| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| openpgpkey_61.h | 22 unsigned char *keyring; member in struct:dns_rdata_openpgpkey
|
| openpgpkey_61.c | 32 * Keyring. 47 * Keyring 82 * Keyring. 129 REQUIRE(sig->keyring != NULL && sig->length != 0); 135 * Keyring. 137 return mem_tobuffer(target, sig->keyring, sig->length); 154 * Keyring. 157 sig->keyring = mem_maybedup(mctx, sr.base, sig->length); 173 if (sig->keyring != NULL) { 174 isc_mem_free(sig->mctx, sig->keyring); [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| openpgpkey_61.h | 23 unsigned char *keyring; member in struct:dns_rdata_openpgpkey
|
| openpgpkey_61.c | 32 * Keyring. 47 * Keyring 83 * Keyring. 130 REQUIRE(sig->keyring != NULL && sig->length != 0); 136 * Keyring. 138 return (mem_tobuffer(target, sig->keyring, sig->length)); 157 * Keyring. 160 sig->keyring = mem_maybedup(mctx, sr.base, sig->length); 161 if (sig->keyring == NULL) { 183 if (sig->keyring != NULL) [all...] |
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| keymgr.h | 63 isc_mem_t *mctx, dns_dnsseckeylist_t *keyring, 68 * Manage keys in 'keyring' and update timing data according to 'kasp' policy. 70 * with use hints gleaned from their metadata, onto 'keyring'. 82 *\li 'keyring' is not NULL. 95 dns_keymgr_offline(const dns_name_t *origin, dns_dnsseckeylist_t *keyring, 99 * Manage keys in 'keyring' when in offline-ksk mode, and update timing data 108 *\li 'keyring' is not NULL. 118 dns_keymgr_checkds(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring, 121 dns_keymgr_checkds_id(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring, 125 * Check DS for one key in 'keyring'. The key must have the KSK role [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| keyring.c | 60 __RCSID("$NetBSD: keyring.c,v 1.60 2022/10/03 05:34:31 rillig Exp $"); 80 #include "keyring.h" 585 /* used to point to data during keyring read */ 587 pgp_keyring_t *keyring; /* the keyring we're reading */ member in struct:keyringcb_t 594 pgp_keyring_t *keyring; local 600 keyring = cb->keyring; 601 key = keyring->keyc > 0 ? &keyring->keys[keyring->keyc - 1] : NULL [all...] |
| validate.h | 70 const pgp_keyring_t *keyring; member in struct:__anon1056 89 const pgp_keyring_t *keyring; member in struct:__anon1058
|
| Makefile.am | 14 keyring.c \
|
| netpgp.c | 74 #include "keyring.h" 225 /* append a key to a keyring */ 248 /* return filename of a keyring */ 266 /* return an empty keyring */ 270 pgp_keyring_t *keyring; local 273 if ((keyring = calloc(1, sizeof(*keyring))) == NULL) { 282 return keyring; 285 /* read a keyring and return it */ 289 pgp_keyring_t *keyring; local 1180 pgp_keyring_t *keyring; local 1775 pgp_keyring_t *keyring; local 1971 pgp_keyring_t *keyring; local [all...] |
| misc.c | 113 pgp_keyring_t *keyring; member in struct:__anon992 123 pgp_keyring_t *keyring; local 131 keyring = accumulate->keyring; 132 key = keyring->keyc > 0 ? &keyring->keys[keyring->keyc - 1] : NULL; 136 pgp_add_to_pubring(keyring, &content->pubkey, pkt->tag); 140 pgp_add_to_secring(keyring, &content->seckey); 146 keyring->keyc - 1) [all...] |
| validate.c | 77 #include "keyring.h" 302 signer = pgp_getkeybyid(io, key->keyring, 483 signer = pgp_getkeybyid(io, data->keyring, 674 * \brief Validate all signatures on a single key against the given keyring 677 * \param keyring Keyring to use for validation 686 const pgp_keyring_t *keyring, 701 keysigs.keyring = keyring; 728 \param ring Keyring to us [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| keymgr.h | 33 dns_dnsseckeylist_t *keyring, dns_dnsseckeylist_t *dnskeys, 36 * Manage keys in 'keyring' and update timing data according to 'kasp' policy. 38 * keys, along with use hints gleaned from their metadata, onto 'keyring'. 46 *\li 'keyring' is not NULL. 59 dns_keymgr_checkds(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring, 63 dns_keymgr_checkds_id(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring, 68 * Check DS for one key in 'keyring'. The key must have the KSK role. 77 *\li 'keyring' is not NULL. 87 dns_keymgr_rollover(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring, 107 *\li 'keyring' is not NULL [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/tsig/ |
