/bind-9.11.3/bin/tests/system/keymgr/ |
H A D | clean.sh | 10 rm -f */K*.private
|
H A D | setup.sh | 20 rm -f $dir/K*.private 31 rm -f $dir/K*.private 42 rm -f $dir/K*.private 53 rm -f $dir/K*.private 65 rm -f $dir/K*.private 76 rm -f $dir/K*.private 86 rm -f $dir/K*.private 97 rm -f $dir/K*.private 107 rm -f $dir/K*.private 113 rm -f $dir/K*.private [all...] |
/bind-9.11.3/lib/dns/tests/ |
H A D | private_test.c | 22 #include <dns/private.h> 53 make_signing(signing_testcase_t *testcase, dns_rdata_t *private, argument 56 dns_rdata_init(private); 63 private->data = buf; 64 private->length = len; 65 private->type = privatetype; 66 private->rdclass = dns_rdataclass_in; 70 make_nsec3(nsec3_testcase_t *testcase, dns_rdata_t *private, argument 111 dns_rdata_init(private); 113 dns_nsec3param_toprivate(&nsec3param, private, privatetyp 127 dns_rdata_t private; local 170 dns_rdata_t private; local [all...] |
/bind-9.11.3/bin/tests/system/coverage/ |
H A D | clean.sh | 11 rm -f */K*.private
|
H A D | setup.sh | 21 rm -f $dir/K*.private 31 rm -f $dir/K*.private 41 rm -f $dir/K*.private 51 rm -f $dir/K*.private 62 rm -f $dir/K*.private 72 rm -f $dir/K*.private 81 rm -f $dir/K*.private 92 rm -f $dir/K*.private 103 rm -f $dir/K*.private 113 rm -f $dir/K*.private [all...] |
/bind-9.11.3/lib/dns/ |
H A D | private.c | 19 #include <dns/private.h> 32 * If neither NSEC/NSEC3PARAM RRsets exist at the origin and the private 52 * Note: we 'belt-and-braces' here by also checking for a CREATE private 64 dns_rdata_t private = DNS_RDATA_INIT; local 67 dns_rdataset_current(privateset, &private); 68 if (!dns_nsec3param_fromprivate(&private, &rdata, 157 dns_rdata_t private = DNS_RDATA_INIT; local 160 dns_rdataset_current(&privateset, &private); 161 if (!dns_nsec3param_fromprivate(&private, &rdata, 187 dns_rdata_t private local 247 dns_rdata_t private = DNS_RDATA_INIT; local 290 dns_private_totext(dns_rdata_t *private, isc_buffer_t *buf) argument [all...] |
/bind-9.11.3/bin/tests/system/wildcard/ |
H A D | clean.sh | 16 rm -f ns1/private.nsec.conf 17 rm -f ns1/private.nsec3.conf
|
H A D | tests.sh | 66 echo "I: checking that NSEC wildcard non-existance proof is returned private, validating ($n)" 68 $DIG $DIGOPTS a b.wild.private.nsec @10.53.0.3 > dig.out.ns3.test$n || ret=1 69 grep -i 'a\.wild\.private\.nsec\..*NSEC.*private\.nsec\..*NSEC' dig.out.ns3.test$n > /dev/null || ret=1 75 echo "I: checking that returned NSEC wildcard non-existance proof for private zone validates ($n)" 77 $DIG $DIGOPTS a b.wild.private.nsec @10.53.0.4 > dig.out.ns4.test$n || ret=1 78 grep -i 'a\.wild\.private\.nsec\..*NSEC.*private\.nsec\..*NSEC' dig.out.ns4.test$n > /dev/null || ret=1 128 echo "I: checking that NSEC3 wildcard non-existance proof is returned private, validating ($n)" 130 $DIG $DIGOPTS a b.wild.private [all...] |
/bind-9.11.3/bin/tests/system/eddsa/ns2/ |
H A D | sign.sh | 17 for i in Xexample.com.+015+03613.key Xexample.com.+015+03613.private \ 18 Xexample.com.+015+35217.key Xexample.com.+015+35217.private
|
/bind-9.11.3/bin/tests/system/rsabigexponent/ns2/ |
