Searched refs:private (Results 1 - 25 of 53) sorted by relevance

123

/bind-9.11.3/bin/tests/system/keymgr/
H A Dclean.sh10 rm -f */K*.private
H A Dsetup.sh20 rm -f $dir/K*.private
31 rm -f $dir/K*.private
42 rm -f $dir/K*.private
53 rm -f $dir/K*.private
65 rm -f $dir/K*.private
76 rm -f $dir/K*.private
86 rm -f $dir/K*.private
97 rm -f $dir/K*.private
107 rm -f $dir/K*.private
113 rm -f $dir/K*.private
[all...]
/bind-9.11.3/lib/dns/tests/
H A Dprivate_test.c22 #include <dns/private.h>
53 make_signing(signing_testcase_t *testcase, dns_rdata_t *private, argument
56 dns_rdata_init(private);
63 private->data = buf;
64 private->length = len;
65 private->type = privatetype;
66 private->rdclass = dns_rdataclass_in;
70 make_nsec3(nsec3_testcase_t *testcase, dns_rdata_t *private, argument
111 dns_rdata_init(private);
113 dns_nsec3param_toprivate(&nsec3param, private, privatetyp
127 dns_rdata_t private; local
170 dns_rdata_t private; local
[all...]
/bind-9.11.3/bin/tests/system/coverage/
H A Dclean.sh11 rm -f */K*.private
H A Dsetup.sh21 rm -f $dir/K*.private
31 rm -f $dir/K*.private
41 rm -f $dir/K*.private
51 rm -f $dir/K*.private
62 rm -f $dir/K*.private
72 rm -f $dir/K*.private
81 rm -f $dir/K*.private
92 rm -f $dir/K*.private
103 rm -f $dir/K*.private
113 rm -f $dir/K*.private
[all...]
/bind-9.11.3/lib/dns/
H A Dprivate.c19 #include <dns/private.h>
32 * If neither NSEC/NSEC3PARAM RRsets exist at the origin and the private
52 * Note: we 'belt-and-braces' here by also checking for a CREATE private
64 dns_rdata_t private = DNS_RDATA_INIT; local
67 dns_rdataset_current(privateset, &private);
68 if (!dns_nsec3param_fromprivate(&private, &rdata,
157 dns_rdata_t private = DNS_RDATA_INIT; local
160 dns_rdataset_current(&privateset, &private);
161 if (!dns_nsec3param_fromprivate(&private, &rdata,
187 dns_rdata_t private local
247 dns_rdata_t private = DNS_RDATA_INIT; local
290 dns_private_totext(dns_rdata_t *private, isc_buffer_t *buf) argument
[all...]
/bind-9.11.3/bin/tests/system/wildcard/
H A Dclean.sh16 rm -f ns1/private.nsec.conf
17 rm -f ns1/private.nsec3.conf
H A Dtests.sh66 echo "I: checking that NSEC wildcard non-existance proof is returned private, validating ($n)"
68 $DIG $DIGOPTS a b.wild.private.nsec @10.53.0.3 > dig.out.ns3.test$n || ret=1
69 grep -i 'a\.wild\.private\.nsec\..*NSEC.*private\.nsec\..*NSEC' dig.out.ns3.test$n > /dev/null || ret=1
75 echo "I: checking that returned NSEC wildcard non-existance proof for private zone validates ($n)"
77 $DIG $DIGOPTS a b.wild.private.nsec @10.53.0.4 > dig.out.ns4.test$n || ret=1
78 grep -i 'a\.wild\.private\.nsec\..*NSEC.*private\.nsec\..*NSEC' dig.out.ns4.test$n > /dev/null || ret=1
128 echo "I: checking that NSEC3 wildcard non-existance proof is returned private, validating ($n)"
130 $DIG $DIGOPTS a b.wild.private
[all...]
/bind-9.11.3/bin/tests/system/eddsa/ns2/
H A Dsign.sh17 for i in Xexample.com.+015+03613.key Xexample.com.+015+03613.private \
18 Xexample.com.+015+35217.key Xexample.com.+015+35217.private
