| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| dnssec.h | 70 bool zsk; /*% this is a zone-signing key */ member in struct:dns_dnsseckey
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| dnssec.h | 70 bool zsk; /*% this is a zone-signing key */ member in struct:dns_dnsseckey
|
| /src/external/apache2/mDNSResponder/dist/Clients/dnssdutil/ |
| DNSServerDNSSEC.c | 183 DNSKeyRSASHA1Info zsk; // Zone-Signing Key member in struct:__anon5886 293 .zsk = 500 .zsk = 707 .zsk = 914 .zsk = 1027 DNSKeyRSASHA256Info zsk; // Zone-Signing Key member in struct:__anon5887 1137 .zsk = 1344 .zsk = 1551 .zsk = 1758 .zsk 1871 DNSKeyRSASHA512Info zsk; \/\/ Zone-Signing Key member in struct:__anon5888 2715 DNSKeyECDSAP256SHA256Info zsk; \/\/ Zone-Signing Key member in struct:__anon5889 2904 DNSKeyECDSAP384SHA384Info zsk; \/\/ Zone-Signing Key member in struct:__anon5890 3092 DNSKeyEd25519Info zsk; \/\/ Zone-Signing Key member in struct:__anon5891 [all...] |
| dnssdutil.c | 10876 DNSKeyInfoRef zsk = NULL; local 10909 &index, &rcodeOverride, &ttl, &offset, &procDelayMs, &nameFlags, &zone, &zoneParent, &zsk, &ksk, &zskParent, 10916 check( !( nameFlags & kDNSNameFlag_HasRRSIG ) || ( zsk && ksk && zskParent ) ); 11153 dns_fixed_fields_rrsig_set_algorithm( &sigFields, DNSKeyInfoGetAlgorithm( zsk ) ); 11161 dns_fixed_fields_rrsig_set_key_tag( &sigFields, DNSKeyInfoGetKeyTag( zsk ) ); 11203 // Compute signature with ZSK. 11206 didSign = DNSKeyInfoSign( zsk, DataBuffer_GetPtr( sigMsg ), DataBuffer_GetLen( sigMsg ), 11226 DataBuffer_GetLen( sigMsg ), signature, signatureLen, zsk ); 11377 dns_fixed_fields_rrsig_set_algorithm( &sigFields, DNSKeyInfoGetAlgorithm( zsk ) ); 11385 dns_fixed_fields_rrsig_set_key_tag( &sigFields, DNSKeyInfoGetKeyTag( zsk ) ); 12164 DNSKeyInfoRef zsk = NULL; local 12689 DNSKeyInfoRef zsk; local [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-keygen.c | 139 bool zsk; member in struct:keygen_ctx 179 " algorithm and usage (ZSK or KSK)\n"); 187 fprintf(stderr, " -f <keyflag>: ZSK | KSK | REVOKE\n"); 709 "was used. Revoking a ZSK is " 772 dst_key_setbool(key, DST_BOOL_ZSK, ctx->zsk); 1265 ctx.zsk = true; 1311 ctx.zsk = dns_kasp_key_zsk(kaspkey); 1320 (ctx.zsk && !ctx.wantzsk && ctx.wantksk))
|
| dnssec-ksr.c | 347 /* ZSK or KSK? */ 625 fatal("no %s/%s zsk key pair found for bundle %s", namestr, 638 fatal("failed to print %s/%s zsk key pair found for bundle %s", 907 dns_rdataset_t zsk; local 909 dns_rdataset_init(&zsk); 910 dns_rdatalist_tordataset(zsklist, &zsk); 943 for (isc_result_t r = dns_rdatalist_first(&zsk); 944 r == ISC_R_SUCCESS; r = dns_rdatalist_next(&zsk)) 948 dns_rdatalist_current(&zsk, clone); 984 freerrset(&zsk); [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| dnssec.c | 580 bool ksk = false, zsk = false; local 592 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk); 594 zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0); 617 if (hint_zsign && zsk) { 1096 /* KSK or ZSK? */ 1101 result = dst_key_getbool(dk->key, DST_BOOL_ZSK, &dk->zsk); 1103 dk->zsk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) == 0); 1146 * 1. The unpopular ZSK Double-RRSIG method. 1150 * support the ZSK Double-RRSIG method, and when introducing a new 1755 key->ksk ? (key->zsk ? "CSK" : "KSK") : "ZSK" [all...] |
| update.c | 1065 bool zsk = false; local 1073 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk); 1076 zsk = true; 1080 if (!dst_key_isprivate(keys[i]) && offlineksk && zsk) { 1083 if (dst_key_inactive(keys[i]) && offlineksk && zsk) { 1095 } else if (!zsk) { 1097 * Other RRsets are signed with ZSK. 1100 } else if (zsk &&
|
