| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-rate-limit-nodata-per-second.conf | 16 nodata-per-second 1001; // greater than DNS_RRL_MAX_RATE
|
| /src/external/mpl/bind/dist/bin/tests/system/rrl/ns3/ |
| named.conf.j2 | 31 nodata-per-second 230;
|
| /src/external/mpl/bind/dist/bin/tests/system/rpz/ |
| tests.sh | 391 # check rewrite to NODATA 394 nodata() { function 398 ckresult "$*" proto.nodata 485 # generate prototype NODATA response to compare against. 488 digcmd txt-only.tld2 @$ns2 >proto.nodata || return 1 489 grep "status: NOERROR" proto.nodata >/dev/null || return 1 504 nodata a3-1.tld2 # 3 505 nodata a3-2.tld2 # 4 nodata at DNAME itself 509 nodata a4-3-cname.tld2 # [all...] |
| setup.sh | 34 for NM in '' -2 -given -disabled -passthru -no-op -nodata -nxdomain -cname -wildcname -garden -drop -tcp-only; do
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| quic_wire_pkt.h | 454 * If nodata is 1, the input is assumed to have no payload data in it. Otherwise 481 int nodata,
|
| quic_wire.h | 554 * it is safe to access for as long as the packet buffer exists. If nodata is 558 int ossl_quic_wire_decode_frame_crypto(PACKET *pkt, int nodata, 572 * If nodata is set to 1 then reading the PACKET stops after the frame header 598 int ossl_quic_wire_decode_frame_stream(PACKET *pkt, int nodata,
|
| /src/external/bsd/unbound/dist/validator/ |
| val_nsec3.h | 136 * Determine if the NSEC3s provided in a response prove the NOERROR/NODATA 139 * 1) Normal NODATA -- qname is matched to an NSEC3 record, type is not 142 * 2) ENT NODATA -- because there must be NSEC3 record for 145 * 3) NSEC3 ownername NODATA -- qname matched an existing, lone NSEC3 149 * 4) Wildcard NODATA -- A wildcard matched the name, but not the type. 151 * 5) Opt-In DS NODATA -- the qname is covered by an opt-in span and qtype == 201 * Fundamentally there are two cases here: normal NODATA and Opt-In NODATA. 230 * Prove NXDOMAIN or NODATA. 238 * @param nodata: if return value is secure, this indicates if nodata o [all...] |
| val_nsec3.c | 1207 /** Do the nodata proof */ 1303 verbose(VERB_ALGO, "nsec3 nodata proof: matching " 1307 verbose(VERB_ALGO, "nsec3 nodata proof: matching " 1313 verbose(VERB_ALGO, "nsec3 nodata proof: matching " 1319 verbose(VERB_ALGO, "nsec3 nodata proof: matching " 1325 verbose(VERB_ALGO, "nsec3 nodata proof: matching " 1332 verbose(VERB_ALGO, "nsec3 nodata proof: all attempted hash " 1337 verbose(VERB_ALGO, "nsec3 nodata proof: reached " 1349 verbose(VERB_ALGO, "nsec3 nodata proof: no next closer nsec3"); 1358 "opt-out in an opt-out DS NOERROR/NODATA case.") [all...] |
| validator.c | 1106 * Validate a NOERROR/NODATA signed response -- a response that has a 1139 int has_valid_nsec = 0; /* If true, then the NODATA has been proven.*/ 1140 uint8_t* ce = NULL; /* for wildcard nodata responses. This is the 1142 uint8_t* wc = NULL; /* for wildcard nodata responses. wildcard nsec */ 1152 * NODATA. 1153 * This needs to handle the ENT NODATA case. */ 1172 /* check to see if we have a wildcard NODATA proof. */ 1174 /* The wildcard NODATA is 1 NSEC proving that qname does not exist 1192 verbose(VERB_ALGO, "NODATA response is insecure"); 1205 verbose(VERB_QUERY, "NODATA response failed to prove NODATA 1743 int nodata; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_wire.c | 623 int nodata, 636 if (nodata) { 674 int nodata, 700 if (nodata) 714 if (nodata) {
|
| quic_wire_pkt.c | 188 int nodata, 416 if (!nodata && len > PACKET_remaining(pkt)) 439 if (nodata) {
|
| /src/external/mpl/bind/dist/bin/tests/system/rpz/ns3/ |
| named.conf.j2 | 46 zone "bl-nodata" policy nodata recursive-only no; 100 zone "bl-nodata." {type primary; file "bl-nodata.db";
|
| named1.conf.j2 | 46 zone "bl-nodata" policy nodata recursive-only no; 100 zone "bl-nodata." {type primary; file "bl-nodata.db";
