/bind-9.6-ESV-R11/bin/tests/system/dlv/ns3/ |
H A D | named.conf | 35 zone "dlv.utld" { type master; file "dlv.signed"; }; 36 zone "child1.utld" { type master; file "child1.signed"; }; // dlv 37 zone "child3.utld" { type master; file "child3.signed"; }; // dlv 38 zone "child4.utld" { type master; file "child4.signed"; }; // dlv 39 zone "child5.utld" { type master; file "child5.signed"; }; // dlv 40 zone "child7.utld" { type master; file "child7.signed"; }; // no dlv 41 zone "child8.utld" { type master; file "child8.signed"; }; // no dlv 42 zone "child9.utld" { type master; file "child9.signed"; }; // dlv 43 zone "child10.utld" { type master; file "child.db.in"; }; // dlv unsigne [all...] |
H A D | sign.sh | 21 echo "I:dlv/ns3/sign.sh" 27 dlvzone=dlv.utld. 270 zone=dlv.utld. 271 infile=dlv.db.in 272 zonefile=dlv.utld.db 273 outfile=dlv.signed 292 ' > trusted-dlv.conf 293 cp trusted-dlv.conf ../ns5
|
/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | dlv_32769.c | 203 dns_rdata_dlv_t *dlv = source; local 207 REQUIRE(dlv->common.rdtype == type); 208 REQUIRE(dlv->common.rdclass == rdclass); 209 switch (dlv->digest_type) { 211 REQUIRE(dlv->length == ISC_SHA1_DIGESTLENGTH); 214 REQUIRE(dlv->length == ISC_SHA256_DIGESTLENGTH); 221 RETERR(uint16_tobuffer(dlv->key_tag, target)); 222 RETERR(uint8_tobuffer(dlv->algorithm, target)); 223 RETERR(uint8_tobuffer(dlv->digest_type, target)); 225 return (mem_tobuffer(target, dlv 230 dns_rdata_dlv_t *dlv = target; local 261 dns_rdata_dlv_t *dlv = source; local [all...] |
/bind-9.6-ESV-R11/bin/tests/system/dnssec/ns1/ |
H A D | sign.sh | 33 cp ../ns2/dsset-dlv. . 39 cat $infile $keyname.key dsset-example. dsset-dlv. dsset-algroll. dsset-optout-tld. > $zonefile
|
/bind-9.6-ESV-R11/bin/tests/system/dlv/ |
H A D | clean.sh | 40 rm -f ns3/trusted-dlv.conf ns5/trusted-dlv.conf
|
/bind-9.6-ESV-R11/bin/tests/system/dlv/ns6/ |
H A D | sign.sh | 22 echo "I:dlv/ns6/sign.sh" 44 dlvzone=dlv.utld. 59 dlvzone=dlv.utld. 74 dlvzone=dlv.utld. 89 dlvzone=dlv.utld. 104 dlvzone=dlv.utld. 119 dlvzone=dlv.utld. 133 dlvzone=dlv.utld. 161 dlvzone=dlv.druz. 176 dlvzone=dlv [all...] |
/bind-9.6-ESV-R11/bin/tests/system/dnssec/ns2/ |
H A D | sign.sh | 104 $SIGNER -P -g -r $RANDFILE -o $privzone -l dlv $privzonefile > /dev/null 109 dlvzone=dlv. 110 dlvinfile=dlv.db.in 111 dlvzonefile=dlv.db
|
/bind-9.6-ESV-R11/bin/tests/system/wildcard/ns1/ |
H A D | sign.sh | 25 zone=dlv. 26 infile=dlv.db.in 27 zonefile=dlv.db 28 outfile=dlv.db.signed
|
/bind-9.6-ESV-R11/bin/tests/system/dnssec/ns6/ |
H A D | named.conf | 37 dnssec-lookaside . trust-anchor dlv;
|
/bind-9.6-ESV-R11/bin/tests/system/wildcard/ns5/ |
