Searched refs:managed (Results 1 - 19 of 19) sorted by relevance

/bind-9.11.3/bin/tests/system/mkeys/ns1/
H A Dsign.sh20 # Configure the resolving server with a managed trusted key.
25 managed-keys {
29 ' > managed.conf
30 cp managed.conf ../ns2/managed.conf
31 cp managed.conf ../ns5/managed.conf
45 # Save keyname and keyid for managed key id test.
47 echo "$keyname" > managed.key
50 echo "$keyid" > managed
[all...]
/bind-9.11.3/bin/tests/system/mkeys/
H A Dclean.sh12 rm -f */managed-keys.bind* */named.secroots
13 rm -f */managed.conf ns1/managed.key ns1/managed.key.id
H A Dtests.sh45 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 managed-keys refresh | sed "s/^/I: ns${nsidx} /"
52 # managed-keys zone is already locked and the command below calls
55 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 managed-keys sync | sed "s/^/I: ns${nsidx} /"
61 # managed-keys zone is already locked and the command below calls
65 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 managed-keys status
114 echo "I: check for failed validation due to wrong key in managed-keys ($n)"
166 t1=`grep "trust pending" ns2/managed-keys.bind`
176 t2=`grep "trust pending" ns2/managed-keys.bind`
188 $SETTIME -R now -K ns1 `cat ns1/managed.key` > /dev/null
214 t2=`grep "trust pending" ns2/managed
[all...]
/bind-9.11.3/util/
H A Dbindkeys.pl25 $lines =~ s/managed-keys/trusted-keys/;
/bind-9.11.3/bin/tests/system/dnssec/ns1/
H A Dsign.sh44 # ...or with a managed key.
49 managed-keys {
53 ' > managed.conf
59 cp managed.conf ../ns4/managed.conf
61 # Save keyid for managed key id test.
65 echo "$keyid" > managed.key.id
/bind-9.11.3/bin/tests/system/sfcache/
H A Dclean.sh10 rm -f */managed.conf */trusted.conf
/bind-9.11.3/bin/tests/system/sfcache/ns1/
H A Dsign.sh37 # ...or with a managed key.
42 managed-keys {
46 ' > managed.conf
/bind-9.11.3/unit/atf-src/atf-c/detail/
H A Dlist.c68 new_entry(void *object, bool managed) argument
76 le->m_managed = managed;
95 new_entry_and_link(void *object, bool managed, struct list_entry *prev, argument
100 le = new_entry(object, managed);
351 atf_list_append(atf_list_t *l, void *data, bool managed) argument
358 le = new_entry_and_link(data, managed, prev, next);
H A Dmap.c48 new_entry(const char *key, void *value, bool managed) argument
60 me->m_managed = managed;
347 atf_map_insert(atf_map_t *m, const char *key, void *value, bool managed) argument
355 me = new_entry(key, value, managed);
361 if (managed)
374 me->m_managed = managed;
/bind-9.11.3/contrib/scripts/
H A Dcheck5011.pl130 check5011 <I<managed-keys.bind>>
134 The BIND managed-keys file contains DNSSEC trust anchors
160 The key is present in the DNS but not in the managed-keys file.
175 By default the managed keys are stored in a file called
176 F<managed-keys.bind> in B<named>'s working directory. This location
177 can be changed with B<named>'s B<managed-keys-directory> option. If
/bind-9.11.3/bin/tests/system/mkeys/ns3/
H A Dnamed.conf25 bindkeys-file "managed.conf";
44 managed-keys {
/bind-9.11.3/bin/tests/system/dnssec/
H A Dclean.sh15 rm -f */trusted.conf */managed.conf */revoked.conf
27 rm -f ns1/managed.key.id
73 rm -f ns3/managed-future.example.db
74 rm -f ns4/managed-keys.bind*
H A Dtests.sh1576 keyid=`cat ns1/managed.key.id`
2107 echo "I:checking managed key maintenance has not started yet ($n)"
2109 [ -f "ns4/managed-keys.bind.jnl" ] && ret=1
2121 echo "I:checking managed key maintenance timer has now started ($n)"
2123 [ -f "ns4/managed-keys.bind.jnl" ] || ret=1
2864 # force the managed-keys zone to be written out
2865 $RNDC -c ../common/rndc.conf -s 10.53.0.4 -p 9953 managed-keys sync 2>&1 | sed 's/^/I:ns4 /'
2869 if test -f ns4/managed-keys.bind
2871 grep KEYDATA ns4/managed-keys.bind > /dev/null &&
2872 grep "next refresh:" ns4/managed
[all...]
/bind-9.11.3/lib/dns/include/dns/
H A Dkeytable.h104 dns_keytable_add(dns_keytable_t *keytable, isc_boolean_t managed,
108 * The value of keynode->managed is set to 'managed'
402 * Is this flagged as a managed key?
/bind-9.11.3/lib/dns/
H A Dkeytable.c48 isc_boolean_t managed; member in struct:dns_keynode
162 insert(dns_keytable_t *keytable, isc_boolean_t managed, argument
176 knode->managed = managed;
228 dns_keytable_add(dns_keytable_t *keytable, isc_boolean_t managed, argument
232 return (insert(keytable, managed, dst_key_name(*keyp), keyp));
628 knode->managed ? "managed" : "trusted");
701 * Is this a managed key?
705 return (keynode->managed);
[all...]
/bind-9.11.3/bin/tests/system/dnssec/ns3/
H A Dsign.sh520 zone=managed-future.example
521 infile=managed-future.example.db.in
522 zonefile=managed-future.example.db
/bind-9.11.3/bin/tests/system/dnssec/ns2/
H A Dsign.sh24 dnskey-unknown dnskey-nsec3-unknown managed-future revkey
/bind-9.11.3/lib/bind9/
H A Dcheck.c2812 check_trusted_key(const cfg_obj_t *key, isc_boolean_t managed, argument
2858 if (managed) {
2864 "managed key '%s': "
2887 managed ? "managed" : "trusted",
3275 * Check trusted-keys and managed-keys.
3315 (void)cfg_map_get(voptions, "managed-keys", &keys);
3317 (void)cfg_map_get(config, "managed-keys", &keys);
3338 "managed-key for root from 2010 without updated "
3339 "managed
[all...]
/bind-9.11.3/bin/named/
H A Dserver.c688 isc_boolean_t managed, dst_key_t **target, isc_mem_t *mctx)
713 if (managed) {
719 "managed key '%s': "
767 managed ? "managed" : "trusted",
788 managed ? "managed" : "trusted",
793 managed ? "managed" : "trusted",
798 managed
687 dstkey_fromconfig(const cfg_obj_t *vconfig, const cfg_obj_t *key, isc_boolean_t managed, dst_key_t **target, isc_mem_t *mctx) argument
810 load_view_keys(const cfg_obj_t *keys, const cfg_obj_t *vconfig, dns_view_t *view, isc_boolean_t managed, dns_name_t *keyname, isc_mem_t *mctx) argument
[all...]

Completed in 389 milliseconds