Home
last modified time | relevance | path

Searched refs:zones (Results 1 – 25 of 425) sorted by relevance

12345678910>>...17

/netbsd/external/mpl/bind/dist/bin/tests/system/statschannel/
H A Dtests.sh199 cat zones.expect | sort > zones.expect.$n
205 cmp zones.out.x$n zones.expect.$n || ret=1
209 cmp zones.out.j$n zones.expect.$n || ret=1
229 cat zones.expect | sort > zones.expect.$n
235 cmp zones.out.x$n zones.expect.$n || ret=1
239 cmp zones.out.j$n zones.expect.$n || ret=1
257 cat zones.expect | sort > zones.expect.$n
262 cmp zones.out.x$n zones.expect.$n || ret=1
298 cat zones.expect | sort > zones.expect.$n
341 cat zones.expect | sort > zones.expect.$n
[all …]
H A Dgeneric.py76 zones = fetch_zones(statsip, statsport)
78 for zone in zones:
89 zones = fetch_zones(statsip, statsport)
91 for zone in zones:
101 zones = fetch_zones(statsip, statsport)
103 for zone in zones:
H A Dclean.sh31 rm -f zones zones.out.* zones.json.* zones.xml.* zones.expect.*
/netbsd/external/mpl/bind/dist/bin/tests/system/checkzone/
H A Dtests.sh20 for db in zones/good*.db
25 zones/good-gc-msdcs.db|zones/good-spf-exception.db)
28 zones/good-dns-sd-reverse.db)
40 for db in zones/bad*.db
45 zones/bad-dns-sd-reverse.db|zones/bad-svcb-servername.db)
60 $CHECKZONE -D -o test.orig.db test zones/test1.db > /dev/null 2>&1 || ret=1
61 $CHECKZONE -D -o test.changed.db test zones/test2.db > /dev/null 2>&1 || ret=1
76 $CHECKZONE example zones/spf.db > test.out1.$n 2>&1 || ret=1
77 $CHECKZONE -T ignore example zones/spf.db > test.out2.$n 2>&1 || ret=1
90 $CHECKZONE -l 300 example zones/good1.db > test.out1.$n 2>&1 && ret=1
[all …]
H A Dsetup.sh20 zones/good1.db > /dev/null 2>&1
22 zones/good1.db > /dev/null 2>&1
24 copy_setports zones/bad-tsig.db.in zones/bad-tsig.db
/netbsd/external/bsd/unbound/dist/services/
H A Dlocalzone.c89 lock_rw_rdlock(&zones->lock); in local_zones_print()
94 lock_rw_unlock(&zones->lock); in local_zones_print()
101 sizeof(*zones)); in local_zones_create()
102 if(!zones) in local_zones_create()
105 lock_rw_init(&zones->lock); in local_zones_create()
106 lock_protect(&zones->lock, &zones->ztree, sizeof(zones->ztree)); in local_zones_create()
108 return zones; in local_zones_create()
122 if(!zones) in local_zones_delete()
127 free(zones); in local_zones_delete()
222 lock_rw_wrlock(&zones->lock); in lz_enter_zone_dname()
[all …]
H A Dlocalzone.h216 void local_zones_delete(struct local_zones* zones);
265 struct local_zone* local_zones_tags_lookup(struct local_zones* zones,
281 struct local_zone* local_zones_lookup(struct local_zones* zones,
289 void local_zones_print(struct local_zones* zones);
322 int local_zones_answer(struct local_zones* zones, struct module_env* env,
375 struct local_zone* local_zones_find(struct local_zones* zones,
390 local_zones_find_le(struct local_zones* zones,
406 struct local_zone* local_zones_add_zone(struct local_zones* zones,
426 int local_zones_add_RR(struct local_zones* zones, const char* rr);
437 void local_zones_del_data(struct local_zones* zones,
[all …]
/netbsd/external/mpl/bind/dist/doc/arm/
H A Dcatz.rst18 zones to be served, along with their configuration parameters. Zones
21 functionality, the secondary server creates the member zones
30 latest revision of the DNS catalog zones draft can be found here:
39 secondary servers, and/or where the zones being served are changing
46 removes, or reconfigures member zones based on the data received.
