1# Copyright (C) 2011-2014  Internet Systems Consortium, Inc. ("ISC")
2#
3# Permission to use, copy, modify, and/or distribute this software for any
4# purpose with or without fee is hereby granted, provided that the above
5# copyright notice and this permission notice appear in all copies.
6#
7# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
8# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
9# AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
10# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
11# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
12# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
13# PERFORMANCE OF THIS SOFTWARE.
14
15# Clean up after rpz tests.
16
17rm -f proto.* dsset-* trusted.conf dig.out* nsupdate.tmp ns*/*tmp
18rm -f ns*/*.key ns*/*.private ns2/tld2s.db ns2/bl.tld2.db
19rm -f ns3/bl*.db ns*/*switch ns*/empty.db ns*/empty.db.jnl
20rm -f ns5/requests ns5/example.db ns5/bl.db ns5/*.perf
21rm -f */named.memstats */named.run */named.stats */session.key
22rm -f */*.jnl */*.core */*.pid
23rm -f */policy2.db
24