| /src/external/mpl/bind/dist/bin/tests/system/dnssec_malformed_dnskey/ |
| tests_malformed_dnskey.py | 20 import dns.dnssec namespace 32 algorithm = dns.dnssec.Algorithm.ECDSAP384SHA384 35 ksk_dnskey = dns.dnssec.make_dnskey( 74 if dns.dnssec.key_id(ksk_dnskey) != MALFORMED_ZSK_KEY_TAG: 80 dns.dnssec.sign_zone( 89 # force use of the malformed ZSKs for dnssec verification
|
| /src/external/mpl/bind/dist/bin/tests/system/tools/ |
| tests_tools_nsec3hash.py | 18 import dns.dnssec namespace 138 hash1 = dns.dnssec.nsec3_hash(
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3_answer/ |
| tests_nsec3.py | 26 import dns.dnssec namespace 387 nhash = dns.dnssec.nsec3_hash(
|
| /src/external/bsd/unbound/dist/services/ |
| outside_network.h | 136 /** serviced queries, sorted by qbuf, addr, dnssec */ 460 int dnssec; member in struct:serviced_query 631 * @param dnssec: if set, DO bit is set in EDNS queries. 660 struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec,
|
| /src/external/mpl/bind/dist/bin/tests/system/isctest/ |
| kasp.py | 22 import dns.dnssec namespace 465 def into_ta(self, ta_type: str, dsdigest=dns.dnssec.DSDigest.SHA256) -> TrustAnchor: 468 ds = dns.dnssec.make_ds(dnskey.name, dnskey[0], dsdigest) 837 # Check if zone if DNSSEC valid with dnssec-verify. 866 # Call rndc dnssec -status on 'server' for 'zone'. Expect 'policy' in 871 response = server.rndc(f"dnssec -status {zone}") 873 response = server.rndc(f"dnssec -status {zone} in {view}") 876 assert "Zone does not have dnssec-policy" in response.out 879 assert f"dnssec-policy: {policy}" in response.ou [all...] |
| /src/external/mpl/bind/dist/bin/dig/ |
| dighost.h | 111 comments, dns64prefix, dnssec, doing_xfr, done_as_is, ednsneg, member in struct:dig_lookup
|
| /src/external/mpl/bind/dist/bin/tools/ |
| mdig.c | 135 bool dnssec; member in struct:query 629 if (query->udpsize > 0 || query->dnssec || query->edns > -1 || 744 if (query->dnssec) { 881 " +[no]dnssec (Request DNSSEC records)\n" 1307 case 'n': /* dnssec */ 1308 FULLCHECK("dnssec"); 1312 query->dnssec = state; 1910 default_query.dnssec = false;
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| rbtdb.c | 4229 * Certain DNSSEC types are not subject to CNAME matching 5124 * Certain DNSSEC types are not subject to CNAME matching 8137 bool dnssec; local 8144 dnssec = (rbtdb->current_version->secure != dns_db_insecure); 8147 return (dnssec);
|
| /src/external/apache2/mDNSResponder/dist/mDNSCore/ |
| mDNSEmbeddedAPI.h | 1368 dnssec_obj_resource_record_member_t dnssec; // DNSSEC-related information for the current RR. member in struct:ResourceRecord_struct 1982 dnssec_obj_dns_question_member_t dnssec;// DNSSEC-related information for the current question. member in struct:DNSQuestion_struct 2088 mDNSBool enableDNSSEC; // The boolean value controlling whether to enable DNSSEC for this question. 2413 mDNSs32 NextUpdateDNSSECValidatedCache; // Next time to update the cache with DNSSEC-validated records. 2576 dnssec_obj_trust_anchor_manager_t DNSSECTrustAnchorManager; // The trust anchor manager manages all the useful anchors for DNSSEC. 3542 // Set this flag if the record being created comes from a DNSSEC-aware response.
|