HomeSort by: relevance | last modified time | path
    Searched defs:ksk (Results 1 - 18 of 18) sorted by relevancy

  /src/external/mpl/bind/dist/lib/dns/include/dns/
dnssec.h 69 bool ksk; /*% this is a key-signing key */ member in struct:dns_dnsseckey
335 * Private key files for keys with the KSK role are skipped if kasp is in
336 * offline-ksk mode.
  /src/external/mpl/bind/dist/lib/dns/
keystore.c 147 bool ksk = ((flags & DNS_KEYFLAG_KSK) != 0); local
187 return isc_buffer_printf(buf, "-%s-%s", ksk ? "ksk" : "zsk", timebuf);
dnssec.c 580 bool ksk = false, zsk = false; local
587 /* Is this a KSK? */
588 ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
590 ksk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) != 0);
620 if (hint_ksign && ksk) {
1096 /* KSK or ZSK? */
1097 result = dst_key_getbool(dk->key, DST_BOOL_KSK, &dk->ksk);
1099 dk->ksk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) != 0);
1755 key->ksk ? (key->zsk ? "CSK" : "KSK") : "ZSK"
    [all...]
update.c 1037 #define KSK(x) ((dst_key_flags(x) & DNS_KEYFLAG_KSK) != 0)
1042 * If we are honoring KSK flags then we need to check that we
1043 * have both KSK and non-KSK keys that are not revoked per
1064 bool ksk = false; local
1067 kresult = dst_key_getbool(keys[i], DST_BOOL_KSK, &ksk);
1069 if (KSK(keys[i])) {
1070 ksk = true;
1075 if (!KSK(keys[i])) {
1089 * DNSKEY RRset is signed with KSK
    [all...]
dst_api.c 115 [DST_BOOL_KSK] = "KSK:",
2075 printbool(key, DST_BOOL_KSK, "KSK", fp);
2445 dst_key_role(dst_key_t *key, bool *ksk, bool *zsk) {
2449 if (ksk != NULL) {
2452 *ksk = k;
2454 *ksk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) != 0);
2512 bool ksk = false, zsk = false, inactive = false; local
2527 (void)dst_key_role(key, &ksk, &zsk);
2530 * KSK: If the DS is RUMOURED or OMNIPRESENT the key is considered
2533 if (ksk) {
2572 bool ksk = false, zsk = false, inactive = false; local
    [all...]
keymgr.c 101 bool ksk = false, zsk = false; local
103 ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
111 if (ksk && zsk) {
113 } else if (ksk) {
114 return "KSK";
128 bool zsk = false, ksk = false; local
147 ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
148 if (ret == ISC_R_SUCCESS && ksk) {
149 /* KSK: Iret = DprpP + TTLds */
166 bool ksk = false local
223 bool zsk = false, ksk = false; local
348 bool ksk = false, zsk = false; local
1703 bool ksk, zsk; local
2074 bool ksk = false; local
2503 bool ksk = false; local
2751 bool ksk = false, zsk = false; local
2895 bool ksk = false, zsk = false; local
    [all...]
zone.c 139 #define KSK(x) ((dst_key_flags(x) & DNS_KEYFLAG_KSK) != 0)
518 * Offline KSK signed key responses.
6747 bool ksk, zsk; local
6757 ret = dst_key_getbool(keys[i], DST_BOOL_KSK, &ksk);
6759 ksk = KSK(keys[i]);
6763 zsk = !KSK(keys[i]);
6766 if (ksk) {
6940 * KSK RRSIGs requires special processing.
7089 bool ksk = false local
21250 bool checkdspub = false, checkdsdel = false, ksk = false; local
22162 bool ksk = false; local
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/
dnssec.h 69 bool ksk; /*% this is a key-signing key */ member in struct:dns_dnsseckey
  /src/external/mpl/bind/dist/tests/dns/
skr_test.c 54 dns_rdata_t ksk; member in struct:__anon24221
143 dns_dnsseckey_t *ksk = ISC_LIST_HEAD(keys); local
149 ret = dns_dnssec_sign(dname, rrset, ksk->key, &clockskew, &expiration,
214 dns_rdata_init(&test_bundles[bnum].ksk);
216 test_bundles[bnum].kskbuf, &test_bundles[bnum].ksk);
238 ISC_LIST_APPEND(dnskeylist->rdata, &test_bundles[bnum].ksk, link);
363 &tb->ksk);
456 /* Get the KSK */
  /src/external/apache2/mDNSResponder/dist/Clients/dnssdutil/
DNSServerDNSSEC.c 182 DNSKeyRSASHA1Info ksk; // Key-Signing Key member in struct:__anon5886
191 .ksk =
398 .ksk =
605 .ksk =
812 .ksk =
1026 DNSKeyRSASHA256Info ksk; // Key-Signing Key member in struct:__anon5887
1035 .ksk =
1242 .ksk =
1449 .ksk =
1656 .ksk
1870 DNSKeyRSASHA512Info ksk; \/\/ Key-Signing Key member in struct:__anon5888
2714 DNSKeyECDSAP256SHA256Info ksk; \/\/ Key-Signing Key member in struct:__anon5889
2903 DNSKeyECDSAP384SHA384Info ksk; \/\/ Key-Signing Key member in struct:__anon5890
3091 DNSKeyEd25519Info ksk; \/\/ Key-Signing Key member in struct:__anon5891
    [all...]
dnssdutil.c 10877 DNSKeyInfoRef ksk = NULL; local
10909 &index, &rcodeOverride, &ttl, &offset, &procDelayMs, &nameFlags, &zone, &zoneParent, &zsk, &ksk, &zskParent,
10916 check( !( nameFlags & kDNSNameFlag_HasRRSIG ) || ( zsk && ksk && zskParent ) );
11722 dns_fixed_fields_rrsig_set_algorithm( &sigFields, DNSKeyInfoGetAlgorithm( ksk ) );
11730 dns_fixed_fields_rrsig_set_key_tag( &sigFields, DNSKeyInfoGetKeyTag( ksk ) );
11752 recordLen = sizeof( nameCPtr ) + sizeof( recFields ) + DNSKeyInfoGetRDataLen( ksk );
11758 // Append KSK DNSKEY record NAME to response.