|
| /src/external/mpl/bind/dist/bin/tests/system/synthfromdnssec/ |
| tests.sh | 146 echo_i "prime negative NODATA response (synth-from-dnssec ${description};) ($n)" 148 dig_with_opts nodata.example. @10.53.0.${ns} a >dig.out.ns${ns}.test$n || ret=1 152 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n nodata.out 179 echo_i "prime wildcard NODATA 1 NSEC response (synth-from-dnssec ${description};) ($n)" 191 echo_i "prime wildcard NODATA 2 NSEC response (synth-from-dnssec ${description};) ($n)" 203 echo_i "prime wildcard NODATA 2 NSEC after data response (synth-from-dnssec ${description};) ($n)" 226 echo_i "prime insecure negative NODATA response (synth-from-dnssec ${description};) ($n)" 228 dig_with_opts nodata.insecure.example. @10.53.0.${ns} a >dig.out.ns${ns}.test$n || ret=1 232 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n insecure.nodata.out 259 echo_i "prime insecure wildcard NODATA 1 NSEC response (synth-from-dnssec ${description};) ($n) [all...] |
| /src/external/mpl/dhcp/dist/common/ |
| parse.c | 3693 nodata: 3757 goto nodata; 3783 goto nodata; 3802 goto nodata; 3821 goto nodata; 3830 goto nodata; 3863 goto nodata; 3871 goto nodata; 3879 goto nodata; 3887 goto nodata; [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/serve-stale/ |
| tests.sh | 60 echo_i "prime cache nodata.example TXT ($n)" 62 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$n || ret=1 130 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 4)) & 166 echo_i "check stale nodata.example TXT ($n)" 338 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 3)) & 365 echo_i "check stale nodata.example TXT (serve-stale off) ($n)" 403 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 3)) & 429 echo_i "check stale nodata.example TXT (serve-stale on) ($n)" 471 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 3)) & 497 echo_i "check stale nodata.example TXT (serve-stale reset) ($n) [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans3/ |
| ans.pl | 75 } elsif ($qname eq "nodata.example.net") { 112 } elsif ($qname =~ /^nodata\.example\.net$/i) {
|
| /src/external/mpl/dhcp/dist/keama/ |
| parse.c | 2809 nodata: 2862 goto nodata; 2888 goto nodata; 2909 goto nodata; 2934 goto nodata; 2944 goto nodata; 2975 goto nodata; 2984 goto nodata; 2993 goto nodata; 3002 goto nodata; [all...] |
| /src/external/bsd/nsd/dist/doc/ |
| differences.tex | 715 b8-nodata-ttlminup (\ref{b8-nodata-ttlminup}) & 4611 &0.75\% \\ 758 \subsection{b8-nodata-ttlminup - BIND 8 uses minimum TTL from SOA also if bigger} 759 \label{b8-nodata-ttlminup}
|
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ |
| tests.sh | 39 echo_i "checking non-cachable NODATA response handling ($n)" 41 dig_with_opts +tcp nodata.example.net @10.53.0.1 a >dig.out.ns1.test${n} || ret=1 278 echo_i "RT21594 regression test NODATA answers ($n)" 280 # Check that resolver accepts the non-authoritative nodata answers. 915 echo_i "GL#4612 regression test: DS query against broken NODATA responses (${n})"
|
| /src/external/bsd/unbound/dist/services/ |
| rpz.c | 72 case RPZ_NODATA_ACTION: return "rpz-nodata"; 90 else if(strcmp(a, "nodata") == 0) return RPZ_NODATA_ACTION; 1865 goto nodata; 1878 nodata:
|
| /src/external/mpl/bind/dist/lib/ns/ |
| query.c | 524 query_addwildcardproof(query_ctx_t *qctx, bool ispositive, bool nodata); 9257 * Handle authoritative NOERROR/NODATA responses. 9369 * Add RRSIGs for NOERROR/NODATA responses when answering authoritatively. 9435 "nodata: " 9767 * Synthesize a NODATA response from the SOA and covering NSEC in cache. 9786 * NODATA proof's name now or else discard it. 9809 * Add NODATA proof. 9825 * qctx contains the NODATA proof. 9892 * and NODATA proof by calling query_synthwildcard then setup to 9946 * Synthesize a NXDOMAIN or NODATA response from qctx (which contains th [all...] |