/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/pkcs11/ |
H A D | setup.sh | 30 $PK11GEN -b 2048 -l robie-ksk 34 ksk=`$KEYFRLAB -a RSASHA1 -f ksk -l robie-ksk example` 36 cat $infile $zsk1.key $ksk.key > $zonefile
|
H A D | tests.sh | 33 count=`$PK11LIST | grep robie-ksk | wc -l`
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/metadata/ |
H A D | clean.sh | 20 rm -f zsk.key ksk.key parent.ksk.key parent.zsk.key
|
H A D | setup.sh | 48 # active ksk 49 ksk=`$KEYGEN -q -r $RANDFILE -fk $czone` 50 echo $ksk > ksk.key 67 echo $pksk > parent.ksk.key
|
H A D | tests.sh | 32 ksk=`sed 's/^K'${czone}'.+005+0*\([0-9]\)/\1/' < ksk.key` 65 grep "DNSKEY $ksk"'$' sigs > /dev/null || ret=1 66 grep "SOA $ksk"'$' sigs > /dev/null && ret=1
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/resolver/ns6/ |
H A D | keygen.sh | 28 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone` 30 cat $ksk.key $zsk.key >> $zonefile
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/autosign/ns3/ |
H A D | keygen.sh | 28 ksk=`$KEYGEN -3 -q -r $RANDFILE -fk $zone` 30 $DSFROMKEY $ksk.key > dsset-${zone}. 39 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone` 41 $DSFROMKEY $ksk.key > dsset-${zone}. 50 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone` 52 $DSFROMKEY $ksk.key > dsset-${zone}. 61 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone` 63 $DSFROMKEY $ksk.key > dsset-${zone}. 72 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone` 74 $DSFROMKEY $ksk [all...] |
/macosx-10.10.1/bind9-45.101/bind9/contrib/zkt/ |
H A D | zkt.c | 275 int ksk; local 283 ksk = dki_isksk (dkp); 284 if ( (ksk && !kskflag) || (!ksk && !zskflag) ) 303 int ksk; 307 ksk = dki_isksk (dkp); 308 if ( (ksk && !kskflag) || (!ksk && !zskflag) ) 325 int ksk; local 333 ksk [all...] |
H A D | rollover.c | 65 static dki_t *genkey (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument 72 if ( ksk ) 82 static dki_t *genkey2 (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument 89 if ( ksk ) 224 static int kskrollover (dki_t *ksk, zone_t *zonelist, zone_t *zp) argument 238 assert ( ksk != NULL ); 242 /* check ksk lifetime */ 243 if ( (lifetime = dki_lifetime (ksk)) == 0 ) /* if lifetime of key is not set.. */ 247 age = dki_age (ksk, currtime); 252 /* check if we have to change the ksk [all...] |
H A D | dki.h | 179 extern dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days); 187 extern const dki_t *dki_find (const dki_t *list, int ksk, int status, int first); 188 extern const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no);
|
H A D | dnssec-zkt.c | 92 {"ksk-rollover", no_argument, NULL, '9'}, 93 {"ksk-status", required_argument, NULL, '0'}, 94 {"ksk-roll-status", required_argument, NULL, '0'}, 95 {"ksk-newkey", required_argument, NULL, '1'}, 96 {"ksk-publish", required_argument, NULL, '2'}, 97 {"ksk-delkey", required_argument, NULL, '3'}, 98 {"ksk-roll-phase1", required_argument, NULL, '1'}, 99 {"ksk-roll-phase2", required_argument, NULL, '2'}, 100 {"ksk-roll-phase3", required_argument, NULL, '3'}, 103 {"ksk", no_argumen 551 int ksk; local [all...] |
H A D | zkt-keyman.c | 91 {"ksk-rollover", no_argument, NULL, '9'}, 92 {"ksk-status", required_argument, NULL, '0'}, 93 {"ksk-roll-status", required_argument, NULL, '0'}, 94 {"ksk-newkey", required_argument, NULL, '1'}, 95 {"ksk-publish", required_argument, NULL, '2'}, 96 {"ksk-delkey", required_argument, NULL, '3'}, 97 {"ksk-roll-phase1", required_argument, NULL, '1'}, 98 {"ksk-roll-phase2", required_argument, NULL, '2'}, 99 {"ksk-roll-phase3", required_argument, NULL, '3'}, 100 {"ksk", no_argumen 458 int ksk; local [all...] |
H A D | dki.c | 240 dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days) argument 251 if ( ksk ) 1191 ** dki_find () find the n'th ksk or zsk key with given status 1193 const dki_t *dki_find (const dki_t *list, int ksk, int status, int no) argument 1200 if ( dki_isksk (dkp) == ksk && dki_status (dkp) == status ) 1210 ** dki_findalgo () find the n'th ksk or zsk key with given 1213 const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no) argument 1220 if ( dki_isksk (dkp) == ksk && dki_algo (dkp) == alg &&
|
H A D | zkt-signer.c | 507 dbg_msg("parsezonedir check rfc 5011 ksk "); 511 verbmesg (2, zp->conf, "\t\t->not a rfc5011 zone, looking for a regular ksk rollover\n"); 513 dbg_msg("parsezonedir check ksk "); 795 int ksk; local 808 ksk = 1; 811 if ( ksk && !dki_isksk (dkp) ) 814 ksk = 0; 980 /* check if special parent-file exist (ksk rollover) */
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/virtual-time/autosign-ksk/ |
H A D | tests.sh | 27 ksk=ns1/`cat ns1/keyname`.key 28 kskpat=`awk '/DNSKEY/ { print $8 }' $ksk`
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | dnssec.h | 63 isc_boolean_t ksk; /*% this is a key-signing key */ member in struct:dns_dnsseckey
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/ |
H A D | dnssec.c | 1110 dk->ksk = ISC_TF((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) != 0); 1587 key->ksk ? (allzsk ? "KSK/ZSK" : "KSK") : "ZSK", 1746 key1->ksk = ISC_TRUE;
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/autosign/ |
H A D | tests.sh | 863 ksk=`cat delayksk.key` 866 $SETTIME -K ns3 -pA -pP $ksk | grep -v UNSET > /dev/null 2>&1 && ret=1 877 $SETTIME -K ns3 -P now+3s -A none $ksk > /dev/null 2>&1 895 $SETTIME -K ns3 -A now+3s $ksk > /dev/null 2>&1
|
/macosx-10.10.1/bind9-45.101/bind9/bin/dnssec/ |
H A D | dnssec-signzone.c | 264 return (key->ksk); 269 return (ignore_kskflag || !key->ksk); 2896 key->ksk = ISC_TRUE;
|