/dports/dns/bind916/bind-9.16.27/bin/tests/system/mkeys/ |
H A D | clean.sh | 16 rm -f */managed-keys.bind* */named.secroots 24 rm -f ns1/named.secroots ns1/root.db.signed* ns1/root.db.tmp
|
H A D | tests.sh | 86 rndccmd "10.53.0.${nsidx}" secroots | sed "s/^/ns${nsidx} /" | cat_i 315 grep '; initializing' ns2/named.secroots > /dev/null 2>&1 && ret=1 694 realkey=$(rndccmd 10.53.0.2 secroots - | sed -n 's#.*SHA256/\([0-9][0-9]*\) ; .*managed.*#\1#p') 703 grep '; initializing managed' ns4/named.secroots > /dev/null 2>&1 || ret=1 704 grep '; managed' ns4/named.secroots > /dev/null 2>&1 && ret=1 705 grep '; trusted' ns4/named.secroots > /dev/null 2>&1 && ret=1 742 grep '; initializing managed' ns5/named.secroots > /dev/null 2>&1 || ret=1 755 grep '; managed' ns5/named.secroots > /dev/null || ret=1
|
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/system/mkeys/ |
H A D | clean.sh | 14 rm -f */managed-keys.bind* */named.secroots 22 rm -f ns1/named.secroots ns1/root.db.signed* ns1/root.db.tmp
|
H A D | tests.sh | 84 rndccmd "10.53.0.${nsidx}" secroots | sed "s/^/ns${nsidx} /" | cat_i 313 grep '; initializing' ns2/named.secroots > /dev/null 2>&1 && ret=1 687 realkey=$(rndccmd 10.53.0.2 secroots - | sed -n 's#.*SHA256/\([0-9][0-9]*\) ; .*managed.*#\1#p') 696 grep '; initializing managed' ns4/named.secroots > /dev/null 2>&1 || ret=1 697 grep '; managed' ns4/named.secroots > /dev/null 2>&1 && ret=1 698 grep '; trusted' ns4/named.secroots > /dev/null 2>&1 && ret=1 735 grep '; initializing managed' ns5/named.secroots > /dev/null 2>&1 || ret=1 748 grep '; managed' ns5/named.secroots > /dev/null || ret=1
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/bin/tests/system/mkeys/ |
H A D | clean.sh | 14 rm -f */managed-keys.bind* */named.secroots 22 rm -f ns1/named.secroots ns1/root.db.signed* ns1/root.db.tmp
|
H A D | tests.sh | 83 rndccmd "10.53.0.${nsidx}" secroots | sed "s/^/ns${nsidx} /" | cat_i 312 grep '; initializing' ns2/named.secroots > /dev/null 2>&1 && ret=1 691 realkey=$(rndccmd 10.53.0.2 secroots - | sed -n 's#.*SHA256/\([0-9][0-9]*\) ; .*managed.*#\1#p') 700 grep '; initializing managed' ns4/named.secroots > /dev/null 2>&1 || ret=1 701 grep '; managed' ns4/named.secroots > /dev/null 2>&1 && ret=1 702 grep '; trusted' ns4/named.secroots > /dev/null 2>&1 && ret=1 739 grep '; initializing managed' ns5/named.secroots > /dev/null 2>&1 || ret=1 752 grep '; managed' ns5/named.secroots > /dev/null || ret=1
|
/dports/dns/bind-tools/bind-9.16.27/bin/tests/system/mkeys/ |
H A D | clean.sh | 16 rm -f */managed-keys.bind* */named.secroots 24 rm -f ns1/named.secroots ns1/root.db.signed* ns1/root.db.tmp
|
H A D | tests.sh | 86 rndccmd "10.53.0.${nsidx}" secroots | sed "s/^/ns${nsidx} /" | cat_i 315 grep '; initializing' ns2/named.secroots > /dev/null 2>&1 && ret=1 694 realkey=$(rndccmd 10.53.0.2 secroots - | sed -n 's#.*SHA256/\([0-9][0-9]*\) ; .*managed.*#\1#p') 703 grep '; initializing managed' ns4/named.secroots > /dev/null 2>&1 || ret=1 704 grep '; managed' ns4/named.secroots > /dev/null 2>&1 && ret=1 705 grep '; trusted' ns4/named.secroots > /dev/null 2>&1 && ret=1 742 grep '; initializing managed' ns5/named.secroots > /dev/null 2>&1 || ret=1 755 grep '; managed' ns5/named.secroots > /dev/null || ret=1
|
/dports/dns/bind-tools/bind-9.16.27/lib/dns/include/dns/ |
H A D | zoneverify.h | 46 dns_name_t *origin, dns_keytable_t *secroots,
|
/dports/dns/samba-nsupdate/bind-9.16.5/lib/dns/include/dns/ |
H A D | zoneverify.h | 44 dns_name_t *origin, dns_keytable_t *secroots,
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/include/dns/ |
H A D | zoneverify.h | 44 dns_name_t *origin, dns_keytable_t *secroots,
|
/dports/dns/bind916/bind-9.16.27/lib/dns/include/dns/ |
H A D | zoneverify.h | 46 dns_name_t *origin, dns_keytable_t *secroots,
|
/dports/dns/bind911/bind-9.11.37/bin/tests/system/mkeys/ |
H A D | clean.sh | 16 rm -f */managed-keys.bind* */named.secroots
|
/dports/dns/bind-tools/bind-9.16.27/lib/dns/ |
H A D | zoneverify.c | 62 dns_keytable_t *secroots; member 1290 dns_dbversion_t *ver, dns_name_t *origin, dns_keytable_t *secroots) { in vctx_init() argument 1300 vctx->secroots = secroots; in vctx_init() 1510 if (vctx->secroots == NULL) { in check_dnskey_sigs() 1529 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); in check_dnskey_sigs() 1584 dns_keytable_detachkeynode(vctx->secroots, &keynode); in check_dnskey_sigs() 1990 dns_name_t *origin, dns_keytable_t *secroots, in dns_zoneverify_dnssec() argument 1993 const char *keydesc = (secroots == NULL ? "self-signed" : "trusted"); in dns_zoneverify_dnssec() 1997 result = vctx_init(&vctx, mctx, zone, db, ver, origin, secroots); in dns_zoneverify_dnssec()
