Searched refs:ksk (Results 1 - 19 of 19) sorted by relevance

/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/pkcs11/
H A Dsetup.sh30 $PK11GEN -b 2048 -l robie-ksk
34 ksk=`$KEYFRLAB -a RSASHA1 -f ksk -l robie-ksk example`
36 cat $infile $zsk1.key $ksk.key > $zonefile
H A Dtests.sh33 count=`$PK11LIST | grep robie-ksk | wc -l`
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/metadata/
H A Dclean.sh20 rm -f zsk.key ksk.key parent.ksk.key parent.zsk.key
H A Dsetup.sh48 # active ksk
49 ksk=`$KEYGEN -q -r $RANDFILE -fk $czone`
50 echo $ksk > ksk.key
67 echo $pksk > parent.ksk.key
H A Dtests.sh32 ksk=`sed 's/^K'${czone}'.+005+0*\([0-9]\)/\1/' < ksk.key`
65 grep "DNSKEY $ksk"'$' sigs > /dev/null || ret=1
66 grep "SOA $ksk"'$' sigs > /dev/null && ret=1
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/resolver/ns6/
H A Dkeygen.sh28 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone`
30 cat $ksk.key $zsk.key >> $zonefile
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/autosign/ns3/
H A Dkeygen.sh28 ksk=`$KEYGEN -3 -q -r $RANDFILE -fk $zone`
30 $DSFROMKEY $ksk.key > dsset-${zone}.
39 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone`
41 $DSFROMKEY $ksk.key > dsset-${zone}.
50 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone`
52 $DSFROMKEY $ksk.key > dsset-${zone}.
61 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone`
63 $DSFROMKEY $ksk.key > dsset-${zone}.
72 ksk=`$KEYGEN -q -3 -r $RANDFILE -fk $zone`
74 $DSFROMKEY $ksk
[all...]
/macosx-10.10.1/bind9-45.101/bind9/contrib/zkt/
H A Dzkt.c275 int ksk; local
283 ksk = dki_isksk (dkp);
284 if ( (ksk && !kskflag) || (!ksk && !zskflag) )
303 int ksk;
307 ksk = dki_isksk (dkp);
308 if ( (ksk && !kskflag) || (!ksk && !zskflag) )
325 int ksk; local
333 ksk
[all...]
H A Drollover.c65 static dki_t *genkey (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument
72 if ( ksk )
82 static dki_t *genkey2 (dki_t **listp, const char *dir, const char *domain, int ksk, const zconf_t *conf, int status) argument
89 if ( ksk )
224 static int kskrollover (dki_t *ksk, zone_t *zonelist, zone_t *zp) argument
238 assert ( ksk != NULL );
242 /* check ksk lifetime */
243 if ( (lifetime = dki_lifetime (ksk)) == 0 ) /* if lifetime of key is not set.. */
247 age = dki_age (ksk, currtime);
252 /* check if we have to change the ksk
[all...]
H A Ddki.h179 extern dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days);
187 extern const dki_t *dki_find (const dki_t *list, int ksk, int status, int first);
188 extern const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no);
H A Ddnssec-zkt.c92 {"ksk-rollover", no_argument, NULL, '9'},
93 {"ksk-status", required_argument, NULL, '0'},
94 {"ksk-roll-status", required_argument, NULL, '0'},
95 {"ksk-newkey", required_argument, NULL, '1'},
96 {"ksk-publish", required_argument, NULL, '2'},
97 {"ksk-delkey", required_argument, NULL, '3'},
98 {"ksk-roll-phase1", required_argument, NULL, '1'},
99 {"ksk-roll-phase2", required_argument, NULL, '2'},
100 {"ksk-roll-phase3", required_argument, NULL, '3'},
103 {"ksk", no_argumen
551 int ksk; local
[all...]
H A Dzkt-keyman.c91 {"ksk-rollover", no_argument, NULL, '9'},
92 {"ksk-status", required_argument, NULL, '0'},
93 {"ksk-roll-status", required_argument, NULL, '0'},
94 {"ksk-newkey", required_argument, NULL, '1'},
95 {"ksk-publish", required_argument, NULL, '2'},
96 {"ksk-delkey", required_argument, NULL, '3'},
97 {"ksk-roll-phase1", required_argument, NULL, '1'},
98 {"ksk-roll-phase2", required_argument, NULL, '2'},
99 {"ksk-roll-phase3", required_argument, NULL, '3'},
100 {"ksk", no_argumen
458 int ksk; local
[all...]
H A Ddki.c240 dki_t *dki_new (const char *dir, const char *name, int ksk, int algo, int bitsize, const char *rfile, int lf_days) argument
251 if ( ksk )
1191 ** dki_find () find the n'th ksk or zsk key with given status
1193 const dki_t *dki_find (const dki_t *list, int ksk, int status, int no) argument
1200 if ( dki_isksk (dkp) == ksk && dki_status (dkp) == status )
1210 ** dki_findalgo () find the n'th ksk or zsk key with given
1213 const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no) argument
1220 if ( dki_isksk (dkp) == ksk && dki_algo (dkp) == alg &&
H A Dzkt-signer.c507 dbg_msg("parsezonedir check rfc 5011 ksk ");
511 verbmesg (2, zp->conf, "\t\t->not a rfc5011 zone, looking for a regular ksk rollover\n");
513 dbg_msg("parsezonedir check ksk ");
795 int ksk; local
808 ksk = 1;
811 if ( ksk && !dki_isksk (dkp) )
814 ksk = 0;
980 /* check if special parent-file exist (ksk rollover) */
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/virtual-time/autosign-ksk/
H A Dtests.sh27 ksk=ns1/`cat ns1/keyname`.key
28 kskpat=`awk '/DNSKEY/ { print $8 }' $ksk`
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/include/dns/
H A Ddnssec.h63 isc_boolean_t ksk; /*% this is a key-signing key */ member in struct:dns_dnsseckey
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/
H A Ddnssec.c1110 dk->ksk = ISC_TF((dst_key_flags(dk->key) & DNS_KEYFLAG_KSK) != 0);
1587 key->ksk ? (allzsk ? "KSK/ZSK" : "KSK") : "ZSK",
1746 key1->ksk = ISC_TRUE;
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/autosign/
H A Dtests.sh863 ksk=`cat delayksk.key`
866 $SETTIME -K ns3 -pA -pP $ksk | grep -v UNSET > /dev/null 2>&1 && ret=1
877 $SETTIME -K ns3 -P now+3s -A none $ksk > /dev/null 2>&1
895 $SETTIME -K ns3 -A now+3s $ksk > /dev/null 2>&1
/macosx-10.10.1/bind9-45.101/bind9/bin/dnssec/
H A Ddnssec-signzone.c264 return (key->ksk);
269 return (ignore_kskflag || !key->ksk);
2896 key->ksk = ISC_TRUE;

Completed in 119 milliseconds