/netbsd/external/mpl/bind/dist/bin/tests/system/statschannel/ |
H A D | tests.sh | 199 cat zones.expect | sort > zones.expect.$n 205 cmp zones.out.x$n zones.expect.$n || ret=1 209 cmp zones.out.j$n zones.expect.$n || ret=1 229 cat zones.expect | sort > zones.expect.$n 235 cmp zones.out.x$n zones.expect.$n || ret=1 239 cmp zones.out.j$n zones.expect.$n || ret=1 257 cat zones.expect | sort > zones.expect.$n 262 cmp zones.out.x$n zones.expect.$n || ret=1 298 cat zones.expect | sort > zones.expect.$n 341 cat zones.expect | sort > zones.expect.$n [all …]
|
H A D | generic.py | 76 zones = fetch_zones(statsip, statsport) 78 for zone in zones: 89 zones = fetch_zones(statsip, statsport) 91 for zone in zones: 101 zones = fetch_zones(statsip, statsport) 103 for zone in zones:
|
H A D | clean.sh | 31 rm -f zones zones.out.* zones.json.* zones.xml.* zones.expect.*
|
/netbsd/external/mpl/bind/dist/bin/tests/system/checkzone/ |
H A D | tests.sh | 20 for db in zones/good*.db 25 zones/good-gc-msdcs.db|zones/good-spf-exception.db) 28 zones/good-dns-sd-reverse.db) 40 for db in zones/bad*.db 45 zones/bad-dns-sd-reverse.db|zones/bad-svcb-servername.db) 60 $CHECKZONE -D -o test.orig.db test zones/test1.db > /dev/null 2>&1 || ret=1 61 $CHECKZONE -D -o test.changed.db test zones/test2.db > /dev/null 2>&1 || ret=1 76 $CHECKZONE example zones/spf.db > test.out1.$n 2>&1 || ret=1 77 $CHECKZONE -T ignore example zones/spf.db > test.out2.$n 2>&1 || ret=1 90 $CHECKZONE -l 300 example zones/good1.db > test.out1.$n 2>&1 && ret=1 [all …]
|
H A D | setup.sh | 20 zones/good1.db > /dev/null 2>&1 22 zones/good1.db > /dev/null 2>&1 24 copy_setports zones/bad-tsig.db.in zones/bad-tsig.db
|
/netbsd/external/bsd/unbound/dist/services/ |
H A D | localzone.c | 89 lock_rw_rdlock(&zones->lock); in local_zones_print() 94 lock_rw_unlock(&zones->lock); in local_zones_print() 101 sizeof(*zones)); in local_zones_create() 102 if(!zones) in local_zones_create() 105 lock_rw_init(&zones->lock); in local_zones_create() 106 lock_protect(&zones->lock, &zones->ztree, sizeof(zones->ztree)); in local_zones_create() 108 return zones; in local_zones_create() 122 if(!zones) in local_zones_delete() 127 free(zones); in local_zones_delete() 222 lock_rw_wrlock(&zones->lock); in lz_enter_zone_dname() [all …]
|
H A D | localzone.h | 216 void local_zones_delete(struct local_zones* zones); 265 struct local_zone* local_zones_tags_lookup(struct local_zones* zones, 281 struct local_zone* local_zones_lookup(struct local_zones* zones, 289 void local_zones_print(struct local_zones* zones); 322 int local_zones_answer(struct local_zones* zones, struct module_env* env, 375 struct local_zone* local_zones_find(struct local_zones* zones, 390 local_zones_find_le(struct local_zones* zones, 406 struct local_zone* local_zones_add_zone(struct local_zones* zones, 426 int local_zones_add_RR(struct local_zones* zones, const char* rr); 437 void local_zones_del_data(struct local_zones* zones, [all …]
|
/netbsd/external/mpl/bind/dist/doc/arm/ |
H A D | catz.rst | 18 zones to be served, along with their configuration parameters. Zones 21 functionality, the secondary server creates the member zones 30 latest revision of the DNS catalog zones draft can be found here: 39 secondary servers, and/or where the zones being served are changing 46 removes, or reconfigures member zones based on the data received. 87 Catalog zones are configured with a ``catalog-zones`` statement in the 92 catalog-zones { 114 This option, if set to ``yes``, causes member zones to be 117 zones' content is stored locally in a file whose name is 136 ``catalog-zones`` statement in a view automatically turns on [all …]
