| /freebsd/contrib/unbound/services/ |
| H A D | authzone.c | 1710 /* if this is zone apex, write SOA first */ in auth_zone_write_domain() 1880 struct auth_data* apex; in auth_zone_zonemd_check_hash() local 1896 apex = az_find_name(z, z->name, z->namelen); in auth_zone_zonemd_check_hash() 1897 if(!apex) { in auth_zone_zonemd_check_hash() 1898 *reason = "zone has no apex"; in auth_zone_zonemd_check_hash() 1901 zonemd_rrset = az_domain_rrset(apex, LDNS_RR_TYPE_ZONEMD); in auth_zone_zonemd_check_hash() 1983 /** find the apex SOA RRset, if it exists */ 1986 struct auth_data* apex; in auth_zone_get_soa_rrset() local 1988 apex = az_find_name(z, z->name, z->namelen); in auth_zone_get_soa_rrset() 1989 if(!apex) return NULL; in auth_zone_get_soa_rrset() [all …]
|
| H A D | localzone.h | 78 /** answer with data at zone apex */ 163 /** if data contains zone apex SOA data, this is a ptr to it. */ 165 /** if data contains zone apex SOA data, this is a ptr to an
|
| H A D | authzone.h | 643 /** find the apex SOA RRset, if it exists. NULL if no SOA RRset. */ 715 * omits zonemd at apex and its RRSIG from the digest.
|
| /freebsd/contrib/ldns/ |
| H A D | dnssec_zone.c | 1311 /* Make sure the i->name is "in zone" (i.e. below the apex) */ 1315 while (i->name && name != i->apex_name /* not apex */ 1318 || ldns_dname_compare(name, i->apex_name)) /* not apex */ 1735 ldns_rdf *apex_name; /* name of zone apex */ 1744 /* Skip apex ZONEMD RRs */ 1748 /* Skip RRSIGs for apex ZONEMD RRs */ 1779 /* we need proof of non-existence for ZONEMD at the apex */ 1801 /* ZONEMD at apex does really not exist */ 1949 rrset_ref = &zone->soa->rrsets; /* scan rrsets at apex */
|
| H A D | Changelog | 320 * Fix ldns_nsec_covers_name for zones with an apex only. Thanks Miek. 430 * bugfix #392: Apex only and percentage checks for ldns-verify-zone 585 * Fix NSEC record after DNSKEY at zone apex not properly signed.
|
| /freebsd/contrib/unbound/util/data/ |
| H A D | dname.h | 178 * Such that zone contents follows zone apex. 275 * @param lenlimit: length limit that we can't surpass (usually the zone apex). 309 * Such that zone contents follows zone apex.
|
| H A D | packed_rrset.h | 52 /** this rrset is NSEC and is at zone apex (at child side of zonecut) */
|
| H A D | msgparse.c | 113 /** See if next rrset is nsec at zone apex */ 509 /* if NSEC try with NSEC apex bit twiddled */ in find_rrset()
|
| /freebsd/sys/contrib/device-tree/Bindings/iio/imu/ |
| H A D | invensense,icm42600.yaml | 20 Other industry-leading features include InvenSense on-chip APEX Motion
|
| /freebsd/usr.sbin/services_mkdb/ |
| H A D | services | 1446 apex-mesh 912/tcp #APEX relay-relay service 1447 apex-mesh 912/udp #APEX relay-relay service 1448 apex-edge 913/tcp #APEX endpoint-relay service 1449 apex-edge 913/udp #APEX endpoint-relay service
|
| /freebsd/contrib/ntp/html/ |
| H A D | filter.html | 20 …Figure 1, where the scattergram is symmetric about the x axis through the apex sample. In configur…
|
| /freebsd/contrib/unbound/validator/ |
| H A D | val_nsec3.c | 822 /* check the owner name is a hashed value . apex in nsec3_covers() 849 * this also covers the only-apex case of next==owner. in nsec3_covers() 946 /* (David:) FIXME: modify so that the NSEC3 matching the zone apex need in nsec3_find_closest_encloser() 948 * (Wouter:) But make sure you check for DNAME bit in zone apex, in nsec3_find_closest_encloser() 1248 verbose(VERB_ALGO, "proveNodata: apex NSEC3 " in nsec3_do_prove_nodata()
|
| H A D | val_nsec.c | 395 * zone cut, not a zone apex), then we should have gotten a in nsec_proves_nodata()
|
| H A D | val_neg.c | 699 /* sanity check, both owner and end must be below the zone apex */ in wipeout()
|
| /freebsd/contrib/ldns/ldns/ |
| H A D | dnssec_zone.h | 471 * If a NSEC3PARAM is available in the apex, walks the zone and returns true
|
| /freebsd/contrib/unbound/services/cache/ |
| H A D | infra.h | 290 * @param name: domain name of zone apex.
|
| H A D | dns.c | 449 * side of the zone cut, not the NSEC at apex side. */ in find_add_ds()
|
| /freebsd/contrib/llvm-project/libcxx/include/__pstl/internal/ |
| H A D | parallel_backend_tbb.h | |
| /freebsd/contrib/unbound/util/ |
| H A D | config_file.h | 819 /** domain name (in text) of the stub apex domain */ 843 /** domain name (in text) of the auth apex domain */
|
| /freebsd/contrib/ldns/drill/ |
| H A D | securetrace.c | 280 of course if the data is in the apex, there are, so cover both in do_secure_trace()
|
| /freebsd/contrib/pam_modules/pam_passwdqc/ |
| H A D | wordset_4k.c | 379 "apex",
|
| /freebsd/contrib/unbound/iterator/ |
| H A D | iter_utils.c | 998 /* a DNSKEY set is expected at the zone apex as well */
|
| /freebsd/contrib/unbound/doc/ |
| H A D | Changelog | 230 broken auth zones that include unsigned out of zone (above apex) 9002 - Fix RFC4035 compliance with 2.2 statement that the DNSKEY at apex 9603 for qtype DNSKEY (assumes DNSKEY occurs at zone apex). 10795 - dnssec lameness detection works on first query at trust apex. 10810 - fixup DS test so apex nodata works again. 11811 delegation, for abuse of child zone apex nsec3. 11907 - DNAMEs no longer match their apex when synthesized from the cache.
|
| /freebsd/contrib/unbound/testcode/ |
| H A D | unitdname.c | 332 /* contents follow the zone apex */ in dname_test_dname_lab_cmp()
|
| /freebsd/sys/dev/usb/ |
| H A D | usbdevs | 321 vendor APEX 0x0624 Apex
|