Lines Matching defs:algorithm

783 	dns_secalg_t algorithm;
1027 zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, uint16_t keyid,
3480 (dnskey.algorithm == DNS_KEYALG_RSAMD5 ||
3481 dnskey.algorithm == DNS_KEYALG_RSASHA1 ||
3482 dnskey.algorithm == DNS_KEYALG_NSEC3RSASHA1 ||
3483 dnskey.algorithm == DNS_KEYALG_RSASHA256 ||
3484 dnskey.algorithm == DNS_KEYALG_RSASHA512))
3486 char algorithm[DNS_SECALG_FORMATSIZE];
3490 dns_secalg_format(dnskey.algorithm, algorithm,
3491 sizeof(algorithm));
3495 algorithm, dnskey.algorithm,
3965 * For dynamic zones we must support every algorithm so we
3968 * algorithm.
3974 "nsec3 test \"unknown\" hash algorithm "
3981 "unsupported nsec3 hash algorithm"
3991 "algorithm: %u",
4015 "no supported nsec3 hash algorithm");
4625 keydata.protocol == 0 && keydata.algorithm == 0)
6576 if (rrsig_ptr->algorithm != dst_key_alg(keys[i])) {
6620 * same algorithm to replace it, unless that violates the DNSSEC
6635 if ((rrsig_ptr->algorithm == dst_key_alg(keys[i])) &&
6739 * Log the key id and algorithm of
6747 dns_secalg_format(rrsig.algorithm,
6769 if (rrsig.algorithm == dst_key_alg(keys[i]) &&
7387 if (rrsig.algorithm == dst_key_alg(key) &&
7393 if (rrsig.algorithm == dst_key_alg(key)) {
7752 * If we don't match the algorithm or keyid skip the record.
7754 if (rdata.length != 5 || rdata.data[0] != signing->algorithm ||
7792 data[0] = signing->algorithm;
9158 * Delete all RRSIG records with the given algorithm and keyid.
9160 * If all remaining RRsets are signed with the given algorithm
9165 dns_dbnode_t *node, unsigned int nkeys, dns_secalg_t algorithm,
9219 if (nkeys != 0 && (rrsig.algorithm != algorithm ||
9222 if (rrsig.algorithm == algorithm) {
9238 * 'algorithm', set alg_found; if not, set alg_missed.
9251 * Set `has_algp` if the algorithm was found in every RRset:
9521 if (ALG(zone_keys[i]) == signing->algorithm &&
9541 signing->algorithm, signing->keyid,
9596 (dst_key_alg(zone_keys[i]) != signing->algorithm ||
9604 * with the algorithm that was being removed.
9607 ALG(zone_keys[i]) != signing->algorithm)
9681 * of the same algorithm if deleting.
10180 if (dst_key_alg(dstkey) == sig.algorithm &&
10351 ds.algorithm != sig.algorithm)
10381 namebuf, sig.keyid, sig.algorithm,
10441 * This may happen if the algorithm is unsupported
10568 * This may happen if the algorithm is unsupported
16326 dst_key_alg(k->key) != cds.algorithm)
16344 cds.key_tag, cds.algorithm,
20199 dns_zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, uint16_t keyid,
20205 "dns_zone_signwithkey(algorithm=%u, keyid=%u)", algorithm,
20208 result = zone_signwithkey(zone, algorithm, keyid, deleteit);
20284 zone_signwithkey(dns_zone_t *zone, dns_secalg_t algorithm, uint16_t keyid,
20297 signing->algorithm = algorithm;
20321 current->algorithm == signing->algorithm &&
20537 buf[0] = dnskey.algorithm;
20729 * Given an RRSIG rdataset and an algorithm, determine whether there
20730 * are any signatures using that algorithm.
20750 if (rrsig.algorithm == alg) {
21104 /* Check key tag and algorithm. */
21108 if (dst_key_alg(key->key) != ds.algorithm) {
22635 * also, see if any new key is for a new algorithm, as in that
22637 * key, but it's for an already-existing algorithm, then
22656 * This isn't a new algorithm; clear
22769 * algorithm was added to the DNSKEY. We sign
23081 * For each DNSSEC algorithm in the CDS RRset there must be
23113 if (algorithms[structcds.algorithm] == 0) {
23114 algorithms[structcds.algorithm] = expected;
23127 if (structdnskey.algorithm ==
23128 structcds.algorithm)
23130 algorithms[structcds.algorithm] = found;
23151 * For each DNSSEC algorithm in the CDNSKEY RRset there must be
23186 if (algorithms[structcdnskey.algorithm] == 0) {
23187 algorithms[structcdnskey.algorithm] = expected;
23200 if (structdnskey.algorithm ==
23201 structcdnskey.algorithm)
23203 algorithms[structcdnskey.algorithm] =
23881 * algorithm), add the INITIAL flag, so these parameters can be