HomeSort by: relevance | last modified time | path
    Searched refs:zone (Results 1 - 25 of 1426) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/mpl/bind/dist/bin/tests/system/checkconf/
bad-rpz-too-many-zones.conf 16 zone "max1";
17 zone "max2";
18 zone "max3";
19 zone "max4";
20 zone "max5";
21 zone "max6";
22 zone "max7";
23 zone "max8";
24 zone "max9";
25 zone "max10"
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/rpzrecurse/ns2/
named.max.conf 18 zone "." {
25 zone "max1";
26 zone "max2";
27 zone "max3";
28 zone "max4";
29 zone "max5";
30 zone "max6";
31 zone "max7";
32 zone "max8";
33 zone "max9"
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/nsupdate/
update_test.pl 19 # perl update_test.pl [-s server] [-p port] zone
25 # zone has no NS records to begin with, or alternatively has a
27 # the zone name).
53 "usage: perl update_test.pl [-s server] [-p port] zone\n";
55 $zone = shift @ARGV;
70 my $update = new Net::DNS::Update("$zone");
94 test("NOERROR", ["update", rr_del("a.$zone")]);
95 test("NOERROR", ["update", rr_del("b.$zone")]);
96 test("NOERROR", ["update", rr_del("c.$zone")]);
97 test("NOERROR", ["update", rr_del("d.$zone")]);
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/checkconf-keys/
setup.sh 22 zone="default.example"
23 cp template.db.in "${zone}.db"
24 $KEYGEN -a 13 -fK $zone 2>keygen.out.$zone.1
26 zone="bad-default-kz.example"
27 cp template.db.in "${zone}.db"
28 $KEYGEN -a 13 -fK $zone 2>keygen.out.$zone.1
29 $KEYGEN -a 13 $zone 2>keygen.out.$zone.
    [all...]
bad-default-algorithm.conf.j2 14 zone "bad-default-algorithm.example" {
bad-default-kz.conf.j2 14 zone "bad-default-kz.example" {
  /src/external/mpl/bind/dist/bin/tests/system/kasp/ns2/
setup.sh 19 zone="secondary.kasp"
20 echo_i "setting up zone: $zone"
21 zonefile="${zone}.db"
25 zone="signed.tld"
26 echo_i "setting up zone: $zone"
27 zonefile="${zone}.db"
31 zone="unsigned.tld"
32 echo_i "setting up zone: $zone
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/emptyzones/ns1/
rfc1918.zones 14 zone "10.IN-ADDR.ARPA" { type primary; file "empty.db"; };
15 zone "16.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
16 zone "17.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
17 zone "18.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
18 zone "19.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
19 zone "20.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
20 zone "21.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
21 zone "22.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
22 zone "23.172.IN-ADDR.ARPA" { type primary; file "empty.db"; };
23 zone "24.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }
    [all...]
  /src/external/cddl/osnet/include/
zone.h 1 /* $NetBSD: zone.h,v 1.3 2010/02/21 01:46:34 darran Exp $ */
35 #include <sys/zone.h>
  /src/external/mpl/bind/dist/bin/tests/system/multisigner/ns5/
setup.sh 19 zone="model2.secondary"
20 echo_i "setting up zone: $zone"
21 zonefile="${zone}.db"
  /src/external/mpl/bind/dist/bin/tests/system/nsec3/ns2/
setup.sh 19 zone="nsec3-xfr-inline.kasp"
20 echo_i "setting up zone: $zone"
21 zonefile="${zone}.db"
  /src/external/bsd/nsd/dist/
nsec3.h 17 struct zone;
24 * calculate prehash information for zone.
26 void prehash_zone(struct namedb* db, struct zone* zone);
28 * calculate prehash for zone, assumes no partial precompile or prehashlist
30 void prehash_zone_complete(struct namedb* db, struct zone* zone);
36 int nsec3_find_cover(struct zone* zone, uint8_t* hash, size_t hashlen,
72 * pass nonNULL zone to filter for particular zone
    [all...]
xfrd-notify.c 23 static void notify_enable(struct notify_zone* zone,
26 static void setup_notify_active(struct notify_zone* zone);
28 /* handle zone notify send */
31 static int xfrd_notify_send_udp(struct notify_zone* zone, int index);
34 notify_send_disable(struct notify_zone* zone)
36 zone->notify_send_enable = 0;
37 event_del(&zone->notify_send_handler);
38 if(zone->notify_send_handler.ev_fd != -1) {
39 close(zone->notify_send_handler.ev_fd);
40 zone->notify_send_handler.ev_fd = -1
426 struct notify_zone* zone = (struct notify_zone*)arg; local
544 struct notify_zone* zone = (struct notify_zone*) local
558 struct notify_zone* zone = (struct notify_zone*) local
574 struct notify_zone* zone; local
    [all...]