/bind-9.11.3/bin/tests/system/rsabigexponent/ns2/
H A Dsign.sh18 for i in Xexample.+005+51829.key Xexample.+005+51829.private \
19 Xexample.+005+05896.key Xexample.+005+05896.private
/bind-9.11.3/bin/tests/system/zonechecks/
H A Dclean.sh12 rm -f */*.db */*.db.signed */K*.key */K*.private */*.jnl */dsset-*
/bind-9.11.3/bin/tests/system/sfcache/
H A Dclean.sh9 rm -f */K*.key */K*.private */*.signed */*.db */dsset-*
/bind-9.11.3/bin/tests/system/unknown/ns3/
H A Dsign.sh16 rm -f K${zone}.+*+*.private
/bind-9.11.3/bin/win32/BINDInstall/
H A DDirBrowse.h58 private:
H A DVersionInfo.h51 private:
/bind-9.11.3/bin/tests/system/wildcard/ns1/
H A Dsign.sh44 zone=private.nsec.
45 infile=private.nsec.db.in
46 zonefile=private.nsec.db
47 outfile=private.nsec.db.signed
65 ' > private.nsec.conf
81 zone=private.nsec3.
82 infile=private.nsec3.db.in
83 zonefile=private.nsec3.db
84 outfile=private.nsec3.db.signed
102 ' > private
[all...]
H A Dnamed.conf31 zone "private.nsec" { type master; file "private.nsec.db.signed"; };
34 * The contents of nsec3 and private.nsec3 are specially choosen to
39 zone "private.nsec3" { type master; file "private.nsec3.db.signed"; };
/bind-9.11.3/bin/tests/system/autosign/ns2/
H A Dkeygen.sh30 # Create keys for a private secure zone.
31 zone=private.secure.example
43 for i in Xbar.+005+30676.key Xbar.+005+30804.key Xbar.+005+30676.private \
44 Xbar.+005+30804.private
/bind-9.11.3/bin/tests/system/inline/ns7/
H A Dsign.sh17 rm -f K${zone}.+*+*.private
/bind-9.11.3/bin/tests/system/tsiggss/
H A Dclean.sh14 rm -f ns1/*.db ns1/K*.key ns1/K*.private
H A Dsetup.sh14 rm -f ns1/*.jnl ns1/K*.key ns1/K*.private ns1/_default.tsigkeys
/bind-9.11.3/bin/tests/system/inline/ns3/
H A Dsign.sh14 rm -f K${zone}.+*+*.private
21 rm -f K${zone}.+*+*.private
28 rm -f K${zone}.+*+*.private
35 rm -f K${zone}.+*+*.private
42 rm -f K${zone}.+*+*.private
52 rm -f K${zone}.+*+*.private
60 rm -f K${zone}.+*+*.private
67 rm -f K${zone}.+*+*.private
73 rm -f K${zone}.+*+*.private
80 rm -f K${zone}.+*+*.private
[all...]
/bind-9.11.3/bin/tests/system/inline/ns1/
H A Dsign.sh16 rm -f K.+*+*.private
/bind-9.11.3/bin/tests/system/rpz/
H A Dclean.sh10 rm -f ns*/*.key ns*/*.private ns2/tld2s.db ns2/bl.tld2.db
/bind-9.11.3/lib/dns/include/dns/
H A Dnsec3.h109 isc_boolean_t unsecure, dns_rdatatype_t private,
131 * dns_nsec3_addnsec3sx() is similar to dns_nsec3_addnsec3s() but 'private'
132 * specifies the type of the private rdataset to be checked in addition to
153 dns_rdatatype_t private, dns_diff_t *diff);
165 * dns_nsec3_delnsec3sx() is similar to dns_nsec3_delnsec3s() but 'private'
166 * specifies the type of the private rdataset to be checked in addition to
183 isc_boolean_t complete, dns_rdatatype_t private,
189 * dns_nsec3_activex() is similar to dns_nsec3_active() but 'private'
190 * specifies the type of the private rdataset to be checked in addition to
217 * Convert a private rdat
[all...]

Completed in 28 milliseconds

123