Searched refs:secroots (Results 1 - 7 of 7) sorted by relevance
/bind-9.11.3/bin/tests/system/mkeys/ |
H A D | clean.sh | 12 rm -f */managed-keys.bind* */named.secroots 16 rm -f ns1/named.secroots ns1/root.db.signed* ns1/root.db.tmp
|
H A D | tests.sh | 75 $RNDC -c ../common/rndc.conf -s 10.53.0.${nsidx} -p 9953 secroots | sed "s/^/I: ns${nsidx} /" 651 realkey=`$RNDC -c ../common/rndc.conf -s 10.53.0.2 -p 9953 secroots - | sed -n 's#.*SHA1/\([0-9][0-9]*\) ; .*managed.*#\1#p'`
|
/bind-9.11.3/bin/tests/system/dnssec/ |
H A D | clean.sh | 13 rm -f */named.secroots 23 rm -f named.secroots.test*
|
H A D | tests.sh | 1572 # Test that "rndc secroots" is able to dump trusted keys 1573 echo "I:checking rndc secroots ($n)" 1575 $RNDC -c ../common/rndc.conf -s 10.53.0.4 -p 9953 secroots 2>&1 | sed 's/^/I:ns1 /' 1577 cp ns4/named.secroots named.secroots.test$n 1578 linecount=`grep "./RSAMD5/$keyid ; trusted" named.secroots.test$n | wc -l` 1580 linecount=`cat named.secroots.test$n | wc -l` 1718 echo "I: dumping secroots" 1719 $RNDC -c ../common/rndc.conf -s 10.53.0.4 -p 9953 secroots | sed 's/^/I:ns4 /' 1720 grep "bogus.example: expiry" ns4/named.secroots > /de [all...] |
/bind-9.11.3/bin/named/ |
H A D | server.c | 818 dns_keytable_t *secroots = NULL; local 820 CHECK(dns_view_getsecroots(view, &secroots)); 850 CHECK(dns_keytable_add(secroots, managed, &dstkey)); 857 if (secroots != NULL) 858 dns_keytable_detach(&secroots); 870 dns_keytable_t *secroots = NULL; local 873 result = dns_view_getsecroots(view, &secroots); 877 result = dns_keytable_find(secroots, name, &keynode); 880 dns_keytable_detachkeynode(secroots, &keynode); 881 if (secroots ! 6178 dns_keytable_t *secroots = NULL; local 10076 dns_keytable_t *secroots = NULL; local [all...] |
/bind-9.11.3/lib/dns/ |
H A D | client.c | 1531 dns_keytable_t *secroots = NULL; local 1542 result = dns_view_getsecroots(view, &secroots); 1551 result = dns_keytable_add(secroots, ISC_FALSE, &dstkey); 1558 if (secroots != NULL) 1559 dns_keytable_detach(&secroots);
|
H A D | zone.c | 4272 * secroots as appropriate. 4310 * Now walk secroots to find any managed keys that aren't 9042 dns_keytable_t *secroots = NULL; local 9091 result = dns_view_getsecroots(zone->view, &secroots); 9146 result = dns_keytable_find(secroots, keyname, &keynode); 9179 result = dns_keytable_nextkeynode(secroots, 9181 dns_keytable_detachkeynode(secroots, &keynode); 9186 dns_keytable_detachkeynode(secroots, &keynode); 9369 * Remove key from secroots. 9609 if (secroots ! [all...] |
Completed in 2378 milliseconds