dbaccess.c 51 /** create a zone */
56 zone_type* zone = (zone_type *) region_alloc(db->region, local
58 zone->node = radname_insert(db->zonetree, dname_name(dname),
59 dname->name_size, zone);
60 assert(zone->node);
61 zone->apex = domain_table_insert(db->domains, dname);
62 zone->apex->usage++; /* the zone.apex reference */
63 zone->apex->is_apex = 1;
64 zone->soa_rrset = NULL
370 zone_type* zone; local
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/chain/ns2/
named.conf.j2 29 zone . {
34 zone "example" {
40 zone "sub2.example" {
45 zone "signed-sub2.example" {
50 zone "wildcard-secure.example" {
55 zone "wildcard-nsec.example" {
60 zone "wildcard-nsec3.example" {
65 zone "wildcard-nsec3-optout.example" {
70 zone "domain0.nil" { type primary; file "generic.db"; };
71 zone "domain1.nil" { type primary; file "generic.db"; }
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/inline/ns3/
sign.sh 17 unsupportedkey=$("$KEYGEN" -q -a "$DEFAULT_ALGORITHM" -b "$DEFAULT_BITS" -n zone unsupported)
21 zone=bits
22 rm -f K${zone}.+*+*.key
23 rm -f K${zone}.+*+*.private
24 keyname=$($KEYGEN -q -a ${DEFAULT_ALGORITHM} -n zone $zone)
25 keyname=$($KEYGEN -q -a ${DEFAULT_ALGORITHM} -n zone -f KSK $zone)
28 zone=noixfr
29 rm -f K${zone}.+*+*.ke
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/rpz/
dnsrps.zones.j2 18 # configure NOTIFY and zone transfers
23 zone "bl0" {type primary; file "../ns5/bl.db"; };
24 zone "bl1" {type primary; file "../ns5/bl.db"; };
25 zone "bl2" {type primary; file "../ns5/bl.db"; };
26 zone "bl3" {type primary; file "../ns5/bl.db"; };
27 zone "bl4" {type primary; file "../ns5/bl.db"; };
28 zone "bl5" {type primary; file "../ns5/bl.db"; };
29 zone "bl6" {type primary; file "../ns5/bl.db"; };
30 zone "bl7" {type primary; file "../ns5/bl.db"; };
31 zone "bl8" {type primary; file "../ns5/bl.db"; }
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/addzone/ns2/
default.nzf.in 14 zone previous.example { type primary; file "previous.db"; };
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/ns3/
sign-rsasha1-1024.sh 15 # version of the zone to test with in FIPS mode. This requires a non
20 zone=rsasha1-1024.example
21 k1=$("$KEYGEN" -a rsasha1 -b 1024 $zone)
22 k2=$("$KEYGEN" -a rsasha1 -b 1024 -f KSK $zone)
23 cat $zone.db.in $k1.key $k2.key >$zone.tmp
26 "$SIGNER" -e +2147480047 -o $zone -f $zone.db -O full $zone.tmp
27 rm -f $k1.key $k1.private $k2.key $k2.private $zone.tm
    [all...]
sign-rsasha1.sh 15 # version of the zone to test with in FIPS mode. This requires a non
20 zone=rsasha1.example
21 k1=$("$KEYGEN" -a rsasha1 $zone)
22 k2=$("$KEYGEN" -a rsasha1 -f KSK $zone)
23 cat $zone.db.in $k1.key $k2.key >$zone.tmp
26 "$SIGNER" +2147480047 -o $zone -f $zone.db -O full $zone.tmp
27 rm -f $k1.key $k1.private $k2.key $k2.private $zone.tm
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/inline/ns7/
sign.sh 19 zone=nsec3-loop
20 rm -f K${zone}.+*+*.key
21 rm -f K${zone}.+*+*.private
22 keyname=$($KEYGEN -q -a RSASHA256 -b 4096 -n zone $zone)
23 keyname=$($KEYGEN -q -a RSASHA256 -b 2048 -n zone $zone)
24 keyname=$($KEYGEN -q -a RSASHA256 -b 2048 -n zone -f KSK $zone)
  /src/external/public-domain/tz/dist/
checknow.awk 5 function record_zone(zone, data) {
6 if (zone) {
7 zone_data[zone] = data
8 zones[data] = zones[data] " " zone
15 record_zone(zone, data)
16 zone = $0
17 sub(/.*\.ckd\//, "", zone)
18 sub(/\/\//, "/", zone)
19 sub(/"/, "", zone)
24 record_zone(zone, data
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/
named-fips.conf.j2 17 zone "default.kasp" {
23 /* A zone with special characters. */
24 zone {% raw %}"i-am.\":\;?&[]\@!\$*+,|=\.\(\)special.kasp."{% endraw %} {
31 /* checkds: Zone with one KSK. */
32 zone "checkds-ksk.kasp" {
38 /* checkds: Zone with two KSKs. */
39 zone "checkds-doubleksk.kasp" {
45 /* checkds: Zone with one CSK. */
46 zone "checkds-csk.kasp" {
53 zone "unlimited.kasp"
    [all...]
named-rsasha1.conf.j2 14 zone "rsasha1.kasp" {
20 zone "rsasha1-nsec3.kasp" {
  /src/external/mpl/bind/dist/bin/tests/system/rollover/ns3/
named.conf.j2 17 {% for zone in ['manual-rollover.kasp', 'manual-rollover-zrrsig-rumoured.kasp'] %}
18 zone "@zone@" {
20 file "@zone@.db";

Completed in 32 milliseconds

1 2 3 4 5 6 7 8 91011>>