| /src/external/mpl/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.c | 378 dns_rdata_any_tsig_t *tsig = source; local 383 REQUIRE(tsig != NULL); 384 REQUIRE(tsig->common.rdclass == rdclass); 385 REQUIRE(tsig->common.rdtype == type); 393 RETERR(name_tobuffer(&tsig->algorithm, target)); 403 RETERR(uint16_tobuffer((uint16_t)(tsig->timesigned >> 32), target)); 404 RETERR(uint32_tobuffer((uint32_t)(tsig->timesigned & 0xffffffffU), 410 RETERR(uint16_tobuffer(tsig->fudge, target)); 415 RETERR(uint16_tobuffer(tsig->siglen, target)); 420 RETERR(mem_tobuffer(target, tsig->signature, tsig->siglen)) 450 dns_rdata_any_tsig_t *tsig; local 533 dns_rdata_any_tsig_t *tsig = (dns_rdata_any_tsig_t *)source; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.c | 377 dns_rdata_any_tsig_t *tsig = source; local 382 REQUIRE(tsig != NULL); 383 REQUIRE(tsig->common.rdclass == rdclass); 384 REQUIRE(tsig->common.rdtype == type); 392 RETERR(name_tobuffer(&tsig->algorithm, target)); 402 RETERR(uint16_tobuffer((uint16_t)(tsig->timesigned >> 32), target)); 403 RETERR(uint32_tobuffer((uint32_t)(tsig->timesigned & 0xffffffffU), 409 RETERR(uint16_tobuffer(tsig->fudge, target)); 414 RETERR(uint16_tobuffer(tsig->siglen, target)); 419 RETERR(mem_tobuffer(target, tsig->signature, tsig->siglen)) 449 dns_rdata_any_tsig_t *tsig; local 549 dns_rdata_any_tsig_t *tsig = (dns_rdata_any_tsig_t *)source; local [all...] |
| /src/bin/sh/ |
| trap.c | 503 char *t, tsig; local 551 tsig = *t; 552 if (tsig == 0) { 584 tsig = S_IGN; 586 tsig = S_HARD_IGN; 588 tsig = S_RESET; /* force to be set */ 591 VTRACE(DBG_TRAP, (" tsig=%d\n", tsig)); 593 if (tsig == S_HARD_IGN || tsig == action [all...] |
| /src/external/bsd/nsd/dist/ |
| query.h | 19 #include "tsig.h" 72 /* TSIG record information and running hash for query-response */ 73 tsig_record_type tsig; member in struct:query 74 /* tsig actions can be overridden, for axfr transfer. */
|
| tsig.c | 2 * tsig.c -- TSIG implementation (RFC 2845). 15 #include "tsig.h" 16 #include "tsig-openssl.h" 97 tsig_digest_variables(tsig_record_type *tsig, int tsig_timers_only) 101 uint16_t signed_time_high = htons(tsig->signed_time_high); 102 uint32_t signed_time_low = htonl(tsig->signed_time_low); 103 uint16_t signed_time_fudge = htons(tsig->signed_time_fudge); 104 uint16_t error_code = htons(tsig->error_code); 105 uint16_t other_size = htons(tsig->other_size) 291 tsig_record_type *tsig = (tsig_record_type *) data; local [all...] |
| xfrd.h | 28 #include "tsig.h" 243 tsig_record_type tsig; /* tsig state for IXFR/AXFR */ member in struct:xfrd_xfr 428 * TSIG sign outgoing request. Call if acl has a key. 430 void xfrd_tsig_sign_request(buffer_type* packet, struct tsig_record* tsig,
|
| /src/external/mpl/bind/dist/tests/dns/ |
| tsig_test.c | 35 #include <dns/tsig.h> 69 dns_rdata_any_tsig_t tsig; local 80 CHECK(dns_rdata_tostruct(&rdata, &tsig, NULL)); 81 isc_buffer_putuint16(&databuf, tsig.siglen); 82 isc_buffer_putmem(&databuf, tsig.signature, tsig.siglen); 85 dns_rdata_freestruct(&tsig); 94 dns_rdata_any_tsig_t tsig; local 107 memset(&tsig, 0, sizeof(tsig)); [all...] |
| /src/external/mpl/bind/dist/bin/dig/ |
| host.c | 386 dns_rdataset_t *opt, *tsig = NULL; local 522 tsig = dns_message_gettsig(msg, &tsigname); 523 if (tsig != NULL) { 524 printf(";; PSEUDOSECTIONS: TSIG\n"); 567 if ((tsig != NULL) && !short_form) { 569 result = printrdata(msg, tsig, tsigname, "PSEUDOSECTION TSIG",
|
| /src/external/mpl/bind/dist/lib/dns/ |
| request.c | 40 #include <dns/tsig.h> 83 isc_buffer_t *tsig; member in struct:dns_request 628 result = dns_message_getquerytsig(message, mctx, &request->tsig); 800 dns_message_setquerytsig(message, request->tsig); 1021 if (request->tsig != NULL) { 1022 isc_buffer_free(&request->tsig);
|