H A D | sign.sh | 18 for i in Xexample.+005+51829.key Xexample.+005+51829.private \ 19 Xexample.+005+05896.key Xexample.+005+05896.private
|
/bind-9.11.3/bin/tests/system/zonechecks/ |
H A D | clean.sh | 12 rm -f */*.db */*.db.signed */K*.key */K*.private */*.jnl */dsset-*
|
/bind-9.11.3/bin/tests/system/sfcache/ |
H A D | clean.sh | 9 rm -f */K*.key */K*.private */*.signed */*.db */dsset-*
|
/bind-9.11.3/bin/tests/system/unknown/ns3/ |
H A D | sign.sh | 16 rm -f K${zone}.+*+*.private
|
/bind-9.11.3/bin/win32/BINDInstall/ |
H A D | DirBrowse.h | 58 private:
|
H A D | VersionInfo.h | 51 private:
|
/bind-9.11.3/bin/tests/system/wildcard/ns1/ |
H A D | sign.sh | 44 zone=private.nsec. 45 infile=private.nsec.db.in 46 zonefile=private.nsec.db 47 outfile=private.nsec.db.signed 65 ' > private.nsec.conf 81 zone=private.nsec3. 82 infile=private.nsec3.db.in 83 zonefile=private.nsec3.db 84 outfile=private.nsec3.db.signed 102 ' > private [all...] |
H A D | named.conf | 31 zone "private.nsec" { type master; file "private.nsec.db.signed"; }; 34 * The contents of nsec3 and private.nsec3 are specially choosen to 39 zone "private.nsec3" { type master; file "private.nsec3.db.signed"; };
|
/bind-9.11.3/bin/tests/system/autosign/ns2/ |
H A D | keygen.sh | 30 # Create keys for a private secure zone. 31 zone=private.secure.example 43 for i in Xbar.+005+30676.key Xbar.+005+30804.key Xbar.+005+30676.private \ 44 Xbar.+005+30804.private
|
/bind-9.11.3/bin/tests/system/inline/ns7/ |
H A D | sign.sh | 17 rm -f K${zone}.+*+*.private
|
/bind-9.11.3/bin/tests/system/tsiggss/ |
H A D | clean.sh | 14 rm -f ns1/*.db ns1/K*.key ns1/K*.private
|
H A D | setup.sh | 14 rm -f ns1/*.jnl ns1/K*.key ns1/K*.private ns1/_default.tsigkeys
|
/bind-9.11.3/bin/tests/system/inline/ns3/ |
H A D | sign.sh | 14 rm -f K${zone}.+*+*.private 21 rm -f K${zone}.+*+*.private 28 rm -f K${zone}.+*+*.private 35 rm -f K${zone}.+*+*.private 42 rm -f K${zone}.+*+*.private 52 rm -f K${zone}.+*+*.private 60 rm -f K${zone}.+*+*.private 67 rm -f K${zone}.+*+*.private 73 rm -f K${zone}.+*+*.private 80 rm -f K${zone}.+*+*.private [all...] |
/bind-9.11.3/bin/tests/system/inline/ns1/ |
H A D | sign.sh | 16 rm -f K.+*+*.private
|
/bind-9.11.3/bin/tests/system/rpz/ |
H A D | clean.sh | 10 rm -f ns*/*.key ns*/*.private ns2/tld2s.db ns2/bl.tld2.db
|
/bind-9.11.3/lib/dns/include/dns/ |
H A D | nsec3.h | 109 isc_boolean_t unsecure, dns_rdatatype_t private, 131 * dns_nsec3_addnsec3sx() is similar to dns_nsec3_addnsec3s() but 'private' 132 * specifies the type of the private rdataset to be checked in addition to 153 dns_rdatatype_t private, dns_diff_t *diff); 165 * dns_nsec3_delnsec3sx() is similar to dns_nsec3_delnsec3s() but 'private' 166 * specifies the type of the private rdataset to be checked in addition to 183 isc_boolean_t complete, dns_rdatatype_t private, 189 * dns_nsec3_activex() is similar to dns_nsec3_active() but 'private' 190 * specifies the type of the private rdataset to be checked in addition to 217 * Convert a private rdat [all...] |