Skip to content
Snippets Groups Projects
Select Git revision
  • 1.3
  • 1.4
  • 1.5
  • 1.6
  • 2.0
  • 2.3
  • base64-is-not-hexdump
  • ci-test
  • clean-cached-cflags
  • default-padding-policy
  • dnssec-cds
  • doc-cleanup
  • edns-keepalive
  • experiment-dnssec-rsa-pss
  • fine-grained-mtime
  • http-to-https
  • journal
  • journal2
  • kntimers
  • libuv-tcp
  • v2.3.2
  • v2.3.1
  • v1.6.8
  • v2.3.0
  • v2.2.1
  • v2.2.0
  • v2.1.1
  • v1.6.7
  • v2.1.1-test
  • v2.1.0
  • v2.1.0-rc1
  • v1.6.6
  • v2.0.2
  • v2.0.1
  • v1.6.5-rosedb
  • v1.6.5
  • v2.0.0
  • v1.6.4-rosedb
  • v1.6.4
  • v2.0.0-rc1
40 results
You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.021Jan20191815141387543231Dec302928232221191817161514131211109875432127Nov262524222120191814131211107654331Oct3029242322212019181716151413121110987632130Sep292826[dnssec] ZSK lifetime in policy[dnssec] ZSK rotation events enumsjitter: Batch info moved to separate structure.errors, support for lmdb codes in knot_strerroruse libdnssec error codes instead of generic oneserrors, libdnssec codes support int knot_strerror[dnssec] error, fallback message containing error code number[dnssec] errors, change error range to different from libknoterror, change libknot error rangerequestor: net api fixes for connected UDP sockets on some platformsprocessing: add missing include (NetBSD warning)fix zone resign scheduling after DDNS updatesfix infinite signing loop when no events are planned[dnssec] smarter initial keys generating[dnssec] add 'created' timestamp for zone keystests: add tests for yparserlibknot: add yparserjitter: R%emoved obsolete comments.consider DNSSEC events when scheduling zone resignjitter: Proper way of saving min. expiration time.jitter: Fixes in policy setting.do not run DNSSEC events when no policy is setnamedb: remove dname.h inclusionfunctional tests: no DNSSEC changes allowed via DDNSignore DNSSEC_KEY_ALREADY_PRESENT error when loading private key[dnssec] KASP events, set dname and flags for new keys[dnssec] KASP events, fix checking for initial keysenable DNSSEC event processing in serverrequestor: cancel on no datarequestor: don't connect unless requestedjitter: Fixed NSEC chain signing.rewrite zone signing pipelineupdate zone signing to use new context APImove RR set signing into server, use new context APIkey loading based on new DNSSEC contextDNSSEC policy update from zonecleanupsnew DNSSEC context for RR set signing[dnssec] dnssec_kasp_zone_get_name()[dnssec] policy, add signature refresh and NSEC3 mode
Loading