/bind-9.11.3/lib/dns/include/dns/ |
H A D | validator.h | 29 * Correct operation is critical to preventing spoofed answers from secure 67 * If the RESULT is ISC_R_SUCCESS and the answer is secure then 99 * Answer is secure. 101 isc_boolean_t secure; member in struct:dns_validatorevent 207 * response was successfully proven to be either secure or
|
/bind-9.11.3/lib/dns/ |
H A D | ncache.c | 44 isc_boolean_t optout, isc_boolean_t secure, 113 isc_boolean_t optout, isc_boolean_t secure, 250 if (!secure && trust > dns_trust_answer) 111 addoptout(dns_message_t *message, dns_db_t *cache, dns_dbnode_t *node, dns_rdatatype_t covers, isc_stdtime_t now, dns_ttl_t maxttl, isc_boolean_t optout, isc_boolean_t secure, dns_rdataset_t *addedrdataset) argument
|
H A D | update.c | 784 * after a secure update. 901 isc_boolean_t secure = dns_db_issecure(db); local 924 "secure zone with no NSECs"); 939 if (secure) { 1414 "could not get zone keys for secure "
|
H A D | view.c | 1918 isc_boolean_t secure = ISC_FALSE; local 1931 anchor, &secure); 1935 if (checknta && secure && view->ntatable_priv != NULL && 1937 secure = ISC_FALSE; 1939 *secure_domain = secure; 1976 * secure. If there are no other configured keys,
|
H A D | rbtdb.c | 630 dns_db_secure_t secure; member in struct:rbtdb_version 1505 version->secure = rbtdb->current_version->secure; 2523 version->secure = dns_db_insecure; 2546 version->secure = dns_db_secure; 2548 version->secure = dns_db_insecure; 2707 * Update the zone's secure status in version before making 3953 dns_db_secure_t secure) 3966 isc_boolean_t need_sig = ISC_TF(secure == dns_db_secure); 4241 if ((search.rbtversion->secure 3950 find_closest_nsec(rbtdb_search_t *search, dns_dbnode_t **nodep, dns_name_t *foundname, dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset, dns_rbt_t *tree, dns_db_secure_t secure) argument 7981 isc_boolean_t secure; local [all...] |
H A D | resolver.c | 563 isc_boolean_t secure, 2070 * under a secure entry point. 2200 * question is under a secure entry point and this is a 5019 vevent->secure, ardataset, &eresult); 5055 * Re-cache it as secure and bind the cached 5508 * If this RRset is in a secure domain, is in bailiwick, 5513 * records from a secure domain are only cached if validated 5875 isc_boolean_t optout, isc_boolean_t secure, 5885 if (secure) 5873 ncache_adderesult(dns_message_t *message, dns_db_t *cache, dns_dbnode_t *node, dns_rdatatype_t covers, isc_stdtime_t now, dns_ttl_t maxttl, isc_boolean_t optout, isc_boolean_t secure, dns_rdataset_t *ardataset, isc_result_t *eresultp) argument
|
H A D | zone.c | 408 dns_zone_t *secure; member in struct:dns_zone 1054 zone->secure = NULL; 1277 if (zone->secure != NULL) 2262 result = zone_load(zone->secure, DNS_ZONELOADFLAG_THAW, 4379 * 'secure' zone. We now need information about the status of the 4419 * If this is a inline_raw zone the secure version is also locked. 4438 INSIST(LOCKED_ZONE(zone->secure)); 4792 if (zone->secure->db == NULL) 5233 dns_zone_t *secure = NULL; local 5274 secure 9061 isc_boolean_t secure = ISC_FALSE; local 9994 dns_zone_t *secure = NULL; local 10202 dns_zone_t *secure = NULL; local 12647 dns_zone_t *raw = NULL, *secure = NULL; local 14756 dns_zone_t *secure = NULL; local 14776 dns_zone_t *secure = NULL; local 15027 dns_zone_t *secure = NULL; local 15298 dns_zone_t *secure = NULL; local 18345 dns_zone_t *secure = NULL; local [all...] |
/bind-9.11.3/lib/bind9/ |
H A D | check.c | 392 mustbesecure(const cfg_obj_t *secure, isc_symtab_t *symtab, isc_log_t *logctx, argument 405 obj = cfg_tuple_get(secure, "name"); 415 result = nameexist(secure, namebuf, 1, symtab, 416 "dnssec-must-be-secure '%s': already " 1264 * Check dnssec-must-be-secure. 1267 (void)cfg_map_get(options, "dnssec-must-be-secure", &obj);
|
/bind-9.11.3/bin/dnssec/ |
H A D | dnssec-signzone.c | 1016 secure(dns_name_t *name, dns_dbnode_t *node) { function 1496 secure(name, node)) 2279 !secure(nextname, nextnode)) { 2407 !secure(nextname, nextnode)) { 3025 fprintf(stderr, "use pseudorandom data (faster but less secure)\n");
|
/bind-9.11.3/bin/named/ |
H A D | query.c | 2160 * If we can't promote glue/pending from the cache to secure 2202 * If we can't promote glue/pending from the cache to secure 3069 * Mark the RRsets as secure. Update the cache (db) to reflect the 3089 * Save the updated secure state. Ignore failures. 3107 * Find the secure key that corresponds to rrsig. 3118 isc_boolean_t secure = ISC_FALSE; local 3160 secure = ISC_TRUE; 3165 return (secure); 3388 * If the answer is secure only add NS records if they are secure [all...] |
H A D | server.c | 4643 result = ns_config_get(maps, "dnssec-must-be-secure", &obj); 10105 CHECK(putstr(text, "secure roots as of ")); 13214 isc_boolean_t secure, maintain, allow; local 13284 secure = dns_db_issecure(db); 13324 if (secure && (zonetype == dns_zone_master || 13400 if (secure) { 13419 } else if (secure || hasraw) {
|