H A D | named.conf | 31 dnssec-lookaside . trust-anchor dlv;
|
/bind-9.6-ESV-R11/lib/dns/ |
H A D | validator.c | 243 dns_rdata_dlv_t dlv; local 246 for (result = dns_rdataset_first(&val->dlv); 248 result = dns_rdataset_next(&val->dlv)) { 250 dns_rdataset_current(&val->dlv, &rdata); 251 result = dns_rdata_tostruct(&rdata, &dlv, NULL); 256 dlv.algorithm)) 259 if (dlv.digest_type != DNS_DSDIGEST_SHA256 && 260 dlv.digest_type != DNS_DSDIGEST_SHA1) 602 } else if (val->view->dlv == NULL || DLVTRIED(val)) { 762 } else if (val->view->dlv 1671 dns_rdata_dlv_t dlv; local [all...] |
H A D | view.c | 191 view->dlv = NULL;
|
H A D | resolver.c | 1718 if (res->view->dlv != NULL) 4546 if (!secure_domain && res->view->dlv != NULL) { 5058 if (!secure_domain && res->view->dlv != NULL) {
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | validator.h | 160 dns_rdataset_t dlv; member in struct:dns_validator
|
H A D | view.h | 145 dns_name_t * dlv; member in struct:dns_view
|
/bind-9.6-ESV-R11/ |
H A D | bind.keys | 3 # and for the ISC DNSSEC Lookaside Validation zone ("dlv.isc.org"). It is 22 # ISC DLV: See https://www.isc.org/solutions/dlv for details. 23 dlv.isc.org. 257 3 5 "BEAAAAPHMu/5onzrEE7z1egmhg/WPO0+juoZrW3euWEn4MxDCE1+lLy2 brhQv5rN32RKtMzX6Mj70jdzeND4XknW58dnJNPCxn8+jAGl2FZLK8t+ 1uq4W+nnA3qO2+DL+k6BD4mewMLbIYFwe0PG73Te9fZ2kJb56dhgMde5 ymX4BI/oQ+cAK50/xvJv00Frf8kw6ucMTwFlgPe+jnGxPPEmHAte/URk Y62ZfkLoBAADLHQ9IrS2tryAe7mbBZVcOwIeU/Rw/mRx/vwwMCTgNboM QKtUdvNXDrYJDSHZws3xiRXF1Rf+al9UmZfSav/4NWLKjHzpT59k/VSt TDN0YUuWrBNh";
|
/bind-9.6-ESV-R11/bin/tests/system/dnssec/ |
H A D | clean.sh | 31 rm -f ns2/dlv.db
|
/bind-9.6-ESV-R11/lib/bind9/ |
H A D | check.c | 664 const char *dlv; local 668 dlv = cfg_obj_asstring(cfg_tuple_get(obj, "domain")); 669 isc_buffer_constinit(&b, dlv, strlen(dlv)); 670 isc_buffer_add(&b, strlen(dlv)); 675 "bad domain name '%s'", dlv); 680 tresult = nameexist(obj, dlv, 1, symtab, 696 "non-root not yet supported", dlv); 700 dlv = cfg_obj_asstring(cfg_tuple_get(obj, 702 isc_buffer_constinit(&b, dlv, strle [all...] |
/bind-9.6-ESV-R11/bin/dnssec/ |
H A D | dnssec-signzone.c | 165 static dns_name_t *dlv = NULL; variable 2858 result = dns_name_concatenate(&tname, dlv, name, NULL); 3213 dlv = dns_fixedname_name(&dlv_fixed); 3214 result = dns_name_fromtext(dlv, &b, dns_rootname, 3216 check_result(result, "dns_name_fromtext(dlv)"); 3551 if (dlv != NULL) {
|
/bind-9.6-ESV-R11/bin/named/ |
H A D | server.c | 2064 dns_name_t *dlv; local 2089 dlv = dns_fixedname_name(&view->dlv_fixed); 2090 CHECK(dns_name_fromtext(dlv, &b, dns_rootname, 2092 view->dlv = dns_fixedname_name(&view->dlv_fixed); 2095 view->dlv = NULL;
|