/bind-9.6-ESV-R11/contrib/zkt/examples/views/ |
H A D | dnssec-signer-extern | 3 # Shell script to start the dnssec-signer 7 ZKT_CONFFILE=`pwd`/dnssec.conf ../../dnssec-signer -V extern "$@"
|
H A D | dnssec-signer-intern | 3 # Shell script to start the dnssec-signer 7 ZKT_CONFFILE=`pwd`/dnssec.conf ../../dnssec-signer -V intern "$@"
|
H A D | viewtest.sh | 18 ./dnssec-signer-intern -v -v -f -r 20 ./dnssec-signer-extern -v -v
|
/bind-9.6-ESV-R11/contrib/zkt/examples/ |
H A D | zkt-signer.sh | 3 # Shell script to start the zkt-signer 12 ZKT_CONFFILE=`pwd`/dnssec.conf ../../zkt-signer "$@"
|
/bind-9.6-ESV-R11/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 35 dns_name_t signer; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 36 dns_name_t signer; member in struct:dns_rdata_sig_t
|
H A D | rrsig_46.c | 406 RETERR(name_tobuffer(&sig->signer, target)); 418 dns_name_t signer; local 472 dns_name_init(&signer, NULL); 473 dns_name_fromregion(&signer, &sr); 474 dns_name_init(&sig->signer, NULL); 475 RETERR(name_duporclone(&signer, mctx, &sig->signer)); 476 isc_region_consume(&sr, name_length(&sig->signer)); 492 dns_name_free(&sig->signer, mctx); 506 dns_name_free(&sig->signer, si [all...] |
H A D | sig_24.c | 411 RETERR(name_tobuffer(&sig->signer, target)); 423 dns_name_t signer; local 477 dns_name_init(&signer, NULL); 478 dns_name_fromregion(&signer, &sr); 479 dns_name_init(&sig->signer, NULL); 480 RETERR(name_duporclone(&signer, mctx, &sig->signer)); 481 isc_region_consume(&sr, name_length(&sig->signer)); 497 dns_name_free(&sig->signer, mctx); 511 dns_name_free(&sig->signer, si [all...] |
/bind-9.6-ESV-R11/bin/tests/system/wildcard/ns1/ |
H A D | sign.sh | 36 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 50 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 63 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 87 $SIGNER -r $RANDFILE -3 - -H 10 -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 100 $SIGNER -r $RANDFILE -3 - -H 10 -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer [all...] |
/bind-9.6-ESV-R11/bin/tests/system/dlv/ns3/ |
H A D | sign.sh | 42 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 57 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 72 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 87 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 101 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer [all...] |
/bind-9.6-ESV-R11/bin/tests/system/dlv/ |
H A D | clean.sh | 24 rm -f ns1/signer.err 31 rm -f ns2/signer.err 41 rm -f ns3/signer.err 46 rm -f ns6/signer.err
|
/bind-9.6-ESV-R11/bin/tests/system/dlv/ns6/ |
H A D | sign.sh | 36 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 51 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 66 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 81 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 96 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer [all...] |
/bind-9.6-ESV-R11/bin/tests/system/dlv/ns1/ |
H A D | sign.sh | 38 $SIGNER -r $RANDFILE -g -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
|
/bind-9.6-ESV-R11/bin/tests/system/dlv/ns2/ |
H A D | sign.sh | 39 $SIGNER -r $RANDFILE -l $dlvzone -g -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
|
/bind-9.6-ESV-R11/bin/tests/system/wildcard/ |
H A D | clean.sh | 29 rm -f ns1/signer.err
|
/bind-9.6-ESV-R11/lib/dns/include/dst/ |
H A D | gssapi.h | 186 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, 189 * Compare a "signer" (in the format of a Kerberos-format Kerberos5 196 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, 199 * Compare a "signer" (in the format of a Kerberos-format Kerberos5
|
/bind-9.6-ESV-R11/bin/tests/system/dnssec/ |
H A D | clean.sh | 44 rm -f signer/*.db 46 rm -f signer/example.db.after signer/example.db.before 47 rm -f signer/example.db.changed
|
/bind-9.6-ESV-R11/lib/dns/ |
H A D | ssu.c | 347 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, argument 360 REQUIRE(signer == NULL || dns_name_isabsolute(signer)); 363 if (signer == NULL && tcpaddr == NULL) 377 if (signer == NULL) 380 if (!dns_name_matcheswildcard(signer, 384 if (!dns_name_equal(signer, rule->identity)) 392 if (signer == NULL) 416 if (!dns_name_equal(signer, name)) 420 if (!dns_name_issubdomain(name, signer)) [all...] |
H A D | dnssec.c | 180 RUNTIME_CHECK(dns_name_downcase(&rrsig->signer, 185 dns_name_toregion(&rrsig->signer, &r); 237 * Downcase signer. 239 dns_name_init(&sig.signer, NULL); 243 dns_name_clone(dns_fixedname_name(&fsigner), &sig.signer); 429 if (!dns_name_equal(name, &sig.signer)) { 435 if (dns_name_equal(name, &sig.signer)) { 441 if (!dns_name_issubdomain(name, &sig.signer)) { 550 dns_name_format(&sig.signer, namebuf, sizeof(namebuf)); 554 "signer ' [all...] |
H A D | gssapictx.c | 344 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, argument 361 result = dns_name_toprincipal(signer, &buffer); 380 * Find the host portion of the signer's name. We do this by 409 UNUSED(signer); 417 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, argument 435 result = dns_name_toprincipal(signer, &buffer); 461 * Find the host portion of the signer's name. Zero out the $ so 462 * it terminates the signer's name, and skip past the @ for 500 UNUSED(signer);
|
H A D | tkey.c | 266 process_dhtkey(dns_message_t *msg, dns_name_t *signer, dns_name_t *name, argument 399 ISC_TRUE, signer, tkeyin->inception, 555 process_deletetkey(dns_name_t *signer, dns_name_t *name, argument 574 if (identity == NULL || !dns_name_equal(identity, signer)) { 599 dns_name_t *qname, *name, *keyname, *signer, tsigner; local 669 signer = NULL; 677 signer = &tsigner; 774 RETERR(process_dhtkey(msg, signer, keyname, &tkeyin, 785 RETERR(process_deletetkey(signer, keyname, &tkeyin,
|
/bind-9.6-ESV-R11/bin/tests/system/upforwd/ans4/ |
H A D | ans.pl | 273 my $signer; 320 $tsig->sign_func($signer) if defined($signer); 322 $signer = \&sign_tcp_continuation;
|
/bind-9.6-ESV-R11/lib/dns/include/dns/ |
H A D | ssu.h | 121 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, 149 *\li 'signer' is NULL or a valid absolute name
|
/bind-9.6-ESV-R11/bin/tests/system/ |
H A D | ans.pl | 324 my $signer; 374 $tsig->sign_func($signer) if defined($signer); 378 $signer = \&sign_tcp_continuation
|
/bind-9.6-ESV-R11/bin/named/include/named/ |
H A D | client.h | 134 dns_name_t * signer; /*%< NULL if not valid sig */ member in struct:ns_client
|