/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | cname_5.h | 17 dns_name_t cname; member in struct:dns_rdata_cname
|
H A D | cname_5.c | 123 dns_rdata_cname_t *cname = source; local 128 REQUIRE(cname->common.rdtype == type); 129 REQUIRE(cname->common.rdclass == rdclass); 134 dns_name_toregion(&cname->cname, ®ion); 141 dns_rdata_cname_t *cname = target; local 148 cname->common.rdclass = rdata->rdclass; 149 cname->common.rdtype = rdata->type; 150 ISC_LINK_INIT(&cname->common, link); 155 dns_name_init(&cname 163 dns_rdata_cname_t *cname = source; local [all...] |
/bind-9.11.3/bin/tests/system/integrity/ns1/ |
H A D | named.conf | 32 zone "mx-cname-fail" { 35 check-mx-cname fail; 36 file "mx-cname.db"; 39 zone "mx-cname-warn" { 42 check-mx-cname warn; 43 file "mx-cname.db"; 46 zone "mx-cname-ignore" { 49 check-mx-cname ignore; 50 file "mx-cname.db"; 53 zone "no-mx-cname [all...] |
/bind-9.11.3/bin/tests/system/integrity/ |
H A D | tests.sh | 15 echo "I:check that 'check-integrity yes; check-mx-cname fail;' works ($n)" 17 $DIG -p 5300 @10.53.0.1 mx mx-cname-fail > dig.out.test$n || ret=1 19 grep "zone mx-cname-fail/IN: mx-cname-fail/MX 'cname.mx-cname-fail' is a CNAME (illegal)" ns1/named.run > /dev/null || ret=1 24 echo "I:check that 'check-integrity yes; check-mx-cname warn;' works ($n)" 26 $DIG -p 5300 @10.53.0.1 mx mx-cname-warn > dig.out.test$n || ret=1 28 grep "zone mx-cname-warn/IN: mx-cname [all...] |
/bind-9.11.3/bin/tests/system/checkconf/ |
H A D | check-mx-cname-fail.conf | 13 zone "check-mx-cname" { 15 file "check-mx-cname.db"; 16 check-mx-cname fail;
|
H A D | check-srv-cname-fail.conf | 13 zone "check-srv-cname" { 15 file "check-srv-cname.db"; 16 check-srv-cname fail;
|
H A D | tests.sh | 290 echo "I: check that check-mx-cname fails as configured ($n)" 292 $CHECKCONF -z check-mx-cname-fail.conf > checkconf.out$n 2>&1 && ret=1 294 grep "zone check-mx-cname/IN: loaded serial" < checkconf.out$n > /dev/null && ret=1 299 echo "I: check that check-srv-cname fails as configured ($n)" 301 $CHECKCONF -z check-srv-cname-fail.conf > checkconf.out$n 2>&1 && ret=1 303 grep "zone check-mx-cname/IN: loaded serial" < checkconf.out$n > /dev/null && ret=1
|
/bind-9.11.3/bin/tests/system/rpz/ns3/ |
H A D | named.conf | 38 zone "bl-cname" policy cname txt-only.tld2.; 39 zone "bl-wildcname" policy cname *.tld4.; 40 zone "bl-garden" policy cname a12.tld2.; 77 zone "bl-cname." {type master; file "bl-cname.db";
|
/bind-9.11.3/bin/tests/system/chain/ |
H A D | tests.sh | 76 $DIG cname.example @10.53.0.2 a -p 5300 > dig.out.ns2.cname 77 grep "status: NOERROR" dig.out.ns2.cname > /dev/null || ret=1 84 $DIG cname.example @10.53.0.7 a -p 5300 > dig.out.ns4.cname 85 grep "status: NOERROR" dig.out.ns4.cname > /dev/null || ret=1 86 grep '^cname.example.' dig.out.ns4.cname > /dev/null || ret=1 87 grep '^cnamedname.example.' dig.out.ns4.cname > /dev/null || ret=1 88 grep '^a.cnamedname.example.' dig.out.ns4.cname > /de [all...] |
/bind-9.11.3/bin/tests/system/dns64/ |
H A D | tests.sh | 202 $DIG $DIGOPTS cname-aaaa-only.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 211 $DIG $DIGOPTS cname-excluded-only.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 220 $DIG $DIGOPTS cname-excluded-bad-a.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 229 $DIG $DIGOPTS cname-excluded-good-a.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 238 $DIG $DIGOPTS cname-aaaa-only.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 247 $DIG $DIGOPTS cname-a-only.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 256 $DIG $DIGOPTS cname-a-and-aaaa.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 265 $DIG $DIGOPTS cname-a-not-mapped.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 275 $DIG $DIGOPTS cname-mx-only.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret=1 285 $DIG $DIGOPTS cname [all...] |