87 Catalog zones are configured with a ``catalog-zones`` statement in the
92 catalog-zones {
114 This option, if set to ``yes``, causes member zones to be
117 zones' content is stored locally in a file whose name is
136 ``catalog-zones`` statement in a view automatically turns on
[all …]
/netbsd/external/mpl/bind/dist/bin/tests/system/verify/
H A Dclean.sh16 rm -f zones/*.bad
17 rm -f zones/*.good
18 rm -f zones/*.out*
19 rm -f zones/*.tmp
20 rm -f zones/K*
21 rm -f zones/dsset-*
H A Dtests.sh25 for file in zones/*.good
40 for file in zones/*.bad
98 $VERIFY zones/ksk+zsk.nsec.good > verify.out.$n 2>&1 && ret=1
106 $VERIFY -o invalid.origin zones/ksk+zsk.nsec.good > verify.out.$n 2>&1 && ret=1
/netbsd/external/mpl/bind/dist/contrib/dlz/modules/perl/testing/
H A Ddlz_perl_example.pm49 $self->{zones} = {
98 . Dumper( $self->{zones} )
111 return exists $self->{zones}->{$zone};
125 return unless $self->{zones}->{$zone}->{$name};
128 foreach my $rr ( @{ $self->{zones}->{$zone}->{$name} } ) {
165 foreach my $name ( keys %{ $self->{zones}->{$zone} } ) {
166 foreach my $rr ( @{ $self->{zones}->{$zone}->{$name} } ) {
/netbsd/external/mpl/bind/dist/bin/tests/system/catz/
H A Dtests.sh235 update delete e721433b6160b450260d4f54b3ec8bab30cb3b83.zones.catalog1.example
293 update add trash3.zones.catalog1.example. 3600 IN NS a.dom2.example.
445 update delete trash3.zones.catalog1.example. 3600 IN NS a.dom2.example.
475 update add somerandomlabel.zones.catalog1.example. 3600 IN PTR dom5.example.
476 update add masters.somerandomlabel.zones.catalog1.example. 3600 IN A 10.53.0.3
1024 update add ${hash}.zones.catalog1.example 3600 IN PTR ${special}.
1057 update delete ${hash}.zones.catalog1.example
1195 update delete 0580d70e769c86c8b951a488d8b776627f427d7a.zones.catalog1.example
1227 update delete 25557e0bdd10cb3710199bb421b776df160f241e.zones.catalog1.example
1673 update add dom15label1.zones.catalog1.example. 3600 IN PTR dom15.example.
[all …]
/netbsd/external/bsd/nsd/dist/doc/
H A DUPGRADING17 * zones listed in nsd.conf are served.
18 * the zonelistfile: setting sets the file where zones that are
22 use the patterns to give config settings for the zones.
23 * patterns accept the same sort of settings which NSD3-zones did.
29 * if there is no zonefile (for slave zones) it is not used.
34 * if you nsd-control reconfig it rereads the config file for zones.
40 and write slave zones that have changed to their zonefile.
41 * other nsdc commands, reconfig (reread patterns, zones, keys),
67 * For secondary zones include in the zone entry:
70 * For master zones include in the zone entry:
[all …]
H A DNSD-4-features19 write". This would periodically write the contents of changed zones to
23 The SIGHUP makes NSD4 check zone file timestamps and reload changed zones.
42 the dynamically added zones and their pattern. It is read and written
67 they create a zone, these zones added and removed by a restart or the
70 those zones are in the zones.list file. The zone can have the normal
97 zones that have been added and removed in the config file, and it also
115 notify [zone] : for master zones here, send notifies to its slaves.
116 If you specify a name, only that zone, otherwise all master zones.
118 transfer [zone] : for slave zones here, attempt a zone transfer from
120 slave zones.
