/dports/sysutils/docker-registry/distribution-2.7.1/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 266 rr.Hdr.Name = rrset[0].Header().Name 267 rr.Hdr.Class = rrset[0].Header().Class 269 rr.OrigTtl = rrset[0].Header().Ttl 271 rr.TypeCovered = rrset[0].Header().Rrtype 296 wire, err := rawSignatureData(rrset, rr) 367 if !IsRRset(rrset) { 389 if rrset[0].Header().Class != rr.Hdr.Class { 392 if rrset[0].Header().Rrtype != rr.TypeCovered { 414 wire, err := rawSignatureData(rrset, rr) 594 wires := make(wireSlice, len(rrset)) [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/distribution/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 266 rr.Hdr.Name = rrset[0].Header().Name 267 rr.Hdr.Class = rrset[0].Header().Class 269 rr.OrigTtl = rrset[0].Header().Ttl 271 rr.TypeCovered = rrset[0].Header().Rrtype 296 wire, err := rawSignatureData(rrset, rr) 367 if !IsRRset(rrset) { 389 if rrset[0].Header().Class != rr.Hdr.Class { 392 if rrset[0].Header().Rrtype != rr.TypeCovered { 414 wire, err := rawSignatureData(rrset, rr) 594 wires := make(wireSlice, len(rrset)) [all …]
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/consul/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 264 rr.Hdr.Name = rrset[0].Header().Name 265 rr.Hdr.Class = rrset[0].Header().Class 267 rr.OrigTtl = rrset[0].Header().Ttl 269 rr.TypeCovered = rrset[0].Header().Rrtype 294 wire, err := rawSignatureData(rrset, rr) 365 if !IsRRset(rrset) { 387 if rrset[0].Header().Class != rr.Hdr.Class { 390 if rrset[0].Header().Rrtype != rr.TypeCovered { 412 wire, err := rawSignatureData(rrset, rr) 593 wires := make(wireSlice, len(rrset)) [all …]
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/surface/dns/response_policies/rules/ |
H A D | create.py | 92 for rrset in args.local_data: 94 name=rrset.get('name'), 95 type=rrset.get('type'), 96 ttl=rrset.get('ttl'), 97 rrdatas=rrset.get('rrdatas').split('|'))
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/dns/ |
H A D | resolver.py | 211 rrset = None 240 self.rrset = rrset 241 if rrset is None: 262 return self.rrset.name 264 return self.rrset.ttl 266 return self.rrset.covers 270 return self.rrset.rdtype 275 return self.rrset and len(self.rrset) or 0 278 return self.rrset and iter(self.rrset) or iter(tuple()) 281 return self.rrset[i] [all …]
|
H A D | query.py | 430 rrset = dns.rrset.from_text(zone, 0, 'IN', 'SOA', 432 q.authority.append(rrset) 491 rrset = r.answer[0] 492 if rrset.rdtype != dns.rdatatype.SOA: 495 soa_rrset = rrset.copy() 508 for rrset in r.answer[answer_index:]: 511 if rrset.rdtype == dns.rdatatype.SOA and rrset.name == oname: 513 if rrset[0].serial != serial: 524 if rrset == soa_rrset and \
|
H A D | dnssec.py | 232 def _validate_rrsig(rrset, rrsig, keys, origin=None, now=None): argument 262 if isinstance(rrset, tuple): 263 rrname = rrset[0] 264 rdataset = rrset[1] 266 rrname = rrset.name 267 rdataset = rrset 376 def _validate(rrset, rrsigset, keys, origin=None, now=None): argument 398 if isinstance(rrset, tuple): 399 rrname = rrset[0] 401 rrname = rrset.name [all …]
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/bin/tests/system/limits/ |
H A D | tests.sh | 39 $DIG $DIGOPTS +tcp +norec +noedns a-maximum-rrset.example. @10.53.0.1 a > dig.out.a-maximum-rrset \ 42 digcomp knowngood.dig.out.a-maximum-rrset dig.out.a-maximum-rrset || status=1
|
/dports/finance/electrum/Electrum-4.1.5/packages/dns/ |
