HomeSort by: relevance | last modified time | path
    Searched refs:nodata (Results 1 - 22 of 22) sorted by relevancy

  /src/external/mpl/bind/dist/bin/tests/system/checkconf/
bad-rate-limit-nodata-per-second.conf 16 nodata-per-second 1001; // greater than DNS_RRL_MAX_RATE
  /src/external/mpl/bind/dist/bin/tests/system/rrl/ns3/
named.conf.j2 31 nodata-per-second 230;
  /src/external/mpl/bind/dist/bin/tests/system/rpz/
tests.sh 391 # check rewrite to NODATA
394 nodata() { function
398 ckresult "$*" proto.nodata
485 # generate prototype NODATA response to compare against.
488 digcmd txt-only.tld2 @$ns2 >proto.nodata || return 1
489 grep "status: NOERROR" proto.nodata >/dev/null || return 1
504 nodata a3-1.tld2 # 3
505 nodata a3-2.tld2 # 4 nodata at DNAME itself
509 nodata a4-3-cname.tld2 #
    [all...]
setup.sh 34 for NM in '' -2 -given -disabled -passthru -no-op -nodata -nxdomain -cname -wildcname -garden -drop -tcp-only; do
  /src/crypto/external/apache2/openssl/dist/include/internal/
quic_wire_pkt.h 454 * If nodata is 1, the input is assumed to have no payload data in it. Otherwise
481 int nodata,
quic_wire.h 554 * it is safe to access for as long as the packet buffer exists. If nodata is
558 int ossl_quic_wire_decode_frame_crypto(PACKET *pkt, int nodata,
572 * If nodata is set to 1 then reading the PACKET stops after the frame header
598 int ossl_quic_wire_decode_frame_stream(PACKET *pkt, int nodata,
  /src/external/bsd/unbound/dist/validator/
val_nsec3.h 136 * Determine if the NSEC3s provided in a response prove the NOERROR/NODATA
139 * 1) Normal NODATA -- qname is matched to an NSEC3 record, type is not
142 * 2) ENT NODATA -- because there must be NSEC3 record for
145 * 3) NSEC3 ownername NODATA -- qname matched an existing, lone NSEC3
149 * 4) Wildcard NODATA -- A wildcard matched the name, but not the type.
151 * 5) Opt-In DS NODATA -- the qname is covered by an opt-in span and qtype ==
201 * Fundamentally there are two cases here: normal NODATA and Opt-In NODATA.
230 * Prove NXDOMAIN or NODATA.
238 * @param nodata: if return value is secure, this indicates if nodata o
    [all...]
val_nsec3.c 1207 /** Do the nodata proof */
1303 verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1307 verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1313 verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1319 verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1325 verbose(VERB_ALGO, "nsec3 nodata proof: matching "
1332 verbose(VERB_ALGO, "nsec3 nodata proof: all attempted hash "
1337 verbose(VERB_ALGO, "nsec3 nodata proof: reached "
1349 verbose(VERB_ALGO, "nsec3 nodata proof: no next closer nsec3");
1358 "opt-out in an opt-out DS NOERROR/NODATA case.")
    [all...]
validator.c 1106 * Validate a NOERROR/NODATA signed response -- a response that has a
1139 int has_valid_nsec = 0; /* If true, then the NODATA has been proven.*/
1140 uint8_t* ce = NULL; /* for wildcard nodata responses. This is the
1142 uint8_t* wc = NULL; /* for wildcard nodata responses. wildcard nsec */
1152 * NODATA.
1153 * This needs to handle the ENT NODATA case. */
1172 /* check to see if we have a wildcard NODATA proof. */
1174 /* The wildcard NODATA is 1 NSEC proving that qname does not exist
1192 verbose(VERB_ALGO, "NODATA response is insecure");
1205 verbose(VERB_QUERY, "NODATA response failed to prove NODATA
1743 int nodata; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/quic/
quic_wire.c 623 int nodata,
636 if (nodata) {
674 int nodata,
700 if (nodata)
714 if (nodata) {
quic_wire_pkt.c 188 int nodata,
416 if (!nodata && len > PACKET_remaining(pkt))
439 if (nodata) {
  /src/external/mpl/bind/dist/bin/tests/system/rpz/ns3/
named.conf.j2 46 zone "bl-nodata" policy nodata recursive-only no;
100 zone "bl-nodata." {type primary; file "bl-nodata.db";
named1.conf.j2 46 zone "bl-nodata" policy nodata recursive-only no;
100 zone "bl-nodata." {type primary; file "bl-nodata.db";
  /src/external/mpl/bind/dist/bin/tests/system/synthfromdnssec/
tests.sh 146 echo_i "prime negative NODATA response (synth-from-dnssec ${description};) ($n)"
148 dig_with_opts nodata.example. @10.53.0.${ns} a >dig.out.ns${ns}.test$n || ret=1
152 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n nodata.out
179 echo_i "prime wildcard NODATA 1 NSEC response (synth-from-dnssec ${description};) ($n)"
191 echo_i "prime wildcard NODATA 2 NSEC response (synth-from-dnssec ${description};) ($n)"
203 echo_i "prime wildcard NODATA 2 NSEC after data response (synth-from-dnssec ${description};) ($n)"
226 echo_i "prime insecure negative NODATA response (synth-from-dnssec ${description};) ($n)"
228 dig_with_opts nodata.insecure.example. @10.53.0.${ns} a >dig.out.ns${ns}.test$n || ret=1
232 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n insecure.nodata.out
259 echo_i "prime insecure wildcard NODATA 1 NSEC response (synth-from-dnssec ${description};) ($n)
    [all...]
  /src/external/mpl/dhcp/dist/common/
parse.c 3693 nodata:
3757 goto nodata;
3783 goto nodata;
3802 goto nodata;
3821 goto nodata;
3830 goto nodata;
3863 goto nodata;
3871 goto nodata;
3879 goto nodata;
3887 goto nodata;
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/serve-stale/
tests.sh 60 echo_i "prime cache nodata.example TXT ($n)"
62 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$n || ret=1
130 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 4)) &
166 echo_i "check stale nodata.example TXT ($n)"
338 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 3)) &
365 echo_i "check stale nodata.example TXT (serve-stale off) ($n)"
403 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 3)) &
429 echo_i "check stale nodata.example TXT (serve-stale on) ($n)"
471 $DIG -p ${PORT} @10.53.0.1 nodata.example TXT >dig.out.test$((n + 3)) &
497 echo_i "check stale nodata.example TXT (serve-stale reset) ($n)
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/resolver/ans3/
ans.pl 75 } elsif ($qname eq "nodata.example.net") {
112 } elsif ($qname =~ /^nodata\.example\.net$/i) {
  /src/external/mpl/dhcp/dist/keama/
parse.c 2809 nodata:
2862 goto nodata;
2888 goto nodata;
2909 goto nodata;
2934 goto nodata;
2944 goto nodata;
2975 goto nodata;
2984 goto nodata;
2993 goto nodata;
3002 goto nodata;
    [all...]
  /src/external/bsd/nsd/dist/doc/
differences.tex 715 b8-nodata-ttlminup (\ref{b8-nodata-ttlminup}) & 4611 &0.75\% \\
758 \subsection{b8-nodata-ttlminup - BIND 8 uses minimum TTL from SOA also if bigger}
759 \label{b8-nodata-ttlminup}
  /src/external/mpl/bind/dist/bin/tests/system/resolver/
tests.sh 39 echo_i "checking non-cachable NODATA response handling ($n)"
41 dig_with_opts +tcp nodata.example.net @10.53.0.1 a >dig.out.ns1.test${n} || ret=1
278 echo_i "RT21594 regression test NODATA answers ($n)"
280 # Check that resolver accepts the non-authoritative nodata answers.
915 echo_i "GL#4612 regression test: DS query against broken NODATA responses (${n})"
  /src/external/bsd/unbound/dist/services/
rpz.c 72 case RPZ_NODATA_ACTION: return "rpz-nodata";
90 else if(strcmp(a, "nodata") == 0) return RPZ_NODATA_ACTION;
1865 goto nodata;
1878 nodata:
  /src/external/mpl/bind/dist/lib/ns/
query.c 524 query_addwildcardproof(query_ctx_t *qctx, bool ispositive, bool nodata);
9257 * Handle authoritative NOERROR/NODATA responses.
9369 * Add RRSIGs for NOERROR/NODATA responses when answering authoritatively.
9435 "nodata: "
9767 * Synthesize a NODATA response from the SOA and covering NSEC in cache.
9786 * NODATA proof's name now or else discard it.
9809 * Add NODATA proof.
9825 * qctx contains the NODATA proof.
9892 * and NODATA proof by calling query_synthwildcard then setup to
9946 * Synthesize a NXDOMAIN or NODATA response from qctx (which contains th
    [all...]

Completed in 47 milliseconds