/dports/dns/powerdns/pdns-4.5.2/pdns/ |
H A D | test-tsig.cc | 55 tt.secret = tsigSecret; in BOOST_AUTO_TEST_SUITE() 114 tt.secret = tsigSecret; in checkTSIG() 123 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 134 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 145 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 156 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 167 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 178 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 189 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local 201 string tsigSecret("verysecret"); in BOOST_AUTO_TEST_CASE() local [all …]
|
/dports/security/lego/lego-4.5.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/security/vault/vault-1.8.2/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net-p2p/bitmark/bitmarkd-0.13.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/security/xray-core/Xray-core-1.5.0/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net/clash/clash-1.6.0/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/dns/blocky/blocky-0.17/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net/v2ray/v2ray-core-4.36.2/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/benchmarks/ali/ali-0.7.5/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 6 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 77 srv.TsigSecret = tsigSecret 92 srv.TsigSecret = tsigSecret
|
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 11 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 81 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret) 94 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret)
|
H A D | server.go | 74 tsigSecret map[string]string // the tsig secrets member 487 w := &response{tsigSecret: srv.TsigSecret, tcp: rw} 542 w := &response{tsigSecret: srv.TsigSecret, udp: u, udpSession: s} 593 if w.tsigSecret != nil { 595 if secret, ok := w.tsigSecret[t.Hdr.Name]; ok { 661 if w.tsigSecret != nil { // if no secrets, dont check for the tsig (which is a longer check) 663 …data, w.tsigRequestMAC, err = TsigGenerate(m, w.tsigSecret[t.Hdr.Name], w.tsigRequestMAC, w.tsigTi…
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 11 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 81 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret) 94 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret)
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 11 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 81 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret) 94 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret)
|
/dports/dns/cli53/cli53-0.8.18/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 11 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 81 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret) 94 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret)
|
/dports/benchmarks/vegeta/vegeta-12.8.4/vendor/github.com/miekg/dns/ |
H A D | xfr_test.go | 11 tsigSecret = map[string]string{"axfr.": "so6ZGir4GPAqINNh9U5c3A=="} var 81 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret) 94 s, addrstr, err := RunLocalTCPServerWithTsig(":0", tsigSecret)
|
/dports/net-mgmt/blackbox_exporter/blackbox_exporter-0.17.0/vendor/github.com/miekg/dns/ |
H A D | server.go | 74 tsigSecret map[string]string // the tsig secrets member 487 w := &response{tsigSecret: srv.TsigSecret, tcp: rw} 542 w := &response{tsigSecret: srv.TsigSecret, udp: u, udpSession: s} 593 if w.tsigSecret != nil { 595 if secret, ok := w.tsigSecret[t.Hdr.Name]; ok { 661 if w.tsigSecret != nil { // if no secrets, dont check for the tsig (which is a longer check) 663 …data, w.tsigRequestMAC, err = TsigGenerate(m, w.tsigSecret[t.Hdr.Name], w.tsigRequestMAC, w.tsigTi…
|
/dports/databases/prometheus-postgresql-adapter/prometheus-postgresql-adapter-0.6.0/vendor/github.com/prometheus/prometheus/vendor/github.com/miekg/dns/ |
H A D | server.go | 74 tsigSecret map[string]string // the tsig secrets member 487 w := &response{tsigSecret: srv.TsigSecret, tcp: rw} 542 w := &response{tsigSecret: srv.TsigSecret, udp: u, udpSession: s} 586 if w.tsigSecret != nil { 588 if secret, ok := w.tsigSecret[t.Hdr.Name]; ok { 654 if w.tsigSecret != nil { // if no secrets, dont check for the tsig (which is a longer check) 656 …data, w.tsigRequestMAC, err = TsigGenerate(m, w.tsigSecret[t.Hdr.Name], w.tsigRequestMAC, w.tsigTi…
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/vendor/github.com/miekg/dns/ |
H A D | server.go | 48 tsigSecret map[string]string // the tsig secrets member 497 w := &response{tsigSecret: srv.TsigSecret, udp: u, tcp: t, remoteAddr: a, udpSession: s} 524 if w.tsigSecret != nil { 527 if _, ok := w.tsigSecret[secret]; !ok { 530 w.tsigStatus = TsigVerify(m, w.tsigSecret[secret], "", false) 619 if w.tsigSecret != nil { // if no secrets, dont check for the tsig (which is a longer check) 621 …data, w.tsigRequestMAC, err = TsigGenerate(m, w.tsigSecret[t.Hdr.Name], w.tsigRequestMAC, w.tsigTi…
|