Skip to content
Snippets Groups Projects
Select Git revision
  • 1.3 protected
  • 1.4 protected
  • 1.5 protected
  • 1.6 protected
  • 2.0 protected
  • 2.1 protected
  • 2.2 protected
  • 2.3 protected
  • 2.4 protected
  • 2.5 protected
  • 2.6 protected
  • 2.7 protected
  • 2.8 protected
  • 2.9 protected
  • 3.0 protected
  • 3.1 protected
  • 3.2 protected
  • 3.3 protected
  • 3.4 protected
  • DEBUG_TCP_REUSEPORT
  • v3.4.5 protected
  • v3.4.4 protected
  • v3.3.10 protected
  • v3.4.3 protected
  • v3.4.2 protected
  • v3.4.1 protected
  • v3.5.dev protected
  • v3.4.0 protected
  • v3.3.9 protected
  • v3.3.8 protected
  • v3.2.13 protected
  • v3.3.7 protected
  • v3.3.6 protected
  • v3.3.5 protected
  • v3.3.4 protected
  • v3.2.12 protected
  • v3.3.3 protected
  • v3.2.11 protected
  • v3.3.2 protected
  • v3.2.10 protected
40 results
You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.020Jan1918141387543231Dec302928232221191817161514131211109875432127Nov262524222120191814131211107654331Oct3029242322212019181716151413121110987632130Sep292826252423[dnssec] add 'created' timestamp for zone keystests: add tests for yparserlibknot: add yparserconsider DNSSEC events when scