| /src/external/mpl/bind/dist/bin/tests/system/nsupdate/ns3/ |
| sign.sh | 38 zone=delegation.test. 39 infile=delegation.test.db.in 40 zonefile=delegation.test.db
|
| sign.sh | 38 zone=delegation.test. 39 infile=delegation.test.db.in 40 zonefile=delegation.test.db
|
| /src/external/mpl/bind/dist/lib/dns/ |
| zoneverify.c | 686 const dns_rdata_t *rdata, bool delegation, bool empty, 749 (!delegation || (empty && !optout) || 756 } else if (result == ISC_R_NOTFOUND && delegation && (!empty || optout)) 784 dns_rdataset_t *nsec3paramset, bool delegation, bool empty, 795 result = verifynsec3(vctx, name, &rdata, delegation, empty, 915 bool delegation, dst_key_t **dstkeys, size_t nkeys, 938 * If we are not at a delegation then everything should be 939 * signed. If we are at a delegation then only the DS set 940 * is signed. The NS set is not signed at a delegation but 942 * other than NSEC and DS is not signed at a delegation [all...] |
| zoneverify.c | 686 const dns_rdata_t *rdata, bool delegation, bool empty, 749 (!delegation || (empty && !optout) || 756 } else if (result == ISC_R_NOTFOUND && delegation && (!empty || optout)) 784 dns_rdataset_t *nsec3paramset, bool delegation, bool empty, 795 result = verifynsec3(vctx, name, &rdata, delegation, empty, 915 bool delegation, dst_key_t **dstkeys, size_t nkeys, 938 * If we are not at a delegation then everything should be 939 * signed. If we are at a delegation then only the DS set 940 * is signed. The NS set is not signed at a delegation but 942 * other than NSEC and DS is not signed at a delegation [all...] |
| zone.c | 3441 dns_zone_log(zone, level, "DS not at delegation point (%s)", 8509 bool delegation; local 8607 * by a delegation or a DNAME, nodes are skipped over until we find one 8650 delegation = false; 8659 delegation = false; 8677 delegation = true; 8706 delegation = true; 8779 } else if (delegation) { 8870 delegation = false; 8921 delegation = true [all...] |
| zone.c | 3441 dns_zone_log(zone, level, "DS not at delegation point (%s)", 8509 bool delegation; local 8607 * by a delegation or a DNAME, nodes are skipped over until we find one 8650 delegation = false; 8659 delegation = false; 8677 delegation = true; 8706 delegation = true; 8779 } else if (delegation) { 8870 delegation = false; 8921 delegation = true [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| zoneverify.c | 686 const dns_rdata_t *rdata, bool delegation, bool empty, 749 (!delegation || (empty && !optout) || 756 } else if (result == ISC_R_NOTFOUND && delegation && (!empty || optout)) 784 dns_rdataset_t *nsec3paramset, bool delegation, bool empty, 795 result = verifynsec3(vctx, name, &rdata, delegation, empty, 915 bool delegation, dst_key_t **dstkeys, size_t nkeys, 938 * If we are not at a delegation then everything should be 939 * signed. If we are at a delegation then only the DS set 940 * is signed. The NS set is not signed at a delegation but 942 * other than NSEC and DS is not signed at a delegation [all...] |
| zoneverify.c | 686 const dns_rdata_t *rdata, bool delegation, bool empty, 749 (!delegation || (empty && !optout) || 756 } else if (result == ISC_R_NOTFOUND && delegation && (!empty || optout)) 784 dns_rdataset_t *nsec3paramset, bool delegation, bool empty, 795 result = verifynsec3(vctx, name, &rdata, delegation, empty, 915 bool delegation, dst_key_t **dstkeys, size_t nkeys, 938 * If we are not at a delegation then everything should be 939 * signed. If we are at a delegation then only the DS set 940 * is signed. The NS set is not signed at a delegation but 942 * other than NSEC and DS is not signed at a delegation [all...] |
| zone.c | 8508 bool delegation; local 8635 * by a delegation or a DNAME, nodes are skipped over until we find one 8678 delegation = false; 8687 delegation = false; 8705 delegation = true; 8754 delegation = true; 8827 } else if (delegation) { 8918 delegation = false; 8969 delegation = true; 9015 delegation = true [all...] |
| zone.c | 8508 bool delegation; local 8635 * by a delegation or a DNAME, nodes are skipped over until we find one 8678 delegation = false; 8687 delegation = false; 8705 delegation = true; 8754 delegation = true; 8827 } else if (delegation) { 8918 delegation = false; 8969 delegation = true; 9015 delegation = true [all...] |
| /src/crypto/external/bsd/heimdal/dist/tests/kdc/ |
| check-kdc.in | 223 ${kadmin} modify --attributes=+trusted-for-delegation ${ps} || exit 1 224 ${kadmin} modify --constrained-delegation=${server} ${ps} || exit 1 831 --delegation-credential-cache=${ocache} \ 835 echo "test constrained delegation"; > messages.log 840 --delegation-credential-cache=${ocache} \ 849 --delegation-credential-cache=${ocache} \ 853 echo "test constrained delegation impersonation (non forward)"; > messages.log 857 ${kgetcred} --out-cache=${o2cache} --delegation-credential-cache=${ocache} ${server}@${R} > /dev/null 2>/dev/null && \ 860 echo "test constrained delegation impersonation (missing KRB5SignedPath)"; > messages.log 864 ${kgetcred} --out-cache=${o2cache} --delegation-credential-cache=${ocache} ${server}@${R} > /dev/null 2>/dev/null && [all...] |
| check-kdc.in | 223 ${kadmin} modify --attributes=+trusted-for-delegation ${ps} || exit 1 224 ${kadmin} modify --constrained-delegation=${server} ${ps} || exit 1 831 --delegation-credential-cache=${ocache} \ 835 echo "test constrained delegation"; > messages.log 840 --delegation-credential-cache=${ocache} \ 849 --delegation-credential-cache=${ocache} \ 853 echo "test constrained delegation impersonation (non forward)"; > messages.log 857 ${kgetcred} --out-cache=${o2cache} --delegation-credential-cache=${ocache} ${server}@${R} > /dev/null 2>/dev/null && \ 860 echo "test constrained delegation impersonation (missing KRB5SignedPath)"; > messages.log 864 ${kgetcred} --out-cache=${o2cache} --delegation-credential-cache=${ocache} ${server}@${R} > /dev/null 2>/dev/null && [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/isctest/ |
| asyncserver.py | 1223 delegation = None 1228 delegation = node.get_rdataset(qctx.qclass, dns.rdatatype.NS) 1229 if delegation: 1233 if not delegation: 1237 delegation_rrset.update(delegation)
|
| asyncserver.py | 1223 delegation = None 1228 delegation = node.get_rdataset(qctx.qclass, dns.rdatatype.NS) 1229 if delegation: 1233 if not delegation: 1237 delegation_rrset.update(delegation)
|
| /src/external/mpl/bind/dist/bin/tests/system/nsupdate/ |
| tests.sh | 1576 zone delegation.test. 1577 update add child.delegation.test. 3600 NS foo.example.net. 1578 update add child.delegation.test. 3600 NS bar.example.net. 1581 $DIG $DIGOPTS +tcp @10.53.0.3 ns child.delegation.test >dig.out.ns1.test$n || ret=1 1594 zone delegation.test. 1595 update del child.delegation.test. 3600 NS foo.example.net. 1596 update del child.delegation.test. 3600 NS bar.example.net. 1599 $DIG $DIGOPTS +tcp @10.53.0.3 ns child.delegation.test >dig.out.ns1.test$n || ret=1 1815 zone delegation.test. 1816 update del child.delegation.test. 3600 NS foo.example.net [all...] |
| tests.sh | 1576 zone delegation.test. 1577 update add child.delegation.test. 3600 NS foo.example.net. 1578 update add child.delegation.test. 3600 NS bar.example.net. 1581 $DIG $DIGOPTS +tcp @10.53.0.3 ns child.delegation.test >dig.out.ns1.test$n || ret=1 1594 zone delegation.test. 1595 update del child.delegation.test. 3600 NS foo.example.net. 1596 update del child.delegation.test. 3600 NS bar.example.net. 1599 $DIG $DIGOPTS +tcp @10.53.0.3 ns child.delegation.test >dig.out.ns1.test$n || ret=1 1815 zone delegation.test. 1816 update del child.delegation.test. 3600 NS foo.example.net [all...] |
| /src/external/bsd/nsd/dist/doc/ |
| differences.tex | 570 \subsubsection{b-upwards-ref - BIND returns root delegation} 574 this server due to a lame delegation, BIND returns a root delegation. NSD
|
| differences.tex | 570 \subsubsection{b-upwards-ref - BIND returns root delegation} 574 this server due to a lame delegation, BIND returns a root delegation. NSD
|
| /src/sys/fs/nfs/server/ |
| nfs_nfsdstate.c | 78 "Issue a write delegation for read opens if possible"); 905 * and the delegation lists. 1235 * Free a list of delegation state structures. 1251 * Free up a delegation. 1538 int getlckret, delegation = 0, filestruct_locked, vnode_unlocked = 0; local 1855 * - stateid for a delegation 1860 delegation = 1; 1900 if ((new_stp->ls_flags & NFSLCK_CHECK) && !delegation) { 1966 * Check for a conflicting delegation. If one is found, call 1969 * the delegation. Then, we try try again.. [all...] |
| nfs_nfsdstate.c | 78 "Issue a write delegation for read opens if possible"); 905 * and the delegation lists. 1235 * Free a list of delegation state structures. 1251 * Free up a delegation. 1538 int getlckret, delegation = 0, filestruct_locked, vnode_unlocked = 0; local 1855 * - stateid for a delegation 1860 delegation = 1; 1900 if ((new_stp->ls_flags & NFSLCK_CHECK) && !delegation) { 1966 * Check for a conflicting delegation. If one is found, call 1969 * the delegation. Then, we try try again.. [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-signzone.c | 1201 * Determine if this is a delegation point. 1225 * If this name is a delegation point, skip all records 1788 * then remove all signatures, unless this is a delegation, in 1792 remove_sigs(dns_dbnode_t *node, bool delegation, dns_rdatatype_t which) { 1813 if (which == 0 && delegation &&
|
| dnssec-signzone.c | 1201 * Determine if this is a delegation point. 1225 * If this name is a delegation point, skip all records 1788 * then remove all signatures, unless this is a delegation, in 1792 remove_sigs(dns_dbnode_t *node, bool delegation, dns_rdatatype_t which) { 1813 if (which == 0 && delegation &&
|
| /src/external/apache2/mDNSResponder/dist/Clients/dnssdutil/ |
| dnssdutil.c | 33410 Delegation delegation; \/\/ Specifies the type of delegation to use for dnssd_getaddrinfo, if any. member in struct:__anon5969 [all...] |
| dnssdutil.c | 33410 Delegation delegation; \/\/ Specifies the type of delegation to use for dnssd_getaddrinfo, if any. member in struct:__anon5969 [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/dnssec/ |
| tests.sh | 118 # authoritative zone is unsigned (insecure delegation), glue is returned 120 echo_i "checking that additional glue is returned for unsigned delegation ($n)" 1761 echo_i "checking NSEC3 signing with empty nonterminals above a delegation ($n)" 2212 dig_with_opts +norec delegation.single-nsec3. @10.53.0.2 a >dig.out.ns2.test$n || ret=1 3398 echo_i "check insecure delegation between static-stub zones ($n)" 4049 grep "^delegation.occluded.example..*NSEC.*NS KEY DS RRSIG NSEC$" dig.out.ns3.test$n >/dev/null || ret=1 4050 grep "^delegation.occluded.example..*DNSKEY.*" dig.out.ns3.test$n >/dev/null || ret=1 4051 grep "^delegation.occluded.example..*AAAA.*" dig.out.ns3.test$n >/dev/null || ret=1
|