t *keyname, dns_keynode_t *keynode) { 7369 if (dns_keynode_dsset(keynode, &dsset)) { 7497 dotat(dns_keytable_t *keytable, dns_keynode_t *keynode, dns_name_t *keyname [all...] |