|
/netbsd/external/mpl/bind/dist/bin/tests/system/verify/ |
H A D | clean.sh | 16 rm -f zones/*.bad 17 rm -f zones/*.good 18 rm -f zones/*.out* 19 rm -f zones/*.tmp 20 rm -f zones/K* 21 rm -f zones/dsset-*
|
H A D | tests.sh | 25 for file in zones/*.good 40 for file in zones/*.bad 98 $VERIFY zones/ksk+zsk.nsec.good > verify.out.$n 2>&1 && ret=1 106 $VERIFY -o invalid.origin zones/ksk+zsk.nsec.good > verify.out.$n 2>&1 && ret=1
|
/netbsd/external/mpl/bind/dist/contrib/dlz/modules/perl/testing/ |
H A D | dlz_perl_example.pm | 49 $self->{zones} = { 98 . Dumper( $self->{zones} ) 111 return exists $self->{zones}->{$zone}; 125 return unless $self->{zones}->{$zone}->{$name}; 128 foreach my $rr ( @{ $self->{zones}->{$zone}->{$name} } ) { 165 foreach my $name ( keys %{ $self->{zones}->{$zone} } ) { 166 foreach my $rr ( @{ $self->{zones}->{$zone}->{$name} } ) {
|
/netbsd/external/mpl/bind/dist/bin/tests/system/catz/ |
H A D | tests.sh | 235 update delete e721433b6160b450260d4f54b3ec8bab30cb3b83.zones.catalog1.example 293 update add trash3.zones.catalog1.example. 3600 IN NS a.dom2.example. 445 update delete trash3.zones.catalog1.example. 3600 IN NS a.dom2.example. 475 update add somerandomlabel.zones.catalog1.example. 3600 IN PTR dom5.example. 476 update add masters.somerandomlabel.zones.catalog1.example. 3600 IN A 10.53.0.3 1024 update add ${hash}.zones.catalog1.example 3600 IN PTR ${special}. 1057 update delete ${hash}.zones.catalog1.example 1195 update delete 0580d70e769c86c8b951a488d8b776627f427d7a.zones.catalog1.example 1227 update delete 25557e0bdd10cb3710199bb421b776df160f241e.zones.catalog1.example 1673 update add dom15label1.zones.catalog1.example. 3600 IN PTR dom15.example. [all …]
|
/netbsd/external/bsd/nsd/dist/doc/ |
H A D | UPGRADING | 17 * zones listed in nsd.conf are served. 18 * the zonelistfile: setting sets the file where zones that are 22 use the patterns to give config settings for the zones. 23 * patterns accept the same sort of settings which NSD3-zones did. 29 * if there is no zonefile (for slave zones) it is not used. 34 * if you nsd-control reconfig it rereads the config file for zones. 40 and write slave zones that have changed to their zonefile. 41 * other nsdc commands, reconfig (reread patterns, zones, keys), 67 * For secondary zones include in the zone entry: 70 * For master zones include in the zone entry: [all …]
|
H A D | NSD-4-features | 19 write". This would periodically write the contents of changed zones to 23 The SIGHUP makes NSD4 check zone file timestamps and reload changed zones. 42 the dynamically added zones and their pattern. It is read and written 67 they create a zone, these zones added and removed by a restart or the 70 those zones are in the zones.list file. The zone can have the normal 97 zones that have been added and removed in the config file, and it also 115 notify [zone] : for master zones here, send notifies to its slaves. 116 If you specify a name, only that zone, otherwise all master zones. 118 transfer [zone] : for slave zones here, attempt a zone transfer from 120 slave zones. [all …]
|
/netbsd/external/mpl/bind/dist/bin/tests/system/addzone/ns2/ |
H A D | named3.conf.in | 26 new-zones-directory "new-zones"; 31 allow-new-zones no; 49 allow-new-zones yes; 59 allow-new-zones yes; 73 allow-new-zones yes;
|
/netbsd/external/bsd/nsd/dist/contrib/bind2nsd/bind2nsd/ |