|
H A D | client.c | 1301 dns_keytable_t *secroots = NULL; in dns_client_addtrustedkey() local 1318 CHECK(dns_view_getsecroots(view, &secroots)); in dns_client_addtrustedkey() 1342 CHECK(dns_keytable_add(secroots, false, false, name, &ds)); in dns_client_addtrustedkey() 1348 if (secroots != NULL) { in dns_client_addtrustedkey() 1349 dns_keytable_detach(&secroots); in dns_client_addtrustedkey()
|
/dports/dns/bind916/bind-9.16.27/lib/dns/ |
H A D | zoneverify.c | 62 dns_keytable_t *secroots; member 1290 dns_dbversion_t *ver, dns_name_t *origin, dns_keytable_t *secroots) { in vctx_init() argument 1300 vctx->secroots = secroots; in vctx_init() 1510 if (vctx->secroots == NULL) { in check_dnskey_sigs() 1529 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); in check_dnskey_sigs() 1584 dns_keytable_detachkeynode(vctx->secroots, &keynode); in check_dnskey_sigs() 1990 dns_name_t *origin, dns_keytable_t *secroots, in dns_zoneverify_dnssec() argument 1993 const char *keydesc = (secroots == NULL ? "self-signed" : "trusted"); in dns_zoneverify_dnssec() 1997 result = vctx_init(&vctx, mctx, zone, db, ver, origin, secroots); in dns_zoneverify_dnssec()
|
H A D | client.c | 1301 dns_keytable_t *secroots = NULL; in dns_client_addtrustedkey() local 1318 CHECK(dns_view_getsecroots(view, &secroots)); in dns_client_addtrustedkey() 1342 CHECK(dns_keytable_add(secroots, false, false, name, &ds)); in dns_client_addtrustedkey() 1348 if (secroots != NULL) { in dns_client_addtrustedkey() 1349 dns_keytable_detach(&secroots); in dns_client_addtrustedkey()
|
/dports/dns/samba-nsupdate/bind-9.16.5/lib/dns/ |
H A D | zoneverify.c | 60 dns_keytable_t *secroots; member 1296 dns_dbversion_t *ver, dns_name_t *origin, dns_keytable_t *secroots) { in vctx_init() argument 1306 vctx->secroots = secroots; in vctx_init() 1516 if (vctx->secroots == NULL) { in check_dnskey_sigs() 1535 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); in check_dnskey_sigs() 1590 dns_keytable_detachkeynode(vctx->secroots, &keynode); in check_dnskey_sigs() 1974 dns_name_t *origin, dns_keytable_t *secroots, in dns_zoneverify_dnssec() argument 1977 const char *keydesc = (secroots == NULL ? "self-signed" : "trusted"); in dns_zoneverify_dnssec() 1981 result = vctx_init(&vctx, mctx, zone, db, ver, origin, secroots); in dns_zoneverify_dnssec()
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/ |
H A D | zoneverify.c | 59 dns_keytable_t *secroots; member 1287 dns_dbversion_t *ver, dns_name_t *origin, dns_keytable_t *secroots) { in vctx_init() argument 1297 vctx->secroots = secroots; in vctx_init() 1507 if (vctx->secroots == NULL) { in check_dnskey_sigs() 1526 result = dns_keytable_find(vctx->secroots, vctx->origin, &keynode); in check_dnskey_sigs() 1581 dns_keytable_detachkeynode(vctx->secroots, &keynode); in check_dnskey_sigs() 1987 dns_name_t *origin, dns_keytable_t *secroots, in dns_zoneverify_dnssec() argument 1990 const char *keydesc = (secroots == NULL ? "self-signed" : "trusted"); in dns_zoneverify_dnssec() 1994 result = vctx_init(&vctx, mctx, zone, db, ver, origin, secroots); in dns_zoneverify_dnssec()
|
H A D | client.c | 1272 dns_keytable_t *secroots = NULL; in dns_client_addtrustedkey() local 1289 CHECK(dns_view_getsecroots(view, &secroots)); in dns_client_addtrustedkey() 1313 CHECK(dns_keytable_add(secroots, false, false, name, &ds)); in dns_client_addtrustedkey() 1319 if (secroots != NULL) { in dns_client_addtrustedkey() 1320 dns_keytable_detach(&secroots); in dns_client_addtrustedkey()
|
/dports/dns/bind911/bind-9.11.37/bin/tests/system/dnssec/ |
H A D | clean.sh | 19 rm -f ./*/named.secroots 32 rm -f ./named.secroots.test*
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/bin/tests/system/dnssec/ |
H A D | clean.sh | 19 rm -f ./*/named.secroots 32 rm -f ./named.secroots.test*
|
/dports/dns/bind916/bind-9.16.27/bin/tests/system/dnssec/ |
H A D | clean.sh | 21 rm -f ./*/named.secroots 34 rm -f ./named.secroots.test*
|
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/system/dnssec/ |
H A D | clean.sh | 19 rm -f ./*/named.secroots 30 rm -f ./named.secroots.test*
|
/dports/dns/bind-tools/bind-9.16.27/bin/tests/system/dnssec/ |
H A D | clean.sh | 21 rm -f ./*/named.secroots 34 rm -f ./named.secroots.test*
|