| dst_api.c | 116 [DST_BOOL_ZSK] = "ZSK:", 2076 printbool(key, DST_BOOL_ZSK, "ZSK", fp); 2445 dst_key_role(dst_key_t *key, bool *ksk, bool *zsk) { 2459 if (zsk != NULL) { 2462 *zsk = z; 2464 *zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0); 2512 bool ksk = false, zsk = false, inactive = false; local 2527 (void)dst_key_role(key, &ksk, &zsk); 2547 * ZSK: If the ZRRSIG state is RUMOURED or OMNIPRESENT, it means the 2550 if (zsk) { 2572 bool ksk = false, zsk = false, inactive = false; local [all...] |
| keymgr.c | 101 bool ksk = false, zsk = false; local 107 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk); 111 if (ksk && zsk) { 115 } else if (zsk) { 116 return "ZSK"; 128 bool zsk = false, ksk = false; local 139 ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk); 140 if (ret == ISC_R_SUCCESS && zsk) { 142 /* ZSK: Iret = Dsgn + Dprp + TTLsig */ 223 bool zsk = false, ksk = false local 348 bool ksk = false, zsk = false; local 1703 bool ksk, zsk; local 2075 bool zsk = false; local 2180 bool zsk = false; local 2751 bool ksk = false, zsk = false; local 2895 bool ksk = false, zsk = false; local [all...] |
| zone.c | 6747 bool ksk, zsk; local 6761 ret = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk); 6763 zsk = !KSK(keys[i]); 6772 if (zsk) { 7090 bool zsk = false; local 7099 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk); 7102 zsk = true; 7109 if (!dst_key_isprivate(keys[i]) && offlineksk && zsk) { 7112 if (dst_key_inactive(keys[i]) && offlineksk && zsk) { 7120 true, ksk, zsk, [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| dnssec.c | 620 bool ksk = false, zsk = false; local 632 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk); 634 zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0); 657 if (hint_zsign && zsk) { 1303 /* KSK or ZSK? */ 1308 result = dst_key_getbool(dk->key, DST_BOOL_ZSK, &dk->zsk); 1310 dk->zsk = ((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) == 0); 1354 * 1. The unpopular ZSK Double-RRSIG method. 1358 * support the ZSK Double-RRSIG method, and when introducing a new 1906 key->ksk ? (key->zsk ? "CSK" : "KSK") : "ZSK" [all...] |
| keymgr.c | 83 bool ksk = false, zsk = false; local 89 ret = dst_key_getbool(key, DST_BOOL_ZSK, &zsk); 93 if (ksk && zsk) { 97 } else if (zsk) { 98 return ("ZSK"); 110 bool zsk = false, ksk = false; local 121 ret = dst_key_getbool(key->key, DST_BOOL_ZSK, &zsk); 122 if (ret == ISC_R_SUCCESS && zsk) { 123 /* ZSK: Iret = Dsgn + Dprp + TTLsig */ 199 bool zsk = false, ksk = false local 311 bool ksk = false, zsk = false; local 1550 bool ksk, zsk; local 1874 bool zsk = false; local 2498 bool ksk = false, zsk = false; local [all...] |
| dst_api.c | 111 static const char *booleantags[BOOLEAN_NTAGS] = { "KSK:", "ZSK:" }; 2130 printbool(key, DST_BOOL_ZSK, "ZSK", fp); 2509 dst_key_role(dst_key_t *key, bool *ksk, bool *zsk) { 2523 if (zsk != NULL) { 2526 *zsk = z; 2528 *zsk = ((dst_key_flags(key) & DNS_KEYFLAG_KSK) == 0); 2576 bool ksk = false, zsk = false, inactive = false; local 2591 (void)dst_key_role(key, &ksk, &zsk); 2611 * ZSK: If the ZRRSIG state is RUMOURED or OMNIPRESENT, it means the 2614 if (zsk) { 2636 bool ksk = false, zsk = false, inactive = false; local [all...] |
| update.c | 1196 bool zsk = false; local 1204 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk); 1207 zsk = true; 1222 } else if (!zsk) { 1224 * Other RRsets are signed with ZSK. 1227 } else if (zsk &&
|
| zone.c | 6770 bool ksk, zsk; local 6784 ret = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk); 6786 zsk = !KSK(keys[i]); 6795 if (zsk) { 7152 bool zsk = false; local 7162 kresult = dst_key_getbool(keys[i], DST_BOOL_ZSK, &zsk); 7165 zsk = true; 7170 have_zsk = zsk; 7230 } else if (!zsk) { 7232 * Other RRsets are signed with ZSK [all...] |