/netbsd-current/external/mpl/bind/dist/tests/dns/ |
H A D | keytable_test.c | 212 dns_keynode_t *keynode = NULL; local 224 * Getting the keynode for the example.com key should succeed. 227 dns_keytable_find(keytable, str2name("example.com"), &keynode), 239 dns_keytable_detachkeynode(keytable, &keynode); 241 dns_keytable_find(keytable, str2name("example.com"), &keynode), 245 dns_keytable_detachkeynode(keytable, &keynode); 251 dns_keytable_find(keytable, str2name("example.com"), &keynode), 253 dns_keytable_detachkeynode(keytable, &keynode); 256 * Get the keynode for the managed.com key. Ensure the 261 dns_keytable_find(keytable, str2name("managed.com"), &keynode), 465 dns_keynode_t *keynode = NULL; local [all...] |
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
H A D | keytable.h | 114 * Add a key to 'keytable'. The keynode associated with 'name' 117 * The value of keynode->managed is set to 'managed', and the 118 * value of keynode->initial is set to 'initial'. (Note: 'initial' 122 * has validated, we update the keynode with initial == false.) 257 * Detach a keynode found via dns_keytable_find(). 261 *\li *keynodep is a valid keynode returned by a call to dns_keytable_find(). 311 dns_keynode_dsset(dns_keynode_t *keynode, dns_rdataset_t *rdataset); 313 * Clone the DS RRset associated with 'keynode' into 'rdataset' if 322 *\li 'keynode' is valid. 327 dns_keynode_managed(dns_keynode_t *keynode); [all...] |
/netbsd-current/external/mpl/bind/dist/lib/dns/include/dns/ |
H A D | keytable.h | 116 * Add a key to 'keytable'. The keynode associated with 'name' 119 * The value of keynode->managed is set to 'managed', and the 120 * value of keynode->initial is set to 'initial'. (Note: 'initial' 124 * has validated, we update the keynode with initial == false.) 260 * Detach a keynode found via dns_keytable_find(). 264 *\li *keynodep is a valid keynode returned by a call to dns_keytable_find(). 314 dns_keynode_dsset(dns_keynode_t *keynode, dns_rdataset_t *rdataset); 316 * Clone the DS RRset associated with 'keynode' into 'rdataset' if 325 *\li 'keynode' is valid. 330 dns_keynode_managed(dns_keynode_t *keynode); [all...] |
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | keytable.c | 138 dns_keynode_t *keynode = node; local 141 keynode_detach(mctx, &keynode); 330 * Create a keynode for "ds" (or a null key node if "ds" is NULL), set 331 * "managed" and "initial" as requested and attach the keynode to 568 * Give back a keynode found via dns_keytable_findkeynode(). 651 keynode_dslist_totext(dns_name_t *name, dns_keynode_t *keynode, argument 661 if (!dns_keynode_dsset(keynode, &dsset)) { 678 RWLOCK(&keynode->rwlock, isc_rwlocktype_read); 681 keynode->initial ? "initializing " : "", 682 keynode 804 dns_keynode_dsset(dns_keynode_t *keynode, dns_rdataset_t *rdataset) argument 823 dns_keynode_managed(dns_keynode_t *keynode) argument 836 dns_keynode_initial(dns_keynode_t *keynode) argument 849 dns_keynode_trust(dns_keynode_t *keynode) argument 859 dns_keynode_t *keynode; local 873 dns_keynode_t *keynode; local 892 dns_keynode_t *keynode; local 930 dns_keynode_t *keynode; local [all...] |
H A D | zoneverify.c | 1449 dns_keynode_t *keynode = NULL; local 1503 * If we don't find an exact match, or if the keynode data 1507 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); 1514 * If the keynode has any DS format trust anchors, that means 1519 if (dns_keynode_dsset(keynode, &dsset)) { 1562 if (keynode != NULL) { 1563 dns_keytable_detachkeynode(vctx->secroots, &keynode);
|
H A D | validator.c | 1805 dns_keynode_t *keynode = NULL; local 1816 &keynode); 1818 if (dns_keynode_dsset(keynode, &val->fdsset)) { 1821 dns_keytable_detachkeynode(val->keytable, &keynode);
|