/bind-9.11.3/bin/tests/system/ |
H A D | genzone.sh | 57 cname01 CNAME cname-target. 58 cname02 CNAME cname-target
|
/bind-9.11.3/bin/tests/system/nslookup/ |
H A D | tests.sh | 66 $NSLOOKUP -port=5300 cname-a-only.example.net 10.53.0.1 > nslookup.out${n} || ret=1 80 $NSLOOKUP -port=5300 cname-aaaa-only.example.net 10.53.0.1 > nslookup.out${n} || ret=1 94 $NSLOOKUP -port=5300 cname-dual.example.net 10.53.0.1 > nslookup.out${n} || ret=1
|
/bind-9.11.3/bin/tests/system/tsiggss/ |
H A D | tests.sh | 72 update add fred.example.nil 120 cname foo.bar. 75 output=`$DIG $DIGOPTS +short cname fred.example.nil.`
|
/bind-9.11.3/lib/dns/ |
H A D | rpz.c | 200 {"cname", DNS_RPZ_POLICY_CNAME}, 1514 if (dns_name_dynamic(&rpz->cname)) 1515 dns_name_free(&rpz->cname, rpzs->mctx); 2347 dns_rdata_cname_t cname; local 2353 result = dns_rdata_tostruct(&rdata, &cname, NULL); 2360 if (dns_name_equal(&cname.cname, dns_rootname)) 2363 if (dns_name_iswildcard(&cname.cname)) { 2367 if (dns_name_countlabels(&cname [all...] |
H A D | lookup.c | 182 dns_rdata_cname_t cname; local 266 result = dns_rdata_tostruct(&rdata, &cname, NULL); 270 result = dns_name_copy(&cname.cname, name, NULL); 271 dns_rdata_freestruct(&cname);
|
/bind-9.11.3/bin/tests/system/rpz/ |
H A D | tests.sh | 319 nxdomain a4-2-cname.tld2 # 7 320 nodata a4-3-cname.tld2 # 8 340 nxdomain a0-1s-cname.tld2s +dnssec # 28 DNSSEC too early in CNAME chain 360 nxdomain a4-2-cname.tld2 @$ns6 # 5 361 nodata a4-3-cname.tld2 @$ns6 # 6 374 nxdomain a0-1s-cname.tld2s +dnssec @$ns6 # 19
|
H A D | setup.sh | 21 # bl-{given,disabled,passthru,no-data,nxdomain,cname,wildcard,garden, 24 for NM in '' -2 -given -disabled -passthru -no-op -nodata -nxdomain -cname -wildcname -garden -drop -tcp-only; do
|
/bind-9.11.3/bin/tests/system/zonechecks/ |
H A D | tests.sh | 16 if $CHECKZONE . cname.db > cname.out 2>&1 20 if grep "is a CNAME" cname.out > /dev/null
|
/bind-9.11.3/contrib/idn/idnkit-1.0-src/tools/idnconv/ |
H A D | idnconv.c | 120 char *cname; local 145 if ((cname = strrchr(cmd, '/')) != NULL) 146 cname++; 148 cname = cmd; 149 if (cname[0] == 'r')
|
/bind-9.11.3/bin/dig/ |
H A D | host.c | 387 dns_rdata_cname_t cname; local 402 result = dns_rdata_tostruct(&rdata, &cname, NULL); 404 dns_name_copy(&cname.cname, qname, NULL); 405 dns_rdata_freestruct(&cname);
|
H A D | nslookup.c | 419 dns_rdata_cname_t cname; local 433 result = dns_rdata_tostruct(&rdata, &cname, NULL); 435 dns_name_copy(&cname.cname, qname, NULL); 436 dns_rdata_freestruct(&cname);
|
/bind-9.11.3/lib/dns/include/dns/ |
H A D | rpz.h | 68 DNS_RPZ_POLICY_CNAME = 7, /* 'cname x': answer with x's rrsets */ 135 dns_name_t cname; /* override value for ..._CNAME */ member in struct:dns_rpz_zone
|
/bind-9.11.3/lib/irs/ |
H A D | getaddrinfo.c | 735 char cname[1024]; local 740 isc_buffer_init(&b, cname, sizeof(cname)); 810 ai->ai_canonname = strdup(cname);
|
/bind-9.11.3/bin/tests/system/dnssec/ |
H A D | clean.sh | 62 rm -f ns3/secure.below-cname.example.db
|
/bind-9.11.3/bin/named/ |
H A D | query.c | 973 dns_name_t *cname, dns_rpz_num_t rpz_num) 1006 if (cname != NULL) { 1008 dns_name_format(cname, cname_buf, sizeof(cname_buf)); 3586 dns_name_t *cname; local 3669 cname = dns_fixedname_name(&cfixed); 3673 dns_name_copy(name, cname, NULL); 3675 labels = dns_name_countlabels(cname) - 1; 3681 dns_name_split(cname, labels, NULL, cname); 3682 result = dns_db_findext(db, cname, versio 970 rpz_log_rewrite(ns_client_t *client, isc_boolean_t disabled, dns_rpz_policy_t policy, dns_rpz_type_t type, dns_zone_t *p_zone, dns_name_t *p_name, dns_name_t *cname, dns_rpz_num_t rpz_num) argument 5724 rpz_add_cname(ns_client_t *client, dns_rpz_st_t *st, dns_name_t *cname, dns_name_t *fname, isc_buffer_t *dbuf) argument 6580 dns_rdata_cname_t cname; local [all...] |