HomeSort by: relevance | last modified time | path
    Searched refs:keyring (Results 1 - 25 of 37) sorted by relevancy

1 2

  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
openpgpkey_61.h 22 unsigned char *keyring; member in struct:dns_rdata_openpgpkey
openpgpkey_61.c 32 * Keyring.
47 * Keyring
82 * Keyring.
129 REQUIRE(sig->keyring != NULL && sig->length != 0);
135 * Keyring.
137 return mem_tobuffer(target, sig->keyring, sig->length);
154 * Keyring.
157 sig->keyring = mem_maybedup(mctx, sr.base, sig->length);
173 if (sig->keyring != NULL) {
174 isc_mem_free(sig->mctx, sig->keyring);
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
openpgpkey_61.h 23 unsigned char *keyring; member in struct:dns_rdata_openpgpkey
openpgpkey_61.c 32 * Keyring.
47 * Keyring
83 * Keyring.
130 REQUIRE(sig->keyring != NULL && sig->length != 0);
136 * Keyring.
138 return (mem_tobuffer(target, sig->keyring, sig->length));
157 * Keyring.
160 sig->keyring = mem_maybedup(mctx, sr.base, sig->length);
161 if (sig->keyring == NULL) {
183 if (sig->keyring != NULL)
    [all...]
  /src/external/mpl/bind/dist/lib/dns/include/dns/
keymgr.h 63 isc_mem_t *mctx, dns_dnsseckeylist_t *keyring,
68 * Manage keys in 'keyring' and update timing data according to 'kasp' policy.
70 * with use hints gleaned from their metadata, onto 'keyring'.
82 *\li 'keyring' is not NULL.
95 dns_keymgr_offline(const dns_name_t *origin, dns_dnsseckeylist_t *keyring,
99 * Manage keys in 'keyring' when in offline-ksk mode, and update timing data
108 *\li 'keyring' is not NULL.
118 dns_keymgr_checkds(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring,
121 dns_keymgr_checkds_id(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring,
125 * Check DS for one key in 'keyring'. The key must have the KSK role
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/lib/
keyring.c 60 __RCSID("$NetBSD: keyring.c,v 1.60 2022/10/03 05:34:31 rillig Exp $");
80 #include "keyring.h"
585 /* used to point to data during keyring read */
587 pgp_keyring_t *keyring; /* the keyring we're reading */ member in struct:keyringcb_t
594 pgp_keyring_t *keyring; local
600 keyring = cb->keyring;
601 key = keyring->keyc > 0 ? &keyring->keys[keyring->keyc - 1] : NULL
    [all...]
validate.h 70 const pgp_keyring_t *keyring; member in struct:__anon1056
89 const pgp_keyring_t *keyring; member in struct:__anon1058
Makefile.am 14 keyring.c \
netpgp.c 74 #include "keyring.h"
225 /* append a key to a keyring */
248 /* return filename of a keyring */
266 /* return an empty keyring */
270 pgp_keyring_t *keyring; local
273 if ((keyring = calloc(1, sizeof(*keyring))) == NULL) {
282 return keyring;
285 /* read a keyring and return it */
289 pgp_keyring_t *keyring; local
1180 pgp_keyring_t *keyring; local
1775 pgp_keyring_t *keyring; local
1971 pgp_keyring_t *keyring; local
    [all...]
misc.c 113 pgp_keyring_t *keyring; member in struct:__anon992
123 pgp_keyring_t *keyring; local
131 keyring = accumulate->keyring;
132 key = keyring->keyc > 0 ? &keyring->keys[keyring->keyc - 1] : NULL;
136 pgp_add_to_pubring(keyring, &content->pubkey, pkt->tag);
140 pgp_add_to_secring(keyring, &content->seckey);
146 keyring->keyc - 1)
    [all...]
validate.c 77 #include "keyring.h"
302 signer = pgp_getkeybyid(io, key->keyring,
483 signer = pgp_getkeybyid(io, data->keyring,
674 * \brief Validate all signatures on a single key against the given keyring
677 * \param keyring Keyring to use for validation
686 const pgp_keyring_t *keyring,
701 keysigs.keyring = keyring;
728 \param ring Keyring to us
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/
keymgr.h 33 dns_dnsseckeylist_t *keyring, dns_dnsseckeylist_t *dnskeys,
36 * Manage keys in 'keyring' and update timing data according to 'kasp' policy.
38 * keys, along with use hints gleaned from their metadata, onto 'keyring'.
46 *\li 'keyring' is not NULL.
59 dns_keymgr_checkds(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring,
63 dns_keymgr_checkds_id(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring,
68 * Check DS for one key in 'keyring'. The key must have the KSK role.
77 *\li 'keyring' is not NULL.
87 dns_keymgr_rollover(dns_kasp_t *kasp, dns_dnsseckeylist_t *keyring,