| tsig.c | 1 /* $NetBSD: tsig.c,v 1.15 2025/05/21 14:48:03 christos Exp $ */ 40 #include <dns/tsig.h> 61 static unsigned char gsstsig_ndata[] = "\010gss-tsig"; 150 "tsig key '%s' (%s): %s", namestr, creatorstr, 154 DNS_LOGMODULE_TSIG, level, "tsig key '%s': %s", 558 dns_rdata_any_tsig_t tsig, querytsig; local 580 * If this is a response, there should be a TSIG in the query with the 593 tsig = (dns_rdata_any_tsig_t){ 604 dns_name_init(&tsig.algorithm, NULL); 605 dns_name_clone(dns_tsigkey_algorithm(key), &tsig.algorithm) 844 dns_rdata_any_tsig_t tsig, querytsig; local 1205 dns_rdata_any_tsig_t tsig, querytsig; local [all...] |
| message.c | 51 #include <dns/tsig.h> 417 m->tsig = NULL; 521 if (msg->tsig != NULL) { 522 INSIST(dns_rdataset_isassociated(msg->tsig)); 526 msg->querytsig = msg->tsig; 528 dns__message_putassociatedrdataset(msg, &msg->tsig); 535 msg->tsig = NULL; 696 * The space required for a TSIG record is: 1300 * Special type handling for TSIG, OPT, and TKEY. 1304 * If it is a tsig, verify that it is in th 3084 dns_rdata_any_tsig_t tsig; local [all...] |
| resolver.c | 77 #include <dns/tsig.h> 272 isc_buffer_t *tsig; member in struct:query 1014 if (query->tsig != NULL) { 1015 isc_buffer_free(&query->tsig); 2672 * Add TSIG record tailored to the current recipient. 2712 &query->tsig); 7507 if (query->tsig != NULL) { 7508 dns_message_setquerytsig(query->rmessage, query->tsig); 7515 FCTXTRACE3("unable to set tsig key", result); 7612 if (query->rmessage->tsigkey == NULL && query->rmessage->tsig == NULL & [all...] |
| zone.c | 89 #include <dns/tsig.h> 12715 "Peer TSIG key lookup failure.", 12726 "sending notify to %s : TSIG (%s)", addrbuf, 14610 * First, look for a tsig key in the primaries statement, then 14634 "unable to find TSIG key for %s", addrbuf); 14925 * First, look for a tsig key in the primaries statement, then 15573 const dns_name_t *tsig; local 15668 tsig = dns_tsigkey_identity(tsigkey); 15671 (dns_acl_match(&netaddr, tsig, zone->notify_acl, zone->view->aclenv, 18141 char buf[DNS_NAME_FORMATSIZE + sizeof(": TSIG ''")]; [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSCore/ |
| DNSDigest.c | 1315 // TSIG HMAC names from <https://datatracker.ietf.org/doc/html/rfc8945#section-6> 1527 AuthRecord tsig; local 1564 // Construct TSIG RR, digesting variables as apporpriate 1565 mDNS_SetupResourceRecord(&tsig, mDNSNULL, 0, kDNSType_TSIG, 0, kDNSRecordTypeKnownUnique, AuthRecordAny, mDNSNULL, mDNSNULL); 1568 AssignDomainName(&tsig.namestorage, &info->keyname); 1576 tsig.resrec.rrclass = kDNSQClass_ANY; 1585 tsig.resrec.rroriginalttl = 0; 1587 CCHmacUpdate(&hmacContext, (mDNSu8 *)&tsig.resrec.rroriginalttl, sizeof(tsig.resrec.rroriginalttl)); 1589 MD5_Update(&c, (mDNSu8 *)&tsig.resrec.rroriginalttl, sizeof(tsig.resrec.rroriginalttl)) [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| zoneconf.c | 44 #include <dns/tsig.h> 789 const dns_name_t *tsig = NULL; local 812 tsig = dns_tsigkey_identity(mykey); 815 if (dns_acl_allowed(&netsrc, tsig, view->matchclients, env) && 816 dns_acl_allowed(&netdst, tsig, view->matchdestinations,
|
| server.c | 104 #include <dns/tsig.h> 5198 * Configure the view's TSIG keys. 10332 * checking involves SIG(0). TSIG has priority of SIG(0), so if TSIG 10335 INSIST(message->tsigkey != NULL || message->tsig != NULL || 10344 const dns_name_t *tsig = NULL; local 10349 tsig = dns_tsigkey_identity(message->tsigkey); 10352 if (dns_acl_allowed(srcaddr, tsig, view->matchclients, 10354 dns_acl_allowed(destaddr, tsig, 10413 const dns_name_t *tsig = NULL local [all...] |
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| message.h | 49 * TSIG checking is also done at this layer, and any DNSSEC transaction 248 dns_rdataset_t *tsig; member in struct:dns_message 296 dns_name_t *tsigname; /* Owner name of TSIG, if any */ 520 * TSIGs are detected and stored in the pseudo-section "tsig". 538 * OPT and TSIG records are always handled specially, regardless of the 1096 * Get the TSIG record and owner for 'msg'. 1105 *\li The TSIG rdataset of 'msg', or NULL if there isn't one. 1115 * Set the tsig key for 'msg'. This is only necessary for when rendering a 1123 *\li 'key' is a valid tsig key or NULL. 1129 *\li #ISC_R_NOSPACE -- there is no space for the TSIG record [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| message.h | 46 * TSIG checking is also done at this layer, and any DNSSEC transaction 225 dns_rdataset_t *tsig; member in struct:dns_message 267 dns_name_t *tsigname; /* Owner name of TSIG, if any 488 * TSIGs are detected and stored in the pseudo-section "tsig". 506 * OPT and TSIG records are always handled specially, regardless of the 1082 * Get the TSIG record and owner for 'msg'. 1091 *\li The TSIG rdataset of 'msg', or NULL if there isn't one. 1101 * Set the tsig key for 'msg'. This is only necessary for when rendering a 1110 *\li 'key' is a valid tsig key or NULL. 1116 *\li #ISC_R_NOSPACE -- there is no space for the TSIG record [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| request.c | 37 #include <dns/tsig.h> 83 isc_buffer_t *tsig; member in struct:dns_request 477 request->tsig = NULL; 992 result = dns_message_getquerytsig(message, mctx, &request->tsig); 1208 result = dns_message_setquerytsig(message, request->tsig); 1483 if (request->tsig != NULL) { 1484 isc_buffer_free(&request->tsig);
|
| tsig.c | 1 /* $NetBSD: tsig.c,v 1.1 2024/02/18 20:57:34 christos Exp $ */ 43 #include <dns/tsig.h> 67 static unsigned char gsstsig_ndata[] = "\010gss-tsig"; 172 "tsig key '%s' (%s): %s", namestr, creatorstr, 176 DNS_LOGMODULE_TSIG, level, "tsig key '%s': %s", 422 tsig_log(tkey, 2, "tsig expire: deleting"); 764 dns_rdata_any_tsig_t tsig, querytsig; local 786 * If this is a response, there should be a TSIG in the query with the 798 tsig.mctx = mctx; 799 tsig.common.rdclass = dns_rdataclass_any 1076 dns_rdata_any_tsig_t tsig, querytsig; local 1428 dns_rdata_any_tsig_t tsig, querytsig; local [all...] |
| message.c | 47 #include <dns/tsig.h> 396 m->tsig = NULL; 505 if (msg->tsig != NULL) { 506 INSIST(dns_rdataset_isassociated(msg->tsig)); 510 msg->querytsig = msg->tsig; 512 dns_rdataset_disassociate(msg->tsig); 513 isc_mempool_put(msg->rdspool, msg->tsig); 514 msg->tsig = NULL; 522 msg->tsig = NULL; 684 * The space required for an TSIG record is 3210 dns_rdata_any_tsig_t tsig; local [all...] |
| resolver.c | 68 #include <dns/tsig.h> 246 isc_buffer_t *tsig; member in struct:query 1502 if (query->tsig != NULL) { 1503 isc_buffer_free(&query->tsig); 2303 query->tsig = NULL; 2939 * Add TSIG record tailored to the current recipient. 2982 fctx->qmessage, fctx->res->mctx, &query->tsig); 7942 if (query->tsig != NULL) { 7943 result = dns_message_setquerytsig(query->rmessage, query->tsig); 7945 FCTXTRACE3("unable to set query tsig", result) [all...] |
| zone.c | 84 #include <dns/tsig.h> 12649 "Peer TSIG key lookup failure.", 12660 "sending notify to %s : TSIG (%s)", addrbuf, 14499 * First, look for a tsig key in the master statement, then 14522 "unable to find TSIG key for %s", addrbuf); 14787 * First, look for a tsig key in the master statement, then 15454 const dns_name_t *tsig; local 15547 tsig = dns_tsigkey_identity(tsigkey); 15549 (dns_acl_match(&netaddr, tsig, zone->notify_acl, 17629 char buf[DNS_NAME_FORMATSIZE + sizeof(": TSIG ''")]; [all...] |
| /src/external/mpl/bind/dist/bin/nsupdate/ |
| nsupdate.c | 72 #include <dns/tsig.h> 710 ddebug("Freeing TSIG key"); 2404 "key [hmac:]keyname secret (use TSIG to sign " 2496 dns_rdata_any_tsig_t tsig; local 2501 result = dns_rdata_tostruct(&rdata, &tsig, NULL); 2503 if (tsig.error != 0) { 2509 result = dns_tsigrcode_totext(tsig.error, b); 2572 ddebug("tsig verification successful"); 2589 fprintf(stderr, "; TSIG error with server: %s\n", 2673 /* Windows doesn't like the tsig name to be compressed. * [all...] |