| /src/external/mpl/bind/dist/tests/dns/ |
| nsec3_test.c | 56 const char *nsec3param_text; /* NSEC3PARAM RDATA in text form */ 62 * NSEC3PARAM RDATA correctly: test whether the result of calling the former is 65 * Assumes supplied text form NSEC3PARAM RDATA is valid as testing handling of 66 * invalid NSEC3PARAM RDATA is out of scope of this unit test. 71 dns_rdata_nsec3param_t nsec3param; local 84 result = dns_rdata_tostruct(&rdata, &nsec3param, NULL); 90 result = dns_nsec3param_salttotext(&nsec3param, salt, sizeof(salt)); 103 result = dns_nsec3param_salttotext(&nsec3param, salt, length - 1); 106 result = dns_nsec3param_salttotext(&nsec3param, salt, length); 109 result = dns_nsec3param_salttotext(&nsec3param, salt, length + 1) [all...] |
| nsec3param_test.c | 94 nsec3param_rdata_test_params_t nsec3param; local 95 nsec3param.hash = hash; 96 nsec3param.flags = flags; 97 nsec3param.iterations = iter; 98 nsec3param.salt_length = saltlen; 99 nsec3param.salt = salt; 100 return nsec3param; 104 * Check whether zone_lookup_nsec3param() finds the correct NSEC3PARAM 123 zone, TESTS_DIR "/testdata/nsec3param/nsec3.db.signed",
|
| private_test.c | 103 dns_rdata_t nsec3param = DNS_RDATA_INIT; local 139 dns_rdata_fromstruct(&nsec3param, dns_rdataclass_in, 144 dns_nsec3param_toprivate(&nsec3param, private, privatetype, pbuf,
|
| /src/external/mpl/bind/dist/lib/dns/ |
| private.c | 28 * We need to build the relevant chain if there exists a NSEC/NSEC3PARAM 29 * at the apex; normally only one or the other of NSEC/NSEC3PARAM will exist. 31 * If a NSEC3PARAM RRset exists then we will need to build a NSEC chain 32 * if all the NSEC3PARAM records (and associated chains) are slated for 38 * If neither NSEC/NSEC3PARAM RRsets exist at the origin and the private 327 dns_rdata_nsec3param_t nsec3param; local 337 CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL)); 339 del = ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0); 340 init = ((nsec3param.flags & DNS_NSEC3FLAG_INITIAL) != 0); 341 nonsec = ((nsec3param.flags & DNS_NSEC3FLAG_NONSEC) != 0) [all...] |
| nsec3.c | 385 const dns_rdata_nsec3param_t *nsec3param) { 386 if (nsec3->hash == nsec3param->hash && 387 nsec3->iterations == nsec3param->iterations && 388 nsec3->salt_length == nsec3param->salt_length && 389 !memcmp(nsec3->salt, nsec3param->salt, nsec3->salt_length)) 402 const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff) { 436 if (!match_nsec3param(&nsec3, nsec3param)) { 508 const dns_rdata_nsec3param_t *nsec3param) { 518 if (match_nsec3param(nsec3, nsec3param)) { 529 const dns_rdata_nsec3param_t *nsec3param, dns_ttl_t nsecttl 930 dns_rdata_nsec3param_t nsec3param; local 1247 dns_rdata_nsec3param_t nsec3param; local 1668 dns_rdata_nsec3param_t nsec3param; local 1780 dns_rdata_nsec3param_t nsec3param; local [all...] |
| zoneverify.c | 427 * 'nsec3param'. 430 find_nsec3_match(const dns_rdata_nsec3param_t *nsec3param, 445 if (nsec3_match->hash == nsec3param->hash && 447 nsec3_match->iterations == nsec3param->iterations && 448 nsec3_match->salt_length == nsec3param->salt_length && 449 memcmp(nsec3_match->salt, nsec3param->salt, 450 nsec3param->salt_length) == 0) 461 const dns_rdata_nsec3param_t *nsec3param, dns_rdataset_t *rdataset, 471 result = find_nsec3_match(nsec3param, rdataset, rhsize, &nsec3); 510 if (nsec3.hash == nsec3param->hash & 536 dns_rdata_nsec3param_t nsec3param; local 692 dns_rdata_nsec3param_t nsec3param; local [all...] |
| rbtdb.c | 1647 * Walk the origin node looking for NSEC3PARAM records. 1653 dns_rdata_nsec3param_t nsec3param; local 1687 * Find A NSEC3PARAM with a supported algorithm. 1701 result = dns_rdata_tostruct(&rdata, &nsec3param, 1706 if (nsec3param.hash != DNS_NSEC3_UNKNOWNALG && 1707 !dns_nsec3_supportedhash(nsec3param.hash)) 1712 if (nsec3param.flags != 0) { 1716 memmove(version->salt, nsec3param.salt, 1717 nsec3param.salt_length); 1718 version->hash = nsec3param.hash [all...] |
