HomeSort by: relevance | last modified time | path
    Searched defs:zsk (Results 1 - 16 of 16) sorted by relevancy

  /src/external/mpl/bind/dist/lib/dns/include/dns/
dnssec.h 70 bool zsk; /*% this is a zone-signing key */ member in struct:dns_dnsseckey
  /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/
dnssec.h 70 bool zsk; /*% this is a zone-signing key */ member in struct:dns_dnsseckey
  /src/external/apache2/mDNSResponder/dist/Clients/dnssdutil/
DNSServerDNSSEC.c 183 DNSKeyRSASHA1Info zsk; // Zone-Signing Key member in struct:__anon5886
293 .zsk =
500 .zsk =
707 .zsk =
914 .zsk =
1027 DNSKeyRSASHA256Info zsk; // Zone-Signing Key member in struct:__anon5887
1137 .zsk =
1344 .zsk =
1551 .zsk =
1758 .zsk
1871 DNSKeyRSASHA512Info zsk; \/\/ Zone-Signing Key member in struct:__anon5888
2715 DNSKeyECDSAP256SHA256Info zsk; \/\/ Zone-Signing Key member in struct:__anon5889
2904 DNSKeyECDSAP384SHA384Info zsk; \/\/ Zone-Signing Key member in struct:__anon5890
3092 DNSKeyEd25519Info zsk; \/\/ Zone-Signing Key member in struct:__anon5891
    [all...]
dnssdutil.c 10876 DNSKeyInfoRef zsk = NULL; local
10909 &index, &rcodeOverride, &ttl, &offset, &procDelayMs, &nameFlags, &zone, &zoneParent, &zsk, &ksk, &zskParent,
10916 check( !( nameFlags & kDNSNameFlag_HasRRSIG ) || ( zsk && ksk && zskParent ) );
11153 dns_fixed_fields_rrsig_set_algorithm( &sigFields, DNSKeyInfoGetAlgorithm( zsk ) );
11161 dns_fixed_fields_rrsig_set_key_tag( &sigFields, DNSKeyInfoGetKeyTag( zsk ) );
11203 // Compute signature with ZSK.
11206 didSign = DNSKeyInfoSign( zsk, DataBuffer_GetPtr( sigMsg ), DataBuffer_GetLen( sigMsg ),
11226 DataBuffer_GetLen( sigMsg ), signature, signatureLen, zsk );
11377 dns_fixed_fields_rrsig_set_algorithm( &sigFields, DNSKeyInfoGetAlgorithm( zsk ) );
11385 dns_fixed_fields_rrsig_set_key_tag( &sigFields, DNSKeyInfoGetKeyTag( zsk ) );
12164 DNSKeyInfoRef zsk = NULL; local
12689 DNSKeyInfoRef zsk; local
    [all...]
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-keygen.c 139 bool zsk; member in struct:keygen_ctx
179 " algorithm and usage (ZSK or KSK)\n");
187 fprintf(stderr, " -f <keyflag>: ZSK | KSK | REVOKE\n");
709 "was used. Revoking a ZSK is "
772 dst_key_setbool(key, DST_BOOL_ZSK, ctx->zsk);
1265 ctx.zsk = true;
1311 ctx.zsk = dns_kasp_key_zsk(kaspkey);
1320 (ctx.zsk && !ctx.wantzsk && ctx.wantksk))
dnssec-ksr.c 347 /* ZSK or KSK? */
625 fatal("no %s/%s zsk key pair found for bundle %s", namestr,
638 fatal("failed to print %s/%s zsk key pair found for bundle %s",
907 dns_rdataset_t zsk; local
909 dns_rdataset_init(&zsk);
910 dns_rdatalist_tordataset(zsklist, &zsk);
943 for (isc_result_t r = dns_rdatalist_first(&zsk);
944 r == ISC_R_SUCCESS; r = dns_rdatalist_next(&zsk))
948 dns_rdatalist_current(&zsk, clone);
984 freerrset(&zsk);
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
dnssec.c 580 bool ksk = false, zsk = false; local
592 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
594 zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0);
617 if (hint_zsign && zsk) {
1096 /* KSK or ZSK? */
1101 result = dst_key_getbool(dk->key, DST_BOOL_ZSK, &dk->zsk);
1103 dk->zsk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) == 0);
1146 * 1. The unpopular ZSK Double-RRSIG method.
