/systemd-251/src/resolve/ |
D | test-dnssec.c | 54 ds1->ds.algorithm = DNSSEC_ALGORITHM_RSASHA256; in TEST() 66 ds2->ds.algorithm = DNSSEC_ALGORITHM_RSASHA256; in TEST() 79 dnskey->dnskey.algorithm = DNSSEC_ALGORITHM_RSASHA256; in TEST() 121 dnskey->dnskey.algorithm = DNSSEC_ALGORITHM_ED25519; in TEST() 132 ds->ds.algorithm = DNSSEC_ALGORITHM_ED25519; in TEST() 153 rrsig->rrsig.algorithm = DNSSEC_ALGORITHM_ED25519; in TEST() 213 dnskey->dnskey.algorithm = DNSSEC_ALGORITHM_ED25519; in TEST() 224 ds->ds.algorithm = DNSSEC_ALGORITHM_ED25519; in TEST() 245 rrsig->rrsig.algorithm = DNSSEC_ALGORITHM_ED25519; in TEST() 306 dnskey->dnskey.algorithm = DNSSEC_ALGORITHM_ECDSAP256SHA256; in TEST() [all …]
|
D | resolved-dns-trust-anchor.c | 43 uint8_t algorithm, in add_root_ksk() argument 56 rr->ds.algorithm = algorithm; in add_root_ksk() 238 _cleanup_free_ char *key_tag = NULL, *algorithm = NULL, *digest_type = NULL; in dns_trust_anchor_load_positive() local 244 r = extract_many_words(&p, NULL, 0, &key_tag, &algorithm, &digest_type, NULL); in dns_trust_anchor_load_positive() 258 a = dnssec_algorithm_from_string(algorithm); in dns_trust_anchor_load_positive() 260 … log_warning("Failed to parse DS algorithm %s on line %s:%u", algorithm, path, line); in dns_trust_anchor_load_positive() 286 rr->ds.algorithm = a; in dns_trust_anchor_load_positive() 292 _cleanup_free_ char *flags = NULL, *protocol = NULL, *algorithm = NULL; in dns_trust_anchor_load_positive() local 298 r = extract_many_words(&p, NULL, 0, &flags, &protocol, &algorithm, NULL); in dns_trust_anchor_load_positive() 323 a = dnssec_algorithm_from_string(algorithm); in dns_trust_anchor_load_positive() [all …]
|
D | resolved-dns-dnssec.c | 58 … sum = f + ((((uint32_t) dnskey->dnskey.protocol) << 8) + (uint32_t) dnskey->dnskey.algorithm); in dnssec_keytag() 451 int algorithm, in dnssec_ecdsa_verify() argument 465 if (algorithm == DNSSEC_ALGORITHM_ECDSAP256SHA256) { in dnssec_ecdsa_verify() 468 } else if (algorithm == DNSSEC_ALGORITHM_ECDSAP384SHA384) { in dnssec_ecdsa_verify() 602 int algorithm, in dnssec_eddsa_verify() argument 609 if (algorithm == DNSSEC_ALGORITHM_ED25519) { in dnssec_eddsa_verify() 749 static hash_md_t algorithm_to_implementation_id(uint8_t algorithm) { in algorithm_to_implementation_id() argument 757 switch (algorithm) { in algorithm_to_implementation_id() 831 fwrite_uint8(f, rrsig->rrsig.algorithm); in dnssec_rrset_serialize_sig() 903 switch (rrsig->rrsig.algorithm) { in dnssec_rrset_verify_sig() [all …]
|
D | resolved-dns-rr.c | 634 a->ds.algorithm == b->ds.algorithm && in dns_resource_record_payload_equal() 639 return a->sshfp.algorithm == b->sshfp.algorithm && in dns_resource_record_payload_equal() 646 a->dnskey.algorithm == b->dnskey.algorithm && in dns_resource_record_payload_equal() 652 a->rrsig.algorithm == b->rrsig.algorithm && in dns_resource_record_payload_equal() 666 return a->nsec3.algorithm == b->nsec3.algorithm && in dns_resource_record_payload_equal() 937 rr->ds.algorithm, in dns_resource_record_to_string() 951 rr->sshfp.algorithm, in dns_resource_record_to_string() 964 r = dnssec_algorithm_to_string_alloc(rr->dnskey.algorithm, &alg); in dns_resource_record_to_string() 1003 r = dnssec_algorithm_to_string_alloc(rr->rrsig.algorithm, &alg); in dns_resource_record_to_string() 1073 rr->nsec3.algorithm, in dns_resource_record_to_string() [all …]