| qpzone.c | 958 dns_rdata_nsec3param_t nsec3param; local 992 * Find an NSEC3PARAM with a supported algorithm. 1006 result = dns_rdata_tostruct(&rdata, &nsec3param, 1011 if (nsec3param.hash != DNS_NSEC3_UNKNOWNALG && 1012 !dns_nsec3_supportedhash(nsec3param.hash)) 1017 if (nsec3param.flags != 0) { 1021 memmove(version->salt, nsec3param.salt, 1022 nsec3param.salt_length); 1023 version->hash = nsec3param.hash; 1024 version->salt_length = nsec3param.salt_length [all...] |
| zone.c | 426 * List of outstanding NSEC3PARAM change requests. 790 dns_rdata_nsec3param_t nsec3param; member in struct:dns_nsec3chain 805 * 'nsec3param' contains the parameters of the NSEC3 chain being created 808 * 'salt' is buffer space and is referenced via 'nsec3param.salt'. 1106 typedef struct nsec3param nsec3param_t; 1107 struct nsec3param { struct 3740 * supplied NSEC3PARAM RDATA. 3745 zone_addnsec3chain(dns_zone_t *zone, dns_rdata_nsec3param_t *nsec3param) { 3776 if (!nsec3ok && (nsec3param->flags & DNS_NSEC3FLAG_REMOVE) == 0) { 3792 nsec3chain->nsec3param.common.rdclass = nsec3param->common.rdclass 3935 dns_rdata_nsec3param_t nsec3param; local 4082 dns_rdata_nsec3param_t nsec3param; local 8056 dns_rdata_nsec3param_t nsec3param; local 17359 nsec3param_t *nsec3param = NULL; local 23042 dns_rdata_nsec3param_t nsec3param; local 24230 dns_rdata_nsec3param_t nsec3param; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| nsec3param_51.c | 206 dns_rdata_nsec3param_t *nsec3param = source; local 209 REQUIRE(nsec3param != NULL); 210 REQUIRE(nsec3param->common.rdtype == type); 211 REQUIRE(nsec3param->common.rdclass == rdclass); 216 RETERR(uint8_tobuffer(nsec3param->hash, target)); 217 RETERR(uint8_tobuffer(nsec3param->flags, target)); 218 RETERR(uint16_tobuffer(nsec3param->iterations, target)); 219 RETERR(uint8_tobuffer(nsec3param->salt_length, target)); 220 RETERR(mem_tobuffer(target, nsec3param->salt, nsec3param->salt_length)) 227 dns_rdata_nsec3param_t *nsec3param = target; local 253 dns_rdata_nsec3param_t *nsec3param = source; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| private.c | 29 * We need to build the relevant chain if there exists a NSEC/NSEC3PARAM 30 * at the apex; normally only one or the other of NSEC/NSEC3PARAM will exist. 32 * If a NSEC3PARAM RRset exists then we will need to build a NSEC chain 33 * if all the NSEC3PARAM records (and associated chains) are slated for 39 * If neither NSEC/NSEC3PARAM RRsets exist at the origin and the private 351 dns_rdata_nsec3param_t nsec3param; local 361 CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL)); 363 del = ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0); 364 init = ((nsec3param.flags & DNS_NSEC3FLAG_INITIAL) != 0); 365 nonsec = ((nsec3param.flags & DNS_NSEC3FLAG_NONSEC) != 0) [all...] |
| nsec3.c | 394 const dns_rdata_nsec3param_t *nsec3param) { 395 if (nsec3->hash == nsec3param->hash && 396 nsec3->iterations == nsec3param->iterations && 397 nsec3->salt_length == nsec3param->salt_length && 398 !memcmp(nsec3->salt, nsec3param->salt, nsec3->salt_length)) 411 const dns_rdata_nsec3param_t *nsec3param, dns_diff_t *diff) { 445 if (!match_nsec3param(&nsec3, nsec3param)) { 523 const dns_rdata_nsec3param_t *nsec3param) { 533 if (match_nsec3param(nsec3, nsec3param)) { 544 const dns_rdata_nsec3param_t *nsec3param, dns_ttl_t nsecttl 916 dns_rdata_nsec3param_t nsec3param; local 1244 dns_rdata_nsec3param_t nsec3param; local 1680 dns_rdata_nsec3param_t nsec3param; local 1795 dns_rdata_nsec3param_t nsec3param; local [all...] |
| zoneverify.c | 427 * 'nsec3param'. 430 find_nsec3_match(const dns_rdata_nsec3param_t *nsec3param, 445 if (nsec3_match->hash == nsec3param->hash && 447 nsec3_match->iterations == nsec3param->iterations && 448 nsec3_match->salt_length == nsec3param->salt_length && 449 memcmp(nsec3_match->salt, nsec3param->salt, 450 nsec3param->salt_length) == 0) 461 const dns_rdata_nsec3param_t *nsec3param, dns_rdataset_t *rdataset, 471 result = find_nsec3_match(nsec3param, rdataset, rhsize, &nsec3); 510 if (nsec3.hash == nsec3param->hash & 536 dns_rdata_nsec3param_t nsec3param; local 692 dns_rdata_nsec3param_t nsec3param; local [all...] |
