| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-rpz-too-many-zones.conf | 16 zone "max1"; 17 zone "max2"; 18 zone "max3"; 19 zone "max4"; 20 zone "max5"; 21 zone "max6"; 22 zone "max7"; 23 zone "max8"; 24 zone "max9"; 25 zone "max10" [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/rpzrecurse/ns2/ |
| named.max.conf | 18 zone "." { 25 zone "max1"; 26 zone "max2"; 27 zone "max3"; 28 zone "max4"; 29 zone "max5"; 30 zone "max6"; 31 zone "max7"; 32 zone "max8"; 33 zone "max9" [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/nsupdate/ |
| update_test.pl | 19 # perl update_test.pl [-s server] [-p port] zone 25 # zone has no NS records to begin with, or alternatively has a 27 # the zone name). 53 "usage: perl update_test.pl [-s server] [-p port] zone\n"; 55 $zone = shift @ARGV; 70 my $update = new Net::DNS::Update("$zone"); 94 test("NOERROR", ["update", rr_del("a.$zone")]); 95 test("NOERROR", ["update", rr_del("b.$zone")]); 96 test("NOERROR", ["update", rr_del("c.$zone")]); 97 test("NOERROR", ["update", rr_del("d.$zone")]); [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/checkconf-keys/ |
| setup.sh | 22 zone="default.example" 23 cp template.db.in "${zone}.db" 24 $KEYGEN -a 13 -fK $zone 2>keygen.out.$zone.1 26 zone="bad-default-kz.example" 27 cp template.db.in "${zone}.db" 28 $KEYGEN -a 13 -fK $zone 2>keygen.out.$zone.1 29 $KEYGEN -a 13 $zone 2>keygen.out.$zone. [all...] |
| bad-default-algorithm.conf.j2 | 14 zone "bad-default-algorithm.example" {
|
| bad-default-kz.conf.j2 | 14 zone "bad-default-kz.example" {
|
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ns2/ |
| setup.sh | 19 zone="secondary.kasp" 20 echo_i "setting up zone: $zone" 21 zonefile="${zone}.db" 25 zone="signed.tld" 26 echo_i "setting up zone: $zone" 27 zonefile="${zone}.db" 31 zone="unsigned.tld" 32 echo_i "setting up zone: $zone [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/emptyzones/ns1/ |
| rfc1918.zones | 14 zone "10.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 15 zone "16.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 16 zone "17.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 17 zone "18.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 18 zone "19.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 19 zone "20.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 20 zone "21.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 21 zone "22.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 22 zone "23.172.IN-ADDR.ARPA" { type primary; file "empty.db"; }; 23 zone "24.172.IN-ADDR.ARPA" { type primary; file "empty.db"; } [all...] |
| /src/external/cddl/osnet/include/ |
| zone.h | 1 /* $NetBSD: zone.h,v 1.3 2010/02/21 01:46:34 darran Exp $ */ 35 #include <sys/zone.h>
|
| /src/external/mpl/bind/dist/bin/tests/system/multisigner/ns5/ |
| setup.sh | 19 zone="model2.secondary" 20 echo_i "setting up zone: $zone" 21 zonefile="${zone}.db"
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3/ns2/ |
| setup.sh | 19 zone="nsec3-xfr-inline.kasp" 20 echo_i "setting up zone: $zone" 21 zonefile="${zone}.db"
|
| /src/external/bsd/nsd/dist/ |
| nsec3.h | 17 struct zone; 24 * calculate prehash information for zone. 26 void prehash_zone(struct namedb* db, struct zone* zone); 28 * calculate prehash for zone, assumes no partial precompile or prehashlist 30 void prehash_zone_complete(struct namedb* db, struct zone* zone); 36 int nsec3_find_cover(struct zone* zone, uint8_t* hash, size_t hashlen, 72 * pass nonNULL zone to filter for particular zone [all...] |
| xfrd-notify.c | 23 static void notify_enable(struct notify_zone* zone, 26 static void setup_notify_active(struct notify_zone* zone); 28 /* handle zone notify send */ 31 static int xfrd_notify_send_udp(struct notify_zone* zone, int index); 34 notify_send_disable(struct notify_zone* zone) 36 zone->notify_send_enable = 0; 37 event_del(&zone->notify_send_handler); 38 if(zone->notify_send_handler.ev_fd != -1) { 39 close(zone->notify_send_handler.ev_fd); 40 zone->notify_send_handler.ev_fd = -1 426 struct notify_zone* zone = (struct notify_zone*)arg; local 544 struct notify_zone* zone = (struct notify_zone*) local 558 struct notify_zone* zone = (struct notify_zone*) local 574 struct notify_zone* zone; local [all...] |