H A D | resolver.py | 210 rrset = None 235 self.rrset = rrset 236 if rrset is None: 257 return self.rrset.name 259 return self.rrset.ttl 270 return self.rrset and len(self.rrset) or 0 273 return self.rrset and iter(self.rrset) or iter(tuple()) 276 if self.rrset is None: 278 return self.rrset[i] 281 if self.rrset is None: [all …]
|
/dports/multimedia/tautulli/Tautulli-2.8.0/lib/dns/ |
H A D | resolver.py | 210 rrset = None 235 self.rrset = rrset 236 if rrset is None: 257 return self.rrset.name 259 return self.rrset.ttl 270 return self.rrset and len(self.rrset) or 0 273 return self.rrset and iter(self.rrset) or iter(tuple()) 276 if self.rrset is None: 278 return self.rrset[i] 281 if self.rrset is None: [all …]
|
/dports/net/kea/kea-2.0.1/src/lib/dns/ |
H A D | zone_checker.cc | 40 ConstRRsetPtr rrset = in checkSOA() local 43 if (rrset) { in checkSOA() 44 for (RdataIteratorPtr rit = rrset->getRdataIterator(); in checkSOA() 155 ConstRRsetPtr rrset = in checkNS() local 157 if (rrset == NULL) { in checkNS() 162 checkNSNames(zone_name, zone_class, zone_rrsets, rrset, callbacks); in checkNS()
|
/dports/dns/bind911/bind-9.11.37/bin/tests/system/limits/ |
H A D | tests.sh | 40 $DIG $DIGOPTS +tcp +norec +noedns a-maximum-rrset.example. @10.53.0.1 a > dig.out.a-maximum-rrset \ 43 digcomp knowngood.dig.out.a-maximum-rrset dig.out.a-maximum-rrset || status=1
|
/dports/dns/bind916/bind-9.16.27/bin/tests/system/limits/ |
H A D | tests.sh | 42 $DIG $DIGOPTS +tcp +norec +noedns a-maximum-rrset.example. @10.53.0.1 a > dig.out.a-maximum-rrset \ 45 digcomp knowngood.dig.out.a-maximum-rrset dig.out.a-maximum-rrset || status=1
|
/dports/dns/bind-tools/bind-9.16.27/bin/tests/system/limits/ |
H A D | tests.sh | 42 $DIG $DIGOPTS +tcp +norec +noedns a-maximum-rrset.example. @10.53.0.1 a > dig.out.a-maximum-rrset \ 45 digcomp knowngood.dig.out.a-maximum-rrset dig.out.a-maximum-rrset || status=1
|
/dports/dns/samba-nsupdate/bind-9.16.5/bin/tests/system/limits/ |
H A D | tests.sh | 40 $DIG $DIGOPTS +tcp +norec +noedns a-maximum-rrset.example. @10.53.0.1 a > dig.out.a-maximum-rrset \ 43 digcomp knowngood.dig.out.a-maximum-rrset dig.out.a-maximum-rrset || status=1
|
/dports/dns/p5-DNS-Ldns/ldns-1.8.1/contrib/DNS-LDNS/t/ |
H A D | rrlist.t | 39 ok($l2->is_rrset, 'List is rrset'); 40 ok(!$list->is_rrset, 'List is no longer an rrset'); 41 my $rrset = $list->pop_rrset; 42 ok($rrset->is_rrset, 'Popped list is rrset'); 43 is($rrset->rr_count, 2, 'Popped rrset has two elements.'); 47 ok($rrset->contains_rr($rr), 'RRSet contains rr '.$rr->to_string);
|
/dports/dns/py-namebench/namebench-1.3.1/nb_third_party/dns/ |
H A D | update.py | 67 rrset = self.find_rrset(section, name, self.zone_rdclass, rd.rdtype, 69 rrset.add(rd, ttl) 137 rrset = self.find_rrset(self.authority, name, dns.rdataclass.ANY, 154 rrset = self.find_rrset(self.authority, name, 195 rrset = self.find_rrset(self.answer, name, 211 rrset = self.find_rrset(self.answer, name, 223 rrset = self.find_rrset(self.answer, name, 230 rrset = self.find_rrset(self.answer, name,
|
/dports/dns/py-ldns/ldns-1.8.1/contrib/DNS-LDNS/t/ |
H A D | rrlist.t | 39 ok($l2->is_rrset, 'List is rrset'); 40 ok(!$list->is_rrset, 'List is no longer an rrset'); 41 my $rrset = $list->pop_rrset; 42 ok($rrset->is_rrset, 'Popped list is rrset'); 43 is($rrset->rr_count, 2, 'Popped rrset has two elements.'); 47 ok($rrset->contains_rr($rr), 'RRSet contains rr '.$rr->to_string);
|
/dports/dns/ldns/ldns-1.8.1/contrib/DNS-LDNS/t/ |
