Home
last modified time | relevance | path

Searched full:apex (Results 1 – 25 of 35) sorted by relevance

12

/freebsd/contrib/unbound/services/
H A Dauthzone.c1710 /* if this is zone apex, write SOA first */ in auth_zone_write_domain()
1880 struct auth_data* apex; in auth_zone_zonemd_check_hash() local
1896 apex = az_find_name(z, z->name, z->namelen); in auth_zone_zonemd_check_hash()
1897 if(!apex) { in auth_zone_zonemd_check_hash()
1898 *reason = "zone has no apex"; in auth_zone_zonemd_check_hash()
1901 zonemd_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_ZONEMD); in auth_zone_zonemd_check_hash()
1983 /** find the apex SOA RRset, if it exists */
1986 struct auth_data* apex; in auth_zone_get_soa_rrset() local
1988 apex = az_find_name(z, z->name, z->namelen); in auth_zone_get_soa_rrset()
1989 if(!apex) return NULL; in auth_zone_get_soa_rrset()
[all …]
H A Dlocalzone.h78 /** answer with data at zone apex */
163 /** if data contains zone apex SOA data, this is a ptr to it. */
165 /** if data contains zone apex SOA data, this is a ptr to an
H A Dauthzone.h643 /** find the apex SOA RRset, if it exists. NULL if no SOA RRset. */
715 * omits zonemd at apex and its RRSIG from the digest.
/freebsd/contrib/ldns/
H A Ddnssec_zone.c1311 /* Make sure the i->name is "in zone" (i.e. below the apex) */
1315 while (i->name && name != i->apex_name /* not apex */
1318 || ldns_dname_compare(name, i->apex_name)) /* not apex */
1735 ldns_rdf *apex_name; /* name of zone apex */
1744 /* Skip apex ZONEMD RRs */
1748 /* Skip RRSIGs for apex ZONEMD RRs */
1779 /* we need proof of non-existence for ZONEMD at the apex */
1801 /* ZONEMD at apex does really not exist */
1949 rrset_ref = &zone->soa->rrsets; /* scan rrsets at apex */
H A DChangelog320 * Fix ldns_nsec_covers_name for zones with an apex only. Thanks Miek.
430 * bugfix #392: Apex only and percentage checks for ldns-verify-zone
585 * Fix NSEC record after DNSKEY at zone apex not properly signed.
/freebsd/contrib/unbound/util/data/
H A Ddname.h178 * Such that zone contents follows zone apex.
275 * @param lenlimit: length limit that we can't surpass (usually the zone apex).
309 * Such that zone contents follows zone apex.
H A Dpacked_rrset.h52 /** this rrset is NSEC and is at zone apex (at child side of zonecut) */
H A Dmsgparse.c113 /** See if next rrset is nsec at zone apex */
509 /* if NSEC try with NSEC apex bit twiddled */ in find_rrset()
/freebsd/sys/contrib/device-tree/Bindings/iio/imu/
H A Dinvensense,icm42600.yaml20 Other industry-leading features include InvenSense on-chip APEX Motion
/freebsd/usr.sbin/services_mkdb/
H A Dservices1446 apex-mesh 912/tcp #APEX relay-relay service
1447 apex-mesh 912/udp #APEX relay-relay service
1448 apex-edge 913/tcp #APEX endpoint-relay service
1449 apex-edge 913/udp #APEX endpoint-relay service
/freebsd/contrib/ntp/html/
H A Dfilter.html20 …Figure 1, where the scattergram is symmetric about the x axis through the apex sample. In configur…
/freebsd/contrib/unbound/validator/
H A Dval_nsec3.c822 /* check the owner name is a hashed value . apex in nsec3_covers()
849 * this also covers the only-apex case of next==owner. in nsec3_covers()
946 /* (David:) FIXME: modify so that the NSEC3 matching the zone apex need in nsec3_find_closest_encloser()
948 * (Wouter:) But make sure you check for DNAME bit in zone apex, in nsec3_find_closest_encloser()
1248 verbose(VERB_ALGO, "proveNodata: apex NSEC3 " in nsec3_do_prove_nodata()
H A Dval_nsec.c395 * zone cut, not a zone apex), then we should have gotten a in nsec_proves_nodata()
H A Dval_neg.c699 /* sanity check, both owner and end must be below the zone apex */ in wipeout()
/freebsd/contrib/ldns/ldns/
H A Ddnssec_zone.h471 * If a NSEC3PARAM is available in the apex, walks the zone and returns true
/freebsd/contrib/unbound/services/cache/
H A Dinfra.h290 * @param name: domain name of zone apex.
H A Ddns.c449 * side of the zone cut, not the NSEC at apex side. */ in find_add_ds()
/freebsd/contrib/llvm-project/libcxx/include/__pstl/internal/
H A Dparallel_backend_tbb.h
/freebsd/contrib/unbound/util/
H A Dconfig_file.h819 /** domain name (in text) of the stub apex domain */
843 /** domain name (in text) of the auth apex domain */
/freebsd/contrib/ldns/drill/
H A Dsecuretrace.c280 of course if the data is in the apex, there are, so cover both in do_secure_trace()
/freebsd/contrib/pam_modules/pam_passwdqc/
H A Dwordset_4k.c379 "apex",
/freebsd/contrib/unbound/iterator/
H A Diter_utils.c998 /* a DNSKEY set is expected at the zone apex as well */
/freebsd/contrib/unbound/doc/
H A DChangelog230 broken auth zones that include unsigned out of zone (above apex)
9002 - Fix RFC4035 compliance with 2.2 statement that the DNSKEY at apex
9603 for qtype DNSKEY (assumes DNSKEY occurs at zone apex).
10795 - dnssec lameness detection works on first query at trust apex.
10810 - fixup DS test so apex nodata works again.
11811 delegation, for abuse of child zone apex nsec3.
11907 - DNAMEs no longer match their apex when synthesized from the cache.
/freebsd/contrib/unbound/testcode/
H A Dunitdname.c332 /* contents follow the zone apex */ in dname_test_dname_lab_cmp()
/freebsd/sys/dev/usb/
H A Dusbdevs321 vendor APEX 0x0624 Apex

12