/bind-9.11.3/bin/tests/system/mkeys/ns1/ |
H A D | sign.sh | 20 # Configure the resolving server with a managed trusted key. 25 managed-keys { 29 ' > managed.conf 30 cp managed.conf ../ns2/managed.conf 31 cp managed.conf ../ns5/managed.conf 45 # Save keyname and keyid for managed key id test. 47 echo "$keyname" > managed.key 50 echo "$keyid" > managed [all...] |
/bind-9.11.3/bin/tests/system/mkeys/ |
H A D | clean.sh | 12 rm -f */managed-keys.bind* */named.secroots 13 rm -f */managed.conf ns1/managed.key ns1/managed.key.id
|
H A D | tests.sh | 45 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 managed-keys refresh | sed "s/^/I: ns${nsidx} /" 52 # managed-keys zone is already locked and the command below calls 55 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 managed-keys sync | sed "s/^/I: ns${nsidx} /" 61 # managed-keys zone is already locked and the command below calls 65 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 managed-keys status 114 echo "I: check for failed validation due to wrong key in managed-keys ($n)" 166 t1=`grep "trust pending" ns2/managed-keys.bind` 176 t2=`grep "trust pending" ns2/managed-keys.bind` 188 $SETTIME -R now -K ns1 `cat ns1/managed.key` > /dev/null 214 t2=`grep "trust pending" ns2/managed [all...] |
/bind-9.11.3/util/ |
H A D | bindkeys.pl | 25 $lines =~ s/managed-keys/trusted-keys/;
|
/bind-9.11.3/bin/tests/system/dnssec/ns1/ |
H A D | sign.sh | 44 # ...or with a managed key. 49 managed-keys { 53 ' > managed.conf 59 cp managed.conf ../ns4/managed.conf 61 # Save keyid for managed key id test. 65 echo "$keyid" > managed.key.id
|
/bind-9.11.3/bin/tests/system/sfcache/ |
H A D | clean.sh | 10 rm -f */managed.conf */trusted.conf
|
/bind-9.11.3/bin/tests/system/sfcache/ns1/ |
H A D | sign.sh | 37 # ...or with a managed key. 42 managed-keys { 46 ' > managed.conf
|
/bind-9.11.3/unit/atf-src/atf-c/detail/ |
H A D | list.c | 68 new_entry(void *object, bool managed) argument 76 le->m_managed = managed; 95 new_entry_and_link(void *object, bool managed, struct list_entry *prev, argument 100 le = new_entry(object, managed); 351 atf_list_append(atf_list_t *l, void *data, bool managed) argument 358 le = new_entry_and_link(data, managed, prev, next);
|
H A D | map.c | 48 new_entry(const char *key, void *value, bool managed) argument 60 me->m_managed = managed; 347 atf_map_insert(atf_map_t *m, const char *key, void *value, bool managed) argument 355 me = new_entry(key, value, managed); 361 if (managed) 374 me->m_managed = managed;
|
/bind-9.11.3/contrib/scripts/ |
H A D | check5011.pl | 130 check5011 <I<managed-keys.bind>> 134 The BIND managed-keys file contains DNSSEC trust anchors 160 The key is present in the DNS but not in the managed-keys file. 175 By default the managed keys are stored in a file called 176 F<managed-keys.bind> in B<named>'s working directory. This location 177 can be changed with B<named>'s B<managed-keys-directory> option. If
|
/bind-9.11.3/bin/tests/system/mkeys/ns3/ |
H A D | named.conf | 25 bindkeys-file "managed.conf"; 44 managed-keys {
|
/bind-9.11.3/bin/tests/system/dnssec/ |
H A D | clean.sh | 15 rm -f */trusted.conf */managed.conf */revoked.conf 27 rm -f ns1/managed.key.id 73 rm -f ns3/managed-future.example.db 74 rm -f ns4/managed-keys.bind*
|
H A D | tests.sh | 1576 keyid=`cat ns1/managed.key.id` 2107 echo "I:checking managed key maintenance has not started yet ($n)" 2109 [ -f "ns4/managed-keys.bind.jnl" ] && ret=1 2121 echo "I:checking managed key maintenance timer has now started ($n)" 2123 [ -f "ns4/managed-keys.bind.jnl" ] || ret=1 2864 # force the managed-keys zone to be written out 2865 $RNDC -c ../common/rndc.conf -s 10.53.0.4 -p 9953 managed-keys sync 2>&1 | sed 's/^/I:ns4 /' 2869 if test -f ns4/managed-keys.bind 2871 grep KEYDATA ns4/managed-keys.bind > /dev/null && 2872 grep "next refresh:" ns4/managed [all...] |
/bind-9.11.3/lib/dns/include/dns/ |
H A D | keytable.h | 104 dns_keytable_add(dns_keytable_t *keytable, isc_boolean_t managed, 108 * The value of keynode->managed is set to 'managed' 402 * Is this flagged as a managed key?
|
/bind-9.11.3/lib/dns/ |
H A D | keytable.c | 48 isc_boolean_t managed; member in struct:dns_keynode 162 insert(dns_keytable_t *keytable, isc_boolean_t managed, argument 176 knode->managed = managed; 228 dns_keytable_add(dns_keytable_t *keytable, isc_boolean_t managed, argument 232 return (insert(keytable, managed, dst_key_name(*keyp), keyp)); 628 knode->managed ? "managed" : "trusted"); 701 * Is this a managed key? 705 return (keynode->managed); [all...] |
/bind-9.11.3/bin/tests/system/dnssec/ns3/ |
H A D | sign.sh | 520 zone=managed-future.example 521 infile=managed-future.example.db.in 522 zonefile=managed-future.example.db
|
/bind-9.11.3/bin/tests/system/dnssec/ns2/ |
H A D | sign.sh | 24 dnskey-unknown dnskey-nsec3-unknown managed-future revkey
|
/bind-9.11.3/lib/bind9/ |
H A D | check.c | 2812 check_trusted_key(const cfg_obj_t *key, isc_boolean_t managed, argument 2858 if (managed) { 2864 "managed key '%s': " 2887 managed ? "managed" : "trusted", 3275 * Check trusted-keys and managed-keys. 3315 (void)cfg_map_get(voptions, "managed-keys", &keys); 3317 (void)cfg_map_get(config, "managed-keys", &keys); 3338 "managed-key for root from 2010 without updated " 3339 "managed [all...] |
/bind-9.11.3/bin/named/ |
H A D | server.c | 688 isc_boolean_t managed, dst_key_t **target, isc_mem_t *mctx) 713 if (managed) { 719 "managed key '%s': " 767 managed ? "managed" : "trusted", 788 managed ? "managed" : "trusted", 793 managed ? "managed" : "trusted", 798 managed 687 dstkey_fromconfig(const cfg_obj_t *vconfig, const cfg_obj_t *key, isc_boolean_t managed, dst_key_t **target, isc_mem_t *mctx) argument 810 load_view_keys(const cfg_obj_t *keys, const cfg_obj_t *vconfig, dns_view_t *view, isc_boolean_t managed, dns_name_t *keyname, isc_mem_t *mctx) argument [all...] |