1# Copyright (C) 2011-2014 Internet Systems Consortium, Inc. ("ISC") 2# 3# Permission to use, copy, modify, and/or distribute this software for any 4# purpose with or without fee is hereby granted, provided that the above 5# copyright notice and this permission notice appear in all copies. 6# 7# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 8# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 9# AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 10# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 11# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 12# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 13# PERFORMANCE OF THIS SOFTWARE. 14 15# Clean up after rpz tests. 16 17rm -f proto.* dsset-* trusted.conf dig.out* nsupdate.tmp ns*/*tmp 18rm -f ns*/*.key ns*/*.private ns2/tld2s.db ns2/bl.tld2.db 19rm -f ns3/bl*.db ns*/*switch ns*/empty.db ns*/empty.db.jnl 20rm -f ns5/requests ns5/example.db ns5/bl.db ns5/*.perf 21rm -f */named.memstats */named.run */named.stats */session.key 22rm -f */*.jnl */*.core */*.pid 23rm -f */policy2.db 24