HomeSort by: relevance | last modified time | path
    Searched defs:dnssec (Results 1 - 9 of 9) sorted by relevancy

  /src/external/mpl/bind/dist/bin/tests/system/dnssec_malformed_dnskey/
tests_malformed_dnskey.py 20 import dns.dnssec namespace
32 algorithm = dns.dnssec.Algorithm.ECDSAP384SHA384
35 ksk_dnskey = dns.dnssec.make_dnskey(
74 if dns.dnssec.key_id(ksk_dnskey) != MALFORMED_ZSK_KEY_TAG:
80 dns.dnssec.sign_zone(
89 # force use of the malformed ZSKs for dnssec verification
  /src/external/mpl/bind/dist/bin/tests/system/tools/
tests_tools_nsec3hash.py 18 import dns.dnssec namespace
138 hash1 = dns.dnssec.nsec3_hash(
  /src/external/mpl/bind/dist/bin/tests/system/nsec3_answer/
tests_nsec3.py 26 import dns.dnssec namespace
387 nhash = dns.dnssec.nsec3_hash(
  /src/external/bsd/unbound/dist/services/
outside_network.h 136 /** serviced queries, sorted by qbuf, addr, dnssec */
460 int dnssec; member in struct:serviced_query
631 * @param dnssec: if set, DO bit is set in EDNS queries.
660 struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec,
  /src/external/mpl/bind/dist/bin/tests/system/isctest/
kasp.py 22 import dns.dnssec namespace
465 def into_ta(self, ta_type: str, dsdigest=dns.dnssec.DSDigest.SHA256) -> TrustAnchor:
468 ds = dns.dnssec.make_ds(dnskey.name, dnskey[0], dsdigest)
837 # Check if zone if DNSSEC valid with dnssec-verify.
866 # Call rndc dnssec -status on 'server' for 'zone'. Expect 'policy' in
871 response = server.rndc(f"dnssec -status {zone}")
873 response = server.rndc(f"dnssec -status {zone} in {view}")
876 assert "Zone does not have dnssec-policy" in response.out
879 assert f"dnssec-policy: {policy}" in response.ou
    [all...]
  /src/external/mpl/bind/dist/bin/dig/
dighost.h 111 comments, dns64prefix, dnssec, doing_xfr, done_as_is, ednsneg, member in struct:dig_lookup
  /src/external/mpl/bind/dist/bin/tools/
mdig.c 135 bool dnssec; member in struct:query
629 if (query->udpsize > 0 || query->dnssec || query->edns > -1 ||
744 if (query->dnssec) {
881 " +[no]dnssec (Request DNSSEC records)\n"
1307 case 'n': /* dnssec */
1308 FULLCHECK("dnssec");
1312 query->dnssec = state;
1910 default_query.dnssec = false;
  /src/external/mpl/dhcp/bind/dist/lib/dns/
rbtdb.c 4229 * Certain DNSSEC types are not subject to CNAME matching
5124 * Certain DNSSEC types are not subject to CNAME matching
8137 bool dnssec; local
8144 dnssec = (rbtdb->current_version->secure != dns_db_insecure);
8147 return (dnssec);
  /src/external/apache2/mDNSResponder/dist/mDNSCore/
mDNSEmbeddedAPI.h 1368 dnssec_obj_resource_record_member_t dnssec; // DNSSEC-related information for the current RR. member in struct:ResourceRecord_struct
1982 dnssec_obj_dns_question_member_t dnssec;// DNSSEC-related information for the current question. member in struct:DNSQuestion_struct
2088 mDNSBool enableDNSSEC; // The boolean value controlling whether to enable DNSSEC for this question.
2413 mDNSs32 NextUpdateDNSSECValidatedCache; // Next time to update the cache with DNSSEC-validated records.
2576 dnssec_obj_trust_anchor_manager_t DNSSECTrustAnchorManager; // The trust anchor manager manages all the useful anchors for DNSSEC.
3542 // Set this flag if the record being created comes from a DNSSEC-aware response.

Completed in 38 milliseconds