H A D | zone.c | 4149 * If keynode references a key or a DS rdataset, and if the key 4159 dns_diff_t *diff, dns_keynode_t *keynode, dns_name_t *keyname, 4169 REQUIRE(keynode != NULL); 4175 * If the keynode has no trust anchor set, we shouldn't be here. 4177 if (!dns_keynode_dsset(keynode, NULL)) { 4560 addifmissing(dns_keytable_t *keytable, dns_keynode_t *keynode, argument 4576 if (!dns_keynode_managed(keynode)) { 4581 * If the keynode has no trust anchor set, return. 4583 if (!dns_keynode_dsset(keynode, NULL)) { 4602 result = create_keydata(zone, db, ver, diff, keynode, keynam 4158 create_keydata(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_diff_t *diff, dns_keynode_t *keynode, dns_name_t *keyname, bool *changed) argument 4624 dns_keynode_t *keynode = NULL; local 10422 dns_keynode_t *keynode = NULL; local [all...] |
/netbsd-current/external/mpl/bind/dist/lib/dns/ |
H A D | keytable.c | 138 dns_keynode_t *keynode = node; local 141 keynode_detach(mctx, &keynode); 330 * Create a keynode for "ds" (or a null key node if "ds" is NULL), set 331 * "managed" and "initial" as requested and attach the keynode to 581 * Give back a keynode found via dns_keytable_findkeynode(). 664 keynode_dslist_totext(dns_name_t *name, dns_keynode_t *keynode, argument 674 if (!dns_keynode_dsset(keynode, &dsset)) { 691 RWLOCK(&keynode->rwlock, isc_rwlocktype_read); 694 keynode->initial ? "initializing " : "", 695 keynode 817 dns_keynode_dsset(dns_keynode_t *keynode, dns_rdataset_t *rdataset) argument 836 dns_keynode_managed(dns_keynode_t *keynode) argument 849 dns_keynode_initial(dns_keynode_t *keynode) argument 862 dns_keynode_trust(dns_keynode_t *keynode) argument 872 dns_keynode_t *keynode; local 886 dns_keynode_t *keynode; local 905 dns_keynode_t *keynode; local 943 dns_keynode_t *keynode; local [all...] |
H A D | zoneverify.c | 1448 dns_keynode_t *keynode = NULL; local 1502 * If we don't find an exact match, or if the keynode data 1506 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); 1513 * If the keynode has any DS format trust anchors, that means 1518 if (dns_keynode_dsset(keynode, &dsset)) { 1561 if (keynode != NULL) { 1562 dns_keytable_detachkeynode(vctx->secroots, &keynode);
|
H A D | validator.c | 1805 dns_keynode_t *keynode = NULL; local 1816 &keynode); 1818 if (dns_keynode_dsset(keynode, &val->fdsset)) { 1821 dns_keytable_detachkeynode(val->keytable, &keynode);
|
H A D | zone.c | 4178 * If keynode references a key or a DS rdataset, and if the key 4188 dns_diff_t *diff, dns_keynode_t *keynode, dns_name_t *keyname, 4198 REQUIRE(keynode != NULL); 4204 * If the keynode has no trust anchor set, we shouldn't be here. 4206 if (!dns_keynode_dsset(keynode, NULL)) { 4607 addifmissing(dns_keytable_t *keytable, dns_keynode_t *keynode, argument 4623 if (!dns_keynode_managed(keynode)) { 4628 * If the keynode has no trust anchor set, return. 4630 if (!dns_keynode_dsset(keynode, NULL)) { 4649 result = create_keydata(zone, db, ver, diff, keynode, keynam 4187 create_keydata(dns_zone_t *zone, dns_db_t *db, dns_dbversion_t *ver, dns_diff_t *diff, dns_keynode_t *keynode, dns_name_t *keyname, bool *changed) argument 4671 dns_keynode_t *keynode = NULL; local 10416 dns_keynode_t *keynode = NULL; local [all...] |
/netbsd-current/external/mpl/bind/dist/lib/ns/ |
H A D | query.c | 7559 dns_keynode_t *keynode = NULL; local 7569 result = dns_keytable_find(keytable, dns_rootname, &keynode); 7571 if (keynode != NULL) { 7572 dns_keytable_detachkeynode(keytable, &keynode); 7579 if (dns_keynode_dsset(keynode, &dsset)) { 7592 dns_keytable_detachkeynode(keytable, &keynode); 7601 if (keynode != NULL) { 7602 dns_keytable_detachkeynode(keytable, &keynode);
|
/netbsd-current/external/mpl/bind/dist/bin/named/ |
H A D | server.c | 1042 dns_keynode_t *keynode = NULL; local 1049 result = dns_keytable_find(secroots, name, &keynode); 1051 if (keynode != NULL) { 1052 dns_keytable_detachkeynode(secroots, &keynode); 7174 * anchors present at 'keynode' of 'keytable'. Store the result in 'dst' and 7175 * the domain name which 'keynode' is associated with in 'origin'. 7179 * more than 12 keys configured at 'keynode', only the first 12 will be 7183 get_tat_qname(dns_name_t *target, dns_name_t *keyname, dns_keynode_t *keynode) { argument 7192 if (dns_keynode_dsset(keynode, &dsset)) { 7329 dotat(dns_keytable_t *keytable, dns_keynode_t *keynode, dns_name_ argument [all...] |