H A D | rrlist.t | 39 ok($l2->is_rrset, 'List is rrset'); 40 ok(!$list->is_rrset, 'List is no longer an rrset'); 41 my $rrset = $list->pop_rrset; 42 ok($rrset->is_rrset, 'Popped list is rrset'); 43 is($rrset->rr_count, 2, 'Popped rrset has two elements.'); 47 ok($rrset->contains_rr($rr), 'RRSet contains rr '.$rr->to_string);
|
/dports/dns/opendnssec2/opendnssec-2.1.10/signer/src/adapter/ |
H A D | adapi.c | 401 rrset_type* rrset = NULL; in adapi_printaxfr() local 410 rrset = zone_lookup_rrset(zone, zone->apex, LDNS_RR_TYPE_SOA); in adapi_printaxfr() 411 ods_log_assert(rrset); in adapi_printaxfr() 412 rrset_print(fd, rrset, 1, &status); in adapi_printaxfr() 425 rrset_type* rrset = NULL; in adapi_printixfr() local 436 rrset = zone_lookup_rrset(zone, zone->apex, LDNS_RR_TYPE_SOA); in adapi_printixfr() 437 ods_log_assert(rrset); in adapi_printixfr() 438 rrset_print(fd, rrset, 1, &status); in adapi_printixfr() 447 rrset_print(fd, rrset, 1, &status); in adapi_printixfr()
|
/dports/dns/dnsviz/dnsviz-0.9.2/dnsviz/analysis/ |
H A D | offline.py | 172 self.serial = rrset[0].serial 173 self.rname = rrset[0].rname 174 self.mname = rrset[0].mname 177 for dnskey in rrset: 187 for ds in rrset: 211 … if not (dnskey_info.rrset.name == self.name and dnskey_info.rrset.rdtype == dns.rdatatype.DNSKEY): 424 for d in info.rrset: 902 self.yxrrset.add((rrset_info.rrset.name, rrset_info.rrset.rdtype)) 907 self.yxrrset_proper.add((rrset_info.rrset.name, rrset_info.rrset.rdtype)) 912 self.yxrrset.add((cname_rrset_info.rrset.name, cname_rrset_info.rrset.rdtype)) [all …]
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/dns/ |
H A D | dnssec.py | 274 def _validate_rrsig(rrset, rrsig, keys, origin=None, now=None): argument 305 if isinstance(rrset, tuple): 306 rrname = rrset[0] 307 rdataset = rrset[1] 309 rrname = rrset.name 310 rdataset = rrset 427 def _validate(rrset, rrsigset, keys, origin=None, now=None): argument 449 if isinstance(rrset, tuple): 450 rrname = rrset[0] 452 rrname = rrset.name [all …]
|
/dports/dns/py-dnspython/dnspython-1.16.0/dns/ |
H A D | dnssec.py | 274 def _validate_rrsig(rrset, rrsig, keys, origin=None, now=None): argument 305 if isinstance(rrset, tuple): 306 rrname = rrset[0] 307 rdataset = rrset[1] 309 rrname = rrset.name 310 rdataset = rrset 427 def _validate(rrset, rrsigset, keys, origin=None, now=None): argument 449 if isinstance(rrset, tuple): 450 rrname = rrset[0] 452 rrname = rrset.name [all …]
|
/dports/net/py-libcloud/apache-libcloud-3.4.1/libcloud/dns/drivers/ |
H A D | rcodezero.py | 483 rrset = {} 489 rrset['name'] = name + '.' + zone + '.' 491 rrset['name'] = zone + '.' 493 rrset['type'] = type 494 rrset['changetype'] = action 495 rrset['records'] = [] 497 rrset['ttl'] = extra['ttl'] 504 rrset['records'].append(content) 517 rrset['changetype'] = 'update' 523 rrset['records'].append(content) [all …]
|
/dports/dns/knot3-lib/knot-3.1.5/src/knot/dnssec/ |
H A D | zone-sign.c | 53 knot_rrset_t rrset; in rrset_init_from() local 55 return rrset; in rrset_init_from() 492 knot_rrset_t rrset = node_rrset_at(node, i); in sign_node_rrsets() local 493 assert(rrset.type != KNOT_RRTYPE_ANY); in sign_node_rrsets() 497 result = remove_rrset_rrsigs(rrset.owner, rrset.type, &rrsigs, changeset); in sign_node_rrsets() 506 hint->rrtype = rrset.type; in sign_node_rrsets() 509 result = force_resign_rrset(&rrset, &rrsigs, in sign_node_rrsets() 699 if (rrset == NULL || zone_key == NULL) { in rrset_add_zone_key() 711 assert(rrset); in rrset_add_zone_ds() 1042 if (!(rrset->type == KNOT_RRTYPE_NSEC || in knot_zone_sign_rr_should_be_signed() [all …]
|