107 *\li 'keyring' is not NULL
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/tsig/
tests_badtime.py 57 keyring = dns.tsigkeyring.from_text(
63 msg.use_tsig(keyring, keyname="sha256", fudge=0)
72 dns.query.receive_tcp(sock, timeout(), keyring=keyring)
  /src/tests/usr.bin/netpgpkeys/
t_netpgpkeys.sh 52 # TODO: fix netpgpkeys so it doesn't need an empty keyring
54 atf_check netpgpkeys --keyring pubring.gpg \
66 # TODO: fix netpgpkeys so it doesn't need an empty keyring
68 atf_check netpgpkeys --keyring pubring.gpg \
  /src/external/bsd/pkg_install/dist/lib/
gpgsig.c 58 gpg_verify(const char *content, size_t len, const char *keyring,
85 if (!pgpv_read_pubring(pgp, keyring, -1))
86 err(EXIT_FAILURE, "cannot read keyring");
101 const char *keyring, const char *user)
151 if (keyring != NULL) {
152 *argvp++ = "--no-default-keyring";
153 *argvp++ = "--secret-keyring";
154 *argvp++ = keyring;
  /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/
main.c 137 const char *keyring; local
148 keyring = NULL;
156 keyring = optarg;
162 keyring = optarg;
172 if (!pgpv_read_ssh_pubkeys(pgp, keyring, -1)) {
173 fprintf(stderr, "can't read ssh keyring\n");
176 } else if (!pgpv_read_pubring(pgp, keyring, -1)) {
177 fprintf(stderr, "can't read keyring\n");
chk.sh 38 keyring=pubring.gpg
42 --keyring|-k) keyring=$2; shift ;;
100 cp ${keyring} ${dir}/pubring.gpg
  /src/external/mpl/dhcp/bind/dist/lib/dns/
keymgr.c 597 keymgr_dep(dst_key_t *k, dns_dnsseckeylist_t *keyring, uint32_t *dep) {
598 for (dns_dnsseckey_t *d = ISC_LIST_HEAD(*keyring); d != NULL;
621 dns_dnsseckeylist_t *keyring) {
630 if (keymgr_dep(x, keyring, &dep_x)) {
637 if (!keymgr_dep(z, keyring, &dep_z)) {
668 for (dns_dnsseckey_t *y = ISC_LIST_HEAD(*keyring); y != NULL;
691 next_state, keyring));
699 * Check if a key exists in 'keyring' that matches 'states'.
708 keymgr_key_exists_with_state(dns_dnsseckeylist_t *keyring, dns_dnsseckey_t *key,
713 for (dns_dnsseckey_t *dkey = ISC_LIST_HEAD(*keyring); dkey != NULL
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
keymgr.c 699 keymgr_dep(dst_key_t *k, dns_dnsseckeylist_t *keyring, uint32_t *dep) {
700 for (dns_dnsseckey_t *d = ISC_LIST_HEAD(*keyring); d != NULL;
730 dns_dnsseckeylist_t *keyring) {
739 if (keymgr_dep(x, keyring, &dep_x)) {
746 if (!keymgr_dep(z, keyring, &dep_z)) {
777 for (dns_dnsseckey_t *y = ISC_LIST_HEAD(*keyring); y != NULL;
800 next_state, keyring);
808 * Check if a key exists in 'keyring' that matches 'states'.
817 keymgr_key_exists_with_state(dns_dnsseckeylist_t *keyring, dns_dnsseckey_t *key,
822 for (dns_dnsseckey_t *dkey = ISC_LIST_HEAD(*keyring); dkey != NULL
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/tsig/ans2/
ans.py 43 server = AsyncDnsServer(keyring=None)
  /src/crypto/external/bsd/netpgp/lib/netpgp/
Makefile 9 SRCS+= keyring.c misc.c netpgp.c openssl_crypto.c packet-parse.c
  /src/crypto/external/bsd/netpgp/dist/src/netpgpkeys/
netpgpkeys.c 70 "\t[--keyring=<keyring>] AND/OR\n"
89 KEYRING,
131 {"keyring", required_argument, NULL, KEYRING},
152 char keyring[MAXPATHLEN + 1]; /* name of keyring */ member in struct:prog_t
275 case KEYRING:
278 "No keyring argument provided\n");
281 snprintf(p->keyring, sizeof(p->keyring), "%s", arg)
    [all...]
  /src/tests/usr.bin/netpgpverify/
t_netpgpverify.sh 127 atf_check -s exit:0 -o file:${data}/message.v1.asc.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v1.asc
128 atf_check -s exit:0 -o file:${data}/message.v1.sig.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v1.sig
130 atf_check -s exit:0 -o file:${data}/message.v2.asc.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v2.asc
131 atf_check -s exit:0 -o file:${data}/message.v2.sig.expected -e empty env TZ=Europe/Vienna netpgpverify -k ${data}/message.keyring message.v2.sig
Makefile 55 FILES+= data/message.keyring
  /src/crypto/external/bsd/netpgp/dist/src/netpgp/
netpgp.c 67 "\t[--keyring=<keyring>] AND/OR\n"
88 KEYRING,
137 {"keyring", required_argument, NULL, KEYRING},
171 char keyring[MAXPATHLEN + 1]; /* name of keyring */ member in struct:prog_t
387 case KEYRING:
390 "No keyring argument provided\n");
393 snprintf(p->keyring, sizeof(p->keyring), "%s", arg)
    [all...]

Completed in 44 milliseconds

1 2