| rbtdb.c | 2431 * Walk the origin node looking for NSEC3PARAM records. 2437 dns_rdata_nsec3param_t nsec3param; local 2470 * Find A NSEC3PARAM with a supported algorithm. 2484 result = dns_rdata_tostruct(&rdata, &nsec3param, 2489 if (nsec3param.hash != DNS_NSEC3_UNKNOWNALG && 2490 !dns_nsec3_supportedhash(nsec3param.hash)) 2495 if (nsec3param.flags != 0) { 2499 memmove(version->salt, nsec3param.salt, 2500 nsec3param.salt_length); 2501 version->hash = nsec3param.hash [all...] |
| zone.c | 433 * List of outstanding NSEC3PARAM change requests. 785 dns_rdata_nsec3param_t nsec3param; member in struct:dns_nsec3chain 800 * 'nsec3param' contains the parameters of the NSEC3 chain being created 803 * 'salt' is buffer space and is referenced via 'nsec3param.salt'. 1050 typedef struct nsec3param nsec3param_t; 1051 struct nsec3param { struct 3653 * supplied NSEC3PARAM RDATA. 3658 zone_addnsec3chain(dns_zone_t *zone, dns_rdata_nsec3param_t *nsec3param) { 3689 if (!nsec3ok && (nsec3param->flags & DNS_NSEC3FLAG_REMOVE) == 0) { 3705 nsec3chain->nsec3param.common.rdclass = nsec3param->common.rdclass 3848 dns_rdata_nsec3param_t nsec3param; local 4001 dns_rdata_nsec3param_t nsec3param; local 8098 dns_rdata_nsec3param_t nsec3param; local 16849 nsec3param_t *nsec3param = NULL; local 21860 dns_rdata_nsec3param_t nsec3param; local 23028 dns_rdata_nsec3param_t nsec3param; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| nsec3param_51.c | 207 dns_rdata_nsec3param_t *nsec3param = source; local 210 REQUIRE(nsec3param != NULL); 211 REQUIRE(nsec3param->common.rdtype == type); 212 REQUIRE(nsec3param->common.rdclass == rdclass); 217 RETERR(uint8_tobuffer(nsec3param->hash, target)); 218 RETERR(uint8_tobuffer(nsec3param->flags, target)); 219 RETERR(uint16_tobuffer(nsec3param->iterations, target)); 220 RETERR(uint8_tobuffer(nsec3param->salt_length, target)); 221 RETERR(mem_tobuffer(target, nsec3param->salt, nsec3param->salt_length)) 228 dns_rdata_nsec3param_t *nsec3param = target; local 259 dns_rdata_nsec3param_t *nsec3param = source; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| kasp.h | 106 dns_kasp_nsec3param_t nsec3param; member in struct:dns_kasp
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| kasp.h | 91 dns_kasp_nsec3param_t nsec3param; member in struct:dns_kasp
|
| /src/external/mpl/bind/dist/lib/ns/ |
| update.c | 1259 * an RRSIG nor an NSEC3PARAM nor a NSEC. 1374 * Replace NSEC3PARAM records that only differ by the 2229 dns_rdata_nsec3param_t nsec3param; local 2252 CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL)); 2253 if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0) { 2256 if (nsec3param.iterations > iterations) { 2257 iterations = nsec3param.iterations; 2291 CHECK(dns_rdata_tostruct(&rdata, &nsec3param, NULL)); 2292 if ((nsec3param.flags & DNS_NSEC3FLAG_REMOVE) != 0) { 2295 if (nsec3param.iterations > iterations) [all...] |
| /src/external/mpl/bind/dist/bin/nsupdate/ |
| nsupdate.c | 2093 dns_rdata_nsec3param_t nsec3param; local 2095 result = dns_rdata_tostruct(rdata, &nsec3param, NULL); 2097 if (nsec3param.iterations > dns_nsec3_maxiterations()) { 2099 "NSEC3PARAM has excessive iterations (> %u)\n",
|
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-signzone.c | 1833 * Generate NSEC records for the zone and remove NSEC3/NSEC3PARAM records. 1876 check_result(result, "dns_db_deleterdataset(nsec3param/" 1971 dns_rdata_nsec3param_t nsec3param; local 1981 nsec3param.common.rdclass = gclass; 1982 nsec3param.common.rdtype = dns_rdatatype_nsec3param; 1983 ISC_LINK_INIT(&nsec3param.common, link); 1984 nsec3param.mctx = NULL; 1985 nsec3param.flags = 0; 1986 nsec3param.hash = unknownalg ? DNS_NSEC3_UNKNOWNALG : dns_hash_sha1; 1987 nsec3param.iterations = iterations [all...] |
| /src/external/bsd/unbound/dist/services/ |
| authzone.c | 2822 /** Find the NSEC3PARAM rrset (if any) and if true you have the parameters */ 2835 /* find out which NSEC3PARAM RR has supported parameters */ 2860 /** Hash a name with nsec3param into buffer, it has zone name appended. 7928 struct auth_rrset* nsec3param = az_domain_rrset(apex, local 7932 if(!nsec3param) {
|