11763 // Append KSK DNSKEY record TYPE, CLASS, TTL, and RDLENGTH to response.
11768 // Append KSK DNSKEY record RDATA to response.
11770 err = DataBuffer_Append( inDB, DNSKeyInfoGetRDataPtr( ksk ), DNSKeyInfoGetRDataLen( ksk ) )
12165 DNSKeyInfoRef ksk = NULL; local
12690 DNSKeyInfoRef ksk; local
    [all...]
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-keygen.c 138 bool ksk; member in struct:keygen_ctx
179 " algorithm and usage (ZSK or KSK)\n");
187 fprintf(stderr, " -f <keyflag>: ZSK | KSK | REVOKE\n");
578 if (ctx->ksk || ctx->wantksk) {
708 "not flagged as a KSK, but -R "
771 dst_key_setbool(key, DST_BOOL_KSK, ctx->ksk);
1264 ctx.ksk = true;
1310 ctx.ksk = dns_kasp_key_ksk(kaspkey);
1319 if ((ctx.ksk && !ctx.wantksk && ctx.wantzsk) ||
dnssec-ksr.c 69 bool ksk; member in struct:ksr_ctx
347 /* ZSK or KSK? */
348 if (ksr->ksk) {
490 dst_key_setbool(key, DST_BOOL_KSK, ksr->ksk);
491 dst_key_setbool(key, DST_BOOL_ZSK, !ksr->ksk);
495 if (ksr->ksk) {
504 if (ksr->ksk) {
784 /* KSK */
897 fatal("failed to create KSK/CDS/CDNSKEY");
923 dns_rdataset_t ksk, cdnskey, cds, rrset local
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
dnssec.c 620 bool ksk = false, zsk = false; local
627 /* Is this a KSK? */
628 ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
630 ksk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) != 0);
660 if (hint_ksign && ksk) {
1303 /* KSK or ZSK? */
1304 result = dst_key_getbool(dk->key, DST_BOOL_KSK, &dk->ksk);
1306 dk->ksk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) != 0);
1906 key->ksk ? (key->zsk ? "CSK" : "KSK") : "ZSK"
    [all...]
keymgr.c 83 bool ksk = false, zsk = false; local
85 ret = dst_key_getbool(key, DST_BOOL_KSK, &ksk);
93 if (ksk && zsk) {
95 } else if (ksk) {
96 return ("KSK");
110 bool zsk = false, ksk = false; local
129 ret = dst_key_getbool(key->key, DST_BOOL_KSK, &ksk);
130 if (ret == ISC_R_SUCCESS && ksk) {
131 /* KSK: Iret = DprpP + TTLds */
148 bool ksk = false local
199 bool zsk = false, ksk = false; local
311 bool ksk = false, zsk = false; local
1550 bool ksk, zsk; local
1873 bool ksk = false; local
2254 bool ksk = false; local
2498 bool ksk = false, zsk = false; local
    [all...]
dst_api.c 111 static const char *booleantags[BOOLEAN_NTAGS] = { "KSK:", "ZSK:" };
2129 printbool(key, DST_BOOL_KSK, "KSK", fp);
2509 dst_key_role(dst_key_t *key, bool *ksk, bool *zsk) {
2513 if (ksk != NULL) {
2516 *ksk = k;
2518 *ksk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) != 0);
2576 bool ksk = false, zsk = false, inactive = false; local
2591 (void)dst_key_role(key, &ksk, &zsk);
2594 * KSK: If the DS is RUMOURED or OMNIPRESENT the key is considered
2597 if (ksk) {
2636 bool ksk = false, zsk = false, inactive = false; local
    [all...]
update.c 1130 #define KSK(x) ((dst_key_flags(x) & DNS_KEYFLAG_KSK) != 0)
1135 * If we are honoring KSK flags then we need to check that we
1136 * have both KSK and non-KSK keys that are not revoked per
1152 if (KSK(keys[i])) {
1165 * the KSK may be temporary offline, so do
1176 if (KSK(keys[j])) {
1195 bool ksk = false; local
1198 kresult = dst_key_getbool(keys[i], DST_BOOL_KSK, &ksk);
1200 if (KSK(keys[i]))
    [all...]
zone.c 136 #define KSK(x) ((dst_key_flags(x) & DNS_KEYFLAG_KSK) != 0)
6770 bool ksk, zsk; local
6780 ret = dst_key_getbool(keys[i], DST_BOOL_KSK, &ksk);
6782 ksk = KSK(keys[i]);
6786 zsk = !KSK(keys[i]);
6789 if (ksk) {
6960 * KSK RRSIGs requires special processing.
7107 if (KSK(keys[i])) {
7122 * the KSK may be temporary offline, so d
7151 bool ksk = false; local
9670 bool ksk = false; local
20894 bool checkdspub = false, checkdsdel = false, ksk = false; local
21371 bool ksk = false; local
    [all...]

Completed in 71 milliseconds