| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| test_hdbkeys.c | 59 hdb_keyset keyset; local 90 memset(&keyset, 0, sizeof(keyset)); 92 keyset.kvno = kvno_integer; 93 keyset.set_time = malloc(sizeof (*keyset.set_time)); 94 if (keyset.set_time == NULL) 95 errx(1, "couldn't allocate set_time field of keyset"); 96 *keyset.set_time = time(NULL); 99 &keyset.keys.val, &len) [all...] |
| keys.c | 278 * This function adds an HDB entry's current keyset to the entry's key 279 * history. The current keyset is left alone; the caller is responsible 312 * Copy in newest old keyset 358 hdb_keyset keyset; local 364 memset(&keyset, 0, sizeof (keyset)); 383 keyset.kvno = kvno; 384 ret = add_Keys(&keyset.keys, key); 387 ret = add_HDB_Ext_KeySet(hist_keys, &keyset); 397 free_hdb_keyset(&keyset); 417 hdb_keyset keyset; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| validator.h | 141 dns_rdataset_t *keyset; member in struct:dns_validator
|
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| validator.h | 138 dns_rdataset_t *keyset; member in struct:dns_validator
|
| /src/external/mpl/bind/dist/lib/dns/ |
| zoneverify.c | 66 dns_rdataset_t keyset; member in struct:vctx 1293 dns_rdataset_init(&vctx->keyset); 1312 if (dns_rdataset_isassociated(&vctx->keyset)) { 1313 dns_rdataset_disassociate(&vctx->keyset); 1356 dns_rdatatype_dnskey, 0, 0, &vctx->keyset, 1463 if (!dns_dnssec_selfsigns(keyrdata, vctx->origin, &vctx->keyset, 1549 dns_rdataset_settrust(&vctx->keyset, 1582 for (result = dns_rdataset_first(&vctx->keyset); 1583 result == ISC_R_SUCCESS; result = dns_rdataset_next(&vctx->keyset)) 1585 dns_rdataset_current(&vctx->keyset, &rdata) [all...] |
| rbtdb.c | 1592 dns_rdataset_t keyset; local 1600 dns_rdataset_init(&keyset); 1602 0, 0, &keyset, NULL); 1604 result = dns_rdataset_first(&keyset); 1607 dns_rdataset_current(&keyset, &keyrdata); 1612 result = dns_rdataset_next(&keyset); 1614 dns_rdataset_disassociate(&keyset);
|
| message.c | 3245 dns_rdataset_t keyset; local 3269 dns_rdataset_init(&keyset); 3276 0, false, &keyset, NULL); 3281 } else if (keyset.trust < dns_trust_ultimate) { 3285 result = dns_rdataset_first(&keyset); 3306 key_checks++, result = dns_rdataset_next(&keyset)) 3311 dns_rdataset_current(&keyset, &rdata); 3352 if (dns_rdataset_isassociated(&keyset)) { 3353 dns_rdataset_disassociate(&keyset);
|
| qpzone.c | 1070 dns_rdataset_t keyset; local 1076 dns_rdataset_init(&keyset); 1078 0, 0, &keyset, NULL); 1080 result = dns_rdataset_first(&keyset); 1083 dns_rdataset_current(&keyset, &keyrdata); 1088 result = dns_rdataset_next(&keyset); 1090 dns_rdataset_disassociate(&keyset);
|
| zone.c | 6611 dns_rdataset_t keyset; local 6618 dns_rdataset_init(&keyset); 6634 dns_rdataset_init(&keyset); 6636 dns_rdatatype_none, 0, &keyset, NULL); 6639 origin, kasp, dir, dns_zone_getmctx(zone), &keyset, 6667 if (dns_rdataset_isassociated(&keyset)) { 6668 dns_rdataset_disassociate(&keyset); 10354 * anchors are being managed; scan the keyset, and update the key zone and the 11186 /* Or do we just need to refresh the keyset? */ 22396 dns_rdataset_t cdsset, soaset, soasigs, keyset, keysigs, cdnskeyset local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| tkey.c | 356 dns_rdataset_t *keyset = NULL; local 390 keyset = NULL; 392 &keyset); 397 for (result = dns_rdataset_first(keyset); 399 result = dns_rdataset_next(keyset)) 401 dns_rdataset_current(keyset, &keyrdata); 412 ttl = keyset->ttl;
|
| zoneverify.c | 67 dns_rdataset_t keyset; member in struct:vctx 1292 dns_rdataset_init(&vctx->keyset); 1311 if (dns_rdataset_isassociated(&vctx->keyset)) { 1312 dns_rdataset_disassociate(&vctx->keyset); 1355 dns_rdatatype_dnskey, 0, 0, &vctx->keyset, 1462 if (!dns_dnssec_selfsigns(keyrdata, vctx->origin, &vctx->keyset, 1548 dns_rdataset_settrust(&vctx->keyset, 1581 for (result = dns_rdataset_first(&vctx->keyset); 1582 result == ISC_R_SUCCESS; result = dns_rdataset_next(&vctx->keyset)) 1584 dns_rdataset_current(&vctx->keyset, &rdata) [all...] |
| message.c | 3328 dns_rdataset_t keyset; local 3351 dns_rdataset_init(&keyset); 3358 0, false, &keyset, NULL); 3364 } else if (keyset.trust < dns_trust_secure) { 3369 result = dns_rdataset_first(&keyset); 3372 result = dns_rdataset_next(&keyset)) 3377 dns_rdataset_current(&keyset, &rdata); 3405 if (dns_rdataset_isassociated(&keyset)) { 3406 dns_rdataset_disassociate(&keyset);
|
| rbtdb.c | 2378 dns_rdataset_t keyset; local 2384 dns_rdataset_init(&keyset); 2386 0, 0, &keyset, NULL); 2388 result = dns_rdataset_first(&keyset); 2391 dns_rdataset_current(&keyset, &keyrdata); 2396 result = dns_rdataset_next(&keyset); 2398 dns_rdataset_disassociate(&keyset);
|
| zone.c | 6635 dns_rdataset_t keyset; local 6642 dns_rdataset_init(&keyset); 6657 dns_rdataset_init(&keyset); 6659 dns_rdatatype_none, 0, &keyset, NULL); 6662 origin, dir, dns_zone_getmctx(zone), &keyset, NULL, 6690 if (dns_rdataset_isassociated(&keyset)) { 6691 dns_rdataset_disassociate(&keyset); 10391 * anchors are being managed; scan the keyset, and update the key zone and the 11221 /* Or do we just need to refresh the keyset? */ 21410 dns_rdataset_t cdsset, soaset, soasigs, keyset, keysigs, cdnskeyset local [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-signzone.c | 1032 * If not, try to find a keyset-* file from an earlier version of 1041 dns_rdataset_t keyset; local 1067 opendb("keyset-", name, gclass, &db); 1078 dns_rdataset_init(&keyset); 1080 &keyset, NULL); 1092 for (result = dns_rdataset_first(&keyset); result == ISC_R_SUCCESS; 1093 result = dns_rdataset_next(&keyset)) 1097 dns_rdataset_current(&keyset, &key); 1118 dns_rdataset_disassociate(&keyset); 3316 fprintf(stderr, "\t-C:\tgenerate a keyset file, for compatibility\n [all...] |