[all …]
/netbsd/external/mpl/bind/dist/bin/tests/system/addzone/ns2/
H A Dnamed3.conf.in26 new-zones-directory "new-zones";
31 allow-new-zones no;
49 allow-new-zones yes;
59 allow-new-zones yes;
73 allow-new-zones yes;
/netbsd/external/bsd/nsd/dist/contrib/bind2nsd/bind2nsd/
H A DNamedConf.py192 self.zones = {}
206 zlist = self.zones.keys()
209 self.zones[ii].dump()
224 self.zones[name] = zone
228 return self.zones
231 if name in self.zones:
232 return self.zones[name]
H A DNsdConf.py335 self.zones = {}
387 self.zones[z.getName()] = z
398 zlist = self.zones.keys()
401 self.zones[ii].dump(sys.stdout)
420 zlist = self.zones.keys()
424 self.zones[ii].dump(nfile)
503 zlist = self.zones.keys()
506 oldpath = self.oldrootdir + self.zones[ii].getZonefile()
512 incl = self.zones[ii].getInclude()
528 self.zones[name] = zone
[all …]
/netbsd/external/mpl/bind/dist/bin/tests/system/keymgr2kasp/ns3/
H A Dsetup.sh34 echo "$zone" >> zones
48 echo "$zone" >> zones
56 echo "$zone" >> zones
68 echo "$zone" >> zones
86 echo "$zone" >> zones
105 echo "$zone" >> zones
120 echo "$zone" >> zones
/netbsd/external/mpl/bind/dist/contrib/dlz/modules/bdbhpt/testing/
H A Dbdbhpt-populate.pl41 my $zone_list = $opt->{zones};
61 my @zones = split(/\s+/, $zone_list);
62 foreach my $zone (@zones) {
90 foreach my $zone (@zones) {
107 foreach my $zone (@zones) {
123 foreach my $zone (@zones) {
/netbsd/external/mpl/bind/dist/bin/tests/system/rpzrecurse/
H A DREADME18 zones, the response-policy statement, and a root hint zone
20 * The auth server that contains two authoritative zones, l1.l0 and
60 Group 2 - testing skipping recursion with multiple policy zones when all
61 zones have only trigger types eligible to skip recursion with
64 32 policy zones, each containing 1 'qname' trigger (qNN, where NN is
100 skippable for only the appropriate zones based on the order specified in
104 32 policy zones per test, one of which is configured with 1 'ip'
108 test. The 'qname' triggers in the zones are structured so that
109 the zones are tested starting with the first zone and the 'ip'
120 5 policy zones, the 1st, 3rd, and 5th configured with 1 'qname'
H A Dtestgen.pl100 my @zones;
113 @zones = map {
120 print $conf_fh map { qq{ zone "$_->[0]";\n} } @zones;
124 print $conf_fh map { qq{ zone "$_->[0]" { type master; file "db.$_->[0]"; };\n} } @zones;
130 foreach my $policy_zone_info( @zones ) {
/netbsd/external/mpl/bind/dist/lib/dns/
H A Drpz.c834 rpz = rpzs->zones[rpz_num]; in name2ipkey()
1011 rpz = rpzs->zones[rpz_num]; in name2data()
1462 dns_rpz_zones_t *zones; in dns_rpz_new_zones() local
1467 zones = isc_mem_get(mctx, sizeof(*zones)); in dns_rpz_new_zones()
1468 memset(zones, 0, sizeof(*zones)); in dns_rpz_new_zones()
1475 zones->rps_cstr = rps_cstr; in dns_rpz_new_zones()
1486 &zones->rbt); in dns_rpz_new_zones()
1499 zones->timermgr = timermgr; in dns_rpz_new_zones()
1500 zones->taskmgr = taskmgr; in dns_rpz_new_zones()
1502 *rpzsp = zones; in dns_rpz_new_zones()
[all …]
/netbsd/external/mpl/bind/dist/bin/python/isc/
H A Dkeydict.py.in30 zones = kwargs.get("zones", None)
32 if not zones:
36 for zone in zones:
77 def zones(self): member in keydict
/netbsd/external/mpl/bind/dist/bin/tests/startperf/
H A Dsetup.sh78 [ -d zones ] || mkdir zones
79 $PERL mkzonefile.pl $zonename $nrecords > zones/$zonename.db
/netbsd/external/mpl/bind/dist/doc/notes/
H A Dnotes-9.16.34.rst21 - ``type primary`` zones configured with ``dnssec-policy`` but without
23 - ``type secondary`` zones configured with ``dnssec-policy``.
45 - Changing just the TSIG key names for primaries in catalog zones'
46 member zones was not effective. This has been fixed. :gl:`#3557`

12345678910>>...17