|
D | resolved-dns-rr.h | 178 uint8_t algorithm; member 189 uint8_t algorithm; member 199 uint8_t algorithm; member 219 uint8_t algorithm; member 230 uint8_t algorithm; member
|
D | resolved-dns-packet.c | 1031 r = dns_packet_append_uint8(p, rr->ds.algorithm, NULL); in dns_packet_append_rr() 1043 r = dns_packet_append_uint8(p, rr->sshfp.algorithm, NULL); in dns_packet_append_rr() 1063 r = dns_packet_append_uint8(p, rr->dnskey.algorithm, NULL); in dns_packet_append_rr() 1075 r = dns_packet_append_uint8(p, rr->rrsig.algorithm, NULL); in dns_packet_append_rr() 1118 r = dns_packet_append_uint8(p, rr->nsec3.algorithm, NULL); in dns_packet_append_rr() 1885 r = dns_packet_read_uint8(p, &rr->ds.algorithm, NULL); in dns_packet_read_rr() 1910 r = dns_packet_read_uint8(p, &rr->sshfp.algorithm, NULL); in dns_packet_read_rr() 1941 r = dns_packet_read_uint8(p, &rr->dnskey.algorithm, NULL); in dns_packet_read_rr() 1964 r = dns_packet_read_uint8(p, &rr->rrsig.algorithm, NULL); in dns_packet_read_rr() 2030 r = dns_packet_read_uint8(p, &rr->nsec3.algorithm, NULL); in dns_packet_read_rr()
|
/systemd-251/test/units/ |
D | testsuite-67.sh | 33 ${DM_NAME} ${loop} - integrity-algorithm=$1 51 for algorithm in crc32c crc32 sha1 sha256 53 integritysetup format "${loop}" --batch-mode -I "${algorithm}" || exit 1 54 integritysetup open -I "${algorithm}" "${loop}" "${DM_NAME}" || exit 1 63 build_integrity_tab ${algorithm}
|
/systemd-251/src/shared/ |
D | tpm2-util.c | 286 .algorithm = TPM2_ALG_AES, in tpm2_make_primary() 306 .algorithm = TPM2_ALG_AES, in tpm2_make_primary() 609 .algorithm = TPM2_ALG_AES, in tpm2_make_encryption_session() 676 .algorithm = TPM2_ALG_AES, in tpm2_make_pcr_session()
|
/systemd-251/docs/ |
D | TEMPORARY_DIRECTORIES.md | 120 algorithm will skip all directories (and everything below them) that are 128 candidates for deletion by the ageing algorithm. The 136 ("atime") of all files that shall be kept around. Since the ageing algorithm
|
D | PASSWORD_AGENTS.md | 19 It is easy to write additional agents. The basic algorithm to follow looks like this:
|
D | JOURNAL_FILE_FORMAT.md | 272 algorithm. And HEADER_INCOMPATIBLE_COMPRESSED_ZSTD indicates that there are 427 compression algorithm.
|
D | CGROUP_DELEGATION.md | 482 5. ⚡ Currently, the algorithm for mapping between slice/scope/service unit
|
D | USER_RECORD.md | 488 `luksPbkdfHashAlgorithm` → A string, selecting the hash algorithm to use for
|
/systemd-251/shell-completion/bash/ |
D | homectl | 95 --luks-pbkdf-hash-algorithm
|
/systemd-251/catalog/ |
D | systemd.catalog.in | 460 the system. For that a simple escaping algorithm is applied: the absolute path
|
/systemd-251/ |
D | meson_options.txt | 415 description : 'default compression algorithm')
|
D | NEWS | 479 * A new switch --fido2-credential-algorithm= has been added to 480 systemd-cryptenroll allowing selection of the credential algorithm to 540 default compression algorithm used by systemd-journald and systemd-coredump. 970 address with the EUI64 algorithm based on the interface MAC address. 3561 the zstd algorithm. 6313 were always excluded from the file "aging" algorithm (i.e. the 10432 turning off Nagle's algorithm on TCP has been added
|