| dbaccess.c | 51 /** create a zone */ 56 zone_type* zone = (zone_type *) region_alloc(db->region, local 58 zone->node = radname_insert(db->zonetree, dname_name(dname), 59 dname->name_size, zone); 60 assert(zone->node); 61 zone->apex = domain_table_insert(db->domains, dname); 62 zone->apex->usage++; /* the zone.apex reference */ 63 zone->apex->is_apex = 1; 64 zone->soa_rrset = NULL 370 zone_type* zone; local [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/chain/ns2/ |
| named.conf.j2 | 29 zone . { 34 zone "example" { 40 zone "sub2.example" { 45 zone "signed-sub2.example" { 50 zone "wildcard-secure.example" { 55 zone "wildcard-nsec.example" { 60 zone "wildcard-nsec3.example" { 65 zone "wildcard-nsec3-optout.example" { 70 zone "domain0.nil" { type primary; file "generic.db"; }; 71 zone "domain1.nil" { type primary; file "generic.db"; } [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/inline/ns3/ |
| sign.sh | 17 unsupportedkey=$("$KEYGEN" -q -a "$DEFAULT_ALGORITHM" -b "$DEFAULT_BITS" -n zone unsupported) 21 zone=bits 22 rm -f K${zone}.+*+*.key 23 rm -f K${zone}.+*+*.private 24 keyname=$($KEYGEN -q -a ${DEFAULT_ALGORITHM} -n zone $zone) 25 keyname=$($KEYGEN -q -a ${DEFAULT_ALGORITHM} -n zone -f KSK $zone) 28 zone=noixfr 29 rm -f K${zone}.+*+*.ke [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/rpz/ |
| dnsrps.zones.j2 | 18 # configure NOTIFY and zone transfers 23 zone "bl0" {type primary; file "../ns5/bl.db"; }; 24 zone "bl1" {type primary; file "../ns5/bl.db"; }; 25 zone "bl2" {type primary; file "../ns5/bl.db"; }; 26 zone "bl3" {type primary; file "../ns5/bl.db"; }; 27 zone "bl4" {type primary; file "../ns5/bl.db"; }; 28 zone "bl5" {type primary; file "../ns5/bl.db"; }; 29 zone "bl6" {type primary; file "../ns5/bl.db"; }; 30 zone "bl7" {type primary; file "../ns5/bl.db"; }; 31 zone "bl8" {type primary; file "../ns5/bl.db"; } [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/addzone/ns2/ |
| default.nzf.in | 14 zone previous.example { type primary; file "previous.db"; };
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec/ns3/ |
| sign-rsasha1-1024.sh | 15 # version of the zone to test with in FIPS mode. This requires a non 20 zone=rsasha1-1024.example 21 k1=$("$KEYGEN" -a rsasha1 -b 1024 $zone) 22 k2=$("$KEYGEN" -a rsasha1 -b 1024 -f KSK $zone) 23 cat $zone.db.in $k1.key $k2.key >$zone.tmp 26 "$SIGNER" -e +2147480047 -o $zone -f $zone.db -O full $zone.tmp 27 rm -f $k1.key $k1.private $k2.key $k2.private $zone.tm [all...] |
| sign-rsasha1.sh | 15 # version of the zone to test with in FIPS mode. This requires a non 20 zone=rsasha1.example 21 k1=$("$KEYGEN" -a rsasha1 $zone) 22 k2=$("$KEYGEN" -a rsasha1 -f KSK $zone) 23 cat $zone.db.in $k1.key $k2.key >$zone.tmp 26 "$SIGNER" +2147480047 -o $zone -f $zone.db -O full $zone.tmp 27 rm -f $k1.key $k1.private $k2.key $k2.private $zone.tm [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/inline/ns7/ |
| sign.sh | 19 zone=nsec3-loop 20 rm -f K${zone}.+*+*.key 21 rm -f K${zone}.+*+*.private 22 keyname=$($KEYGEN -q -a RSASHA256 -b 4096 -n zone $zone) 23 keyname=$($KEYGEN -q -a RSASHA256 -b 2048 -n zone $zone) 24 keyname=$($KEYGEN -q -a RSASHA256 -b 2048 -n zone -f KSK $zone)
|
| /src/external/public-domain/tz/dist/ |
| checknow.awk | 5 function record_zone(zone, data) { 6 if (zone) { 7 zone_data[zone] = data 8 zones[data] = zones[data] " " zone 15 record_zone(zone, data) 16 zone = $0 17 sub(/.*\.ckd\//, "", zone) 18 sub(/\/\//, "/", zone) 19 sub(/"/, "", zone) 24 record_zone(zone, data [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/ |
| named-fips.conf.j2 | 17 zone "default.kasp" { 23 /* A zone with special characters. */ 24 zone {% raw %}"i-am.\":\;?&[]\@!\$*+,|=\.\(\)special.kasp."{% endraw %} { 31 /* checkds: Zone with one KSK. */ 32 zone "checkds-ksk.kasp" { 38 /* checkds: Zone with two KSKs. */ 39 zone "checkds-doubleksk.kasp" { 45 /* checkds: Zone with one CSK. */ 46 zone "checkds-csk.kasp" { 53 zone "unlimited.kasp" [all...] |
| named-rsasha1.conf.j2 | 14 zone "rsasha1.kasp" { 20 zone "rsasha1-nsec3.kasp" {
|
| /src/external/mpl/bind/dist/bin/tests/system/rollover/ns3/ |
| named.conf.j2 | 17 {% for zone in ['manual-rollover.kasp', 'manual-rollover-zrrsig-rumoured.kasp'] %} 18 zone "@zone@" { 20 file "@zone@.db";
|