| tests_badtime.py | 57 keyring = dns.tsigkeyring.from_text( 63 msg.use_tsig(keyring, keyname="sha256", fudge=0) 72 dns.query.receive_tcp(sock, timeout(), keyring=keyring)
|
| /src/tests/usr.bin/netpgpkeys/ |
| t_netpgpkeys.sh | 52 # TODO: fix netpgpkeys so it doesn't need an empty keyring 54 atf_check netpgpkeys --keyring pubring.gpg \ 66 # TODO: fix netpgpkeys so it doesn't need an empty keyring 68 atf_check netpgpkeys --keyring pubring.gpg \
|
| /src/external/bsd/pkg_install/dist/lib/ |
| gpgsig.c | 58 gpg_verify(const char *content, size_t len, const char *keyring, 85 if (!pgpv_read_pubring(pgp, keyring, -1)) 86 err(EXIT_FAILURE, "cannot read keyring"); 101 const char *keyring, const char *user) 151 if (keyring != NULL) { 152 *argvp++ = "--no-default-keyring"; 153 *argvp++ = "--secret-keyring"; 154 *argvp++ = keyring;
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| main.c | 137 const char *keyring; local 148 keyring = NULL; 156 keyring = optarg; 162 keyring = optarg; 172 if (!pgpv_read_ssh_pubkeys(pgp, keyring, -1)) { 173 fprintf(stderr, "can't read ssh keyring\n"); 176 } else if (!pgpv_read_pubring(pgp, keyring, -1)) { 177 fprintf(stderr, "can't read keyring\n");
|
| chk.sh | 38 keyring=pubring.gpg 42 --keyring|-k) keyring=$2; shift ;; 100 cp ${keyring} ${dir}/pubring.gpg
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| keymgr.c | 597 keymgr_dep(dst_key_t *k, dns_dnsseckeylist_t *keyring, uint32_t *dep) { 598 for (dns_dnsseckey_t *d = ISC_LIST_HEAD(*keyring); d != NULL; 621 dns_dnsseckeylist_t *keyring) { 630 if (keymgr_dep(x, keyring, &dep_x)) { 637 if (!keymgr_dep(z, keyring, &dep_z)) { 668 for (dns_dnsseckey_t *y = ISC_LIST_HEAD(*keyring); y != NULL; 691 next_state, keyring)); 699 * Check if a key exists in 'keyring' that matches 'states'. 708 keymgr_key_exists_with_state(dns_dnsseckeylist_t *keyring, dns_dnsseckey_t *key, 713 for (dns_dnsseckey_t *dkey = ISC_LIST_HEAD(*keyring); dkey != NULL [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| keymgr.c | 699 keymgr_dep(dst_key_t *k, dns_dnsseckeylist_t *keyring, uint32_t *dep) { 700 for (dns_dnsseckey_t *d = ISC_LIST_HEAD(*keyring); d != NULL; 730 dns_dnsseckeylist_t *keyring) { 739 if (keymgr_dep(x, keyring, &dep_x)) { 746 if (!keymgr_dep(z, keyring, &dep_z)) { 777 for (dns_dnsseckey_t *y = ISC_LIST_HEAD(*keyring); y != NULL; 800 next_state, keyring); 808 * Check if a key exists in 'keyring' that matches 'states'. 817 keymgr_key_exists_with_state(dns_dnsseckeylist_t *keyring, dns_dnsseckey_t *key, 822 for (dns_dnsseckey_t *dkey = ISC_LIST_HEAD(*keyring); dkey != NULL [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/tsig/ans2/ |
| ans.py | 43 server = AsyncDnsServer(keyring=None)
|
| /src/crypto/external/bsd/netpgp/lib/netpgp/ |
| Makefile | 9 SRCS+= keyring.c misc.c netpgp.c openssl_crypto.c packet-parse.c
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpkeys/ |
| netpgpkeys.c | 70 "\t[--keyring=<keyring>] AND/OR\n" 89 KEYRING, 131 {"keyring", required_argument, NULL, KEYRING}, 152 char keyring[MAXPATHLEN + 1]; /* name of keyring */ member in struct:prog_t 275 case KEYRING: 278 "No keyring argument provided\n"); 281 snprintf(p->keyring, sizeof(p->keyring), "%s", arg) [all...] |
| /src/tests/usr.bin/netpgpverify/ |
| t_netpgpverify.sh | 127 atf_check -s exit:0 -o file:${data}/message.v1.asc.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v1.asc 128 atf_check -s exit:0 -o file:${data}/message.v1.sig.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v1.sig 130 atf_check -s exit:0 -o file:${data}/message.v2.asc.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v2.asc 131 atf_check -s exit:0 -o file:${data}/message.v2.sig.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v2.sig
|
| Makefile | 55 FILES+= data/message.keyring
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgp/ |
| netpgp.c | 67 "\t[--keyring=<keyring>] AND/OR\n" 88 KEYRING, 137 {"keyring", required_argument, NULL, KEYRING}, 171 char keyring[MAXPATHLEN + 1]; /* name of keyring */ member in struct:prog_t 387 case KEYRING: 390 "No keyring argument provided\n"); 393 snprintf(p->keyring, sizeof(p->keyring), "%s", arg) [all...] |