H A D | NamedConf.py | 192 self.zones = {} 206 zlist = self.zones.keys() 209 self.zones[ii].dump() 224 self.zones[name] = zone 228 return self.zones 231 if name in self.zones: 232 return self.zones[name]
|
H A D | NsdConf.py | 335 self.zones = {} 387 self.zones[z.getName()] = z 398 zlist = self.zones.keys() 401 self.zones[ii].dump(sys.stdout) 420 zlist = self.zones.keys() 424 self.zones[ii].dump(nfile) 503 zlist = self.zones.keys() 506 oldpath = self.oldrootdir + self.zones[ii].getZonefile() 512 incl = self.zones[ii].getInclude() 528 self.zones[name] = zone [all …]
|
/netbsd/external/mpl/bind/dist/bin/tests/system/keymgr2kasp/ns3/ |
H A D | setup.sh | 34 echo "$zone" >> zones 48 echo "$zone" >> zones 56 echo "$zone" >> zones 68 echo "$zone" >> zones 86 echo "$zone" >> zones 105 echo "$zone" >> zones 120 echo "$zone" >> zones
|
/netbsd/external/mpl/bind/dist/contrib/dlz/modules/bdbhpt/testing/ |
H A D | bdbhpt-populate.pl | 41 my $zone_list = $opt->{zones}; 61 my @zones = split(/\s+/, $zone_list); 62 foreach my $zone (@zones) { 90 foreach my $zone (@zones) { 107 foreach my $zone (@zones) { 123 foreach my $zone (@zones) {
|
/netbsd/external/mpl/bind/dist/bin/tests/system/rpzrecurse/ |
H A D | README | 18 zones, the response-policy statement, and a root hint zone 20 * The auth server that contains two authoritative zones, l1.l0 and 60 Group 2 - testing skipping recursion with multiple policy zones when all 61 zones have only trigger types eligible to skip recursion with 64 32 policy zones, each containing 1 'qname' trigger (qNN, where NN is 100 skippable for only the appropriate zones based on the order specified in 104 32 policy zones per test, one of which is configured with 1 'ip' 108 test. The 'qname' triggers in the zones are structured so that 109 the zones are tested starting with the first zone and the 'ip' 120 5 policy zones, the 1st, 3rd, and 5th configured with 1 'qname'
|
H A D | testgen.pl | 100 my @zones; 113 @zones = map { 120 print $conf_fh map { qq{ zone "$_->[0]";\n} } @zones; 124 print $conf_fh map { qq{ zone "$_->[0]" { type master; file "db.$_->[0]"; };\n} } @zones; 130 foreach my $policy_zone_info( @zones ) {
|
/netbsd/external/mpl/bind/dist/lib/dns/ |
H A D | rpz.c | 834 rpz = rpzs->zones[rpz_num]; in name2ipkey() 1011 rpz = rpzs->zones[rpz_num]; in name2data() 1462 dns_rpz_zones_t *zones; in dns_rpz_new_zones() local 1467 zones = isc_mem_get(mctx, sizeof(*zones)); in dns_rpz_new_zones() 1468 memset(zones, 0, sizeof(*zones)); in dns_rpz_new_zones() 1475 zones->rps_cstr = rps_cstr; in dns_rpz_new_zones() 1486 &zones->rbt); in dns_rpz_new_zones() 1499 zones->timermgr = timermgr; in dns_rpz_new_zones() 1500 zones->taskmgr = taskmgr; in dns_rpz_new_zones() 1502 *rpzsp = zones; in dns_rpz_new_zones() [all …]
|
/netbsd/external/mpl/bind/dist/bin/python/isc/ |
H A D | keydict.py.in | 30 zones = kwargs.get("zones", None) 32 if not zones: 36 for zone in zones: 77 def zones(self): member in keydict
|
/netbsd/external/mpl/bind/dist/bin/tests/startperf/ |
H A D | setup.sh | 78 [ -d zones ] || mkdir zones 79 $PERL mkzonefile.pl $zonename $nrecords > zones/$zonename.db
|
/netbsd/external/mpl/bind/dist/doc/notes/ |
H A D | notes-9.16.34.rst | 21 - ``type primary`` zones configured with ``dnssec-policy`` but without 23 - ``type secondary`` zones configured with ``dnssec-policy``. 45 - Changing just the TSIG key names for primaries in catalog zones' 46 member zones was not effective. This has been fixed. :gl:`#3557`
|