| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| cert_37.h | 23 uint16_t key_tag; member in struct:dns_rdata_cert
|
| ds_43.h | 23 uint16_t key_tag; member in struct:dns_rdata_ds
|
| cert_37.c | 181 RETERR(uint16_tobuffer(cert->key_tag, target)); 202 cert->key_tag = uint16_fromregion(®ion);
|
| ds_43.c | 261 RETERR(uint16_tobuffer(ds->key_tag, target)); 288 ds->key_tag = uint16_fromregion(®ion);
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| cert_37.h | 24 uint16_t key_tag; member in struct:dns_rdata_cert
|
| ds_43.h | 24 uint16_t key_tag; member in struct:dns_rdata_ds
|
| cert_37.c | 182 RETERR(uint16_tobuffer(cert->key_tag, target)); 205 cert->key_tag = uint16_fromregion(®ion);
|
| ds_43.c | 262 RETERR(uint16_tobuffer(ds->key_tag, target)); 289 ds->key_tag = uint16_fromregion(®ion);
|
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| resolve.h | 156 unsigned key_tag; member in struct:rk_sig_record 178 unsigned key_tag; member in struct:rk_ds_record
|
| resolve-test.c | 262 "sig_expiration %u, sig_inception %u, key_tag %u, " 266 sig->sig_expiration, sig->sig_inception, sig->key_tag, 294 ds->key_tag, ds->algorithm, ds->digest_type,
|
| resolve.c | 316 rr->u.sig->key_tag = (p[16] << 8) | p[17]; 384 rr->u.ds->key_tag = (p[0] << 8) | p[1]; 855 rr->u.sig->key_tag = pRec->Data.SIG.wKeyTag; 872 rr->u.ds->key_tag = pRec->Data.DS.wKeyTag;
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec/ |
| tests_excessive_rrsigs.py | 35 key_tag=rdata.key_tag,
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3/ans7/ |
| ans.py | 140 key_tag, 154 sig_rdata += struct.pack("!H", key_tag) 185 def sign_rrset_from_template(private_key, key_tag, rrset, template_rrsig): 189 key_tag, 200 def build_crafted_nsec3(private_key, key_tag, owner_name, original_next_hash, bitmaps): 227 key_tag, 243 f"next_hash={TARGET_NEXT_LENGTH}B, signed tag={key_tag}", 295 def patch_a_response(response_data, private_key, key_tag, modify_name): 333 private_key, key_tag, target_rrset[0], template 440 private_key, key_tag = load_zsk( [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-cds.c | 490 if (ki->tag != ds.key_tag || ki->algo != ds.algorithm) { 500 ds.key_tag, ds.algorithm, ds.digest_type, 509 c ? "CDS" : "DS", ds.key_tag, ds.algorithm, 516 c ? "CDS" : "DS", ds.key_tag, ds.algorithm, 740 ds.algorithm, ds.key_tag); 887 dns_keytag_t key_tag; local 924 key_tag = ds[0].key_tag; 927 if (ds[i].key_tag != key_tag || ds[i].algorithm != algorithm) [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| towire.c | 394 uint32_t key_tag; local 425 key_tag = 0; 427 key_tag += (i & 1) ? rdata[i] : (uint16_t)(rdata[i] << 8); 429 key_tag += (key_tag >> 16) & 0xFFFF; 430 return (uint16_t)(key_tag & 0xFFFF); 528 dns_sig0_signature_to_wire_(dns_towire_state_t *NONNULL txn, srp_key_t *key, uint16_t key_tag, 564 dns_u16_to_wire(txn, key_tag);
|
| dns-msg.h | 127 uint16_t key_tag; member in struct:dns_rdata_sig 446 srp_key_t *NONNULL key, uint16_t key_tag, 449 #define dns_sig0_signature_to_wire(txn, key, key_tag, signer, signer_hostname, signer_domain, timenow) \ 450 dns_sig0_signature_to_wire_(txn, key, key_tag, signer, signer_hostname, signer_domain, timenow, __LINE__)
|
| /src/external/mpl/bind/dist/bin/tests/system/sig0/ |
| tests_sig0.py | 77 key_tag = int(basename.split("+")[2].split(".")[0]) 86 "!HBBIIIH", 0, 8, 0, 0, expiration, inception, key_tag
|
| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/ |
| dns_obj_rr_dnskey.c | 38 uint16_t key_tag; // The key tag of the DNSKEY record that can be used to match RRSIG/DS records. member in struct:dns_obj_rr_dnskey_s 77 obj->key_tag = dns_obj_rr_dnskey_compute_key_tag(rdata, rdata_len); 140 return me->key_tag;
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec_malformed_dnskey/ |
| tests_malformed_dnskey.py | 60 key_tag=MALFORMED_ZSK_KEY_TAG, # overwrite with the malformed ZSKs 162 rrsigs[0].key_tag != MALFORMED_ZSK_KEY_TAG 163 or rrsigs[1].key_tag != MALFORMED_ZSK_KEY_TAG
|
| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/utilities/ |
| rdata_parser.c | 302 uint16_t key_tag; // The key tag of the corresponding DNSKEY that this DS record validates. member in struct:rdata_ds_s 309 check_compile_time(offsetof(rdata_ds_t, key_tag) == 0); 374 uint16_t key_tag; // The key tag that identifies which DNSKEY it uses to generate the current RRSIG. member in struct:rdata_rrsig_s 385 check_compile_time(offsetof(rdata_rrsig_t, key_tag) == 16); 441 return get_uint16_from_bytes(rdata + offsetof(rdata_rrsig_t, key_tag));
|
| /src/external/mpl/bind/dist/lib/dns/ |
| ds.c | 108 dsrdata->key_tag = dst_region_computeid(&r);
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| ds.c | 108 dsrdata->key_tag = dst_region_computeid(&r);
|
| /src/external/mpl/bind/dist/bin/tests/system/checkds/ |
| tests_checkds.py | 122 keyid = list(dict(rr.items).items())[0][0].key_tag
|
| /src/external/mpl/bind/include/dns/ |
| rdatastruct.h | 1008 uint16_t key_tag; member in struct:dns_rdata_cert 1201 uint16_t key_tag; member in struct:dns_rdata_ds
|
| /src/external/mpl/dhcp/bind/include/dns/ |
| rdatastruct.h | 1124 uint16_t key_tag; member in struct:dns_rdata_cert 1335 uint16_t key_tag; member in struct:dns_rdata_ds
|