1150 * support the ZSK Double-RRSIG method, and when introducing a new
1755 key->ksk ? (key->zsk ? "CSK" : "KSK") : "ZSK"
    [all...]
update.c 1065 bool zsk = false; local
1073 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk);
1076 zsk = true;
1080 if (!dst_key_isprivate(keys[i]) && offlineksk && zsk) {
1083 if (dst_key_inactive(keys[i]) && offlineksk && zsk) {
1095 } else if (!zsk) {
1097 * Other RRsets are signed with ZSK.
1100 } else if (zsk &&
dst_api.c 116 [DST_BOOL_ZSK] = "ZSK:",
2076 printbool(key, DST_BOOL_ZSK, "ZSK", fp);
2445 dst_key_role(dst_key_t *key, bool *ksk, bool *zsk) {
2459 if (zsk != NULL) {
2462 *zsk = z;
2464 *zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0);
2512 bool ksk = false, zsk = false, inactive = false; local
2527 (void)dst_key_role(key, &ksk, &zsk);
2547 * ZSK: If the ZRRSIG state is RUMOURED or OMNIPRESENT, it means the
2550 if (zsk) {
2572 bool ksk = false, zsk = false, inactive = false; local
    [all...]
keymgr.c 101 bool ksk = false, zsk = false; local
107 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
111 if (ksk && zsk) {
115 } else if (zsk) {
116 return "ZSK";
128 bool zsk = false, ksk = false; local
139 ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
140 if (ret == ISC_R_SUCCESS && zsk) {
142 /* ZSK: Iret = Dsgn + Dprp + TTLsig */
223 bool zsk = false, ksk = false local
348 bool ksk = false, zsk = false; local
1703 bool ksk, zsk; local
2075 bool zsk = false; local
2180 bool zsk = false; local
2751 bool ksk = false, zsk = false; local
2895 bool ksk = false, zsk = false; local
    [all...]
zone.c 6747 bool ksk, zsk; local
6761 ret = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk);
6763 zsk = !KSK(keys[i]);
6772 if (zsk) {
7090 bool zsk = false; local
7099 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk);
7102 zsk = true;
7109 if (!dst_key_isprivate(keys[i]) && offlineksk && zsk) {
7112 if (dst_key_inactive(keys[i]) && offlineksk && zsk) {
7120 true, ksk, zsk,
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
dnssec.c 620 bool ksk = false, zsk = false; local
632 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
634 zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0);
657 if (hint_zsign && zsk) {
1303 /* KSK or ZSK? */
1308 result = dst_key_getbool(dk->key, DST_BOOL_ZSK, &dk->zsk);
1310 dk->zsk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) == 0);
1354 * 1. The unpopular ZSK Double-RRSIG method.
1358 * support the ZSK Double-RRSIG method, and when introducing a new
1906 key->ksk ? (key->zsk ? "CSK" : "KSK") : "ZSK"
    [all...]
keymgr.c 83 bool ksk = false, zsk = false; local
89 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk);
93 if (ksk && zsk) {
97 } else if (zsk) {
98 return ("ZSK");
110 bool zsk = false, ksk = false; local
121 ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk);
122 if (ret == ISC_R_SUCCESS && zsk) {
123 /* ZSK: Iret = Dsgn + Dprp + TTLsig */
199 bool zsk = false, ksk = false local
311 bool ksk = false, zsk = false; local
1550 bool ksk, zsk; local
1874 bool zsk = false; local
2498 bool ksk = false, zsk = false; local
    [all...]
dst_api.c 111 static const char *booleantags[BOOLEAN_NTAGS] = { "KSK:", "ZSK:" };
2130 printbool(key, DST_BOOL_ZSK, "ZSK", fp);
2509 dst_key_role(dst_key_t *key, bool *ksk, bool *zsk) {
2523 if (zsk != NULL) {
2526 *zsk = z;
2528 *zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0);
2576 bool ksk = false, zsk = false, inactive = false; local
2591 (void)dst_key_role(key, &ksk, &zsk);
2611 * ZSK: If the ZRRSIG state is RUMOURED or OMNIPRESENT, it means the
2614 if (zsk) {
2636 bool ksk = false, zsk = false, inactive = false; local
    [all...]
update.c 1196 bool zsk = false; local
1204 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk);
1207 zsk = true;
1222 } else if (!zsk) {
1224 * Other RRsets are signed with ZSK.
1227 } else if (zsk &&
zone.c 6770 bool ksk, zsk; local
6784 ret = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk);
6786 zsk = !KSK(keys[i]);
6795 if (zsk) {
7152 bool zsk = false; local
7162 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk);
7165 zsk = true;
7170 have_zsk = zsk;
7230 } else if (!zsk) {
7232 * Other RRsets are signed with ZSK
    [all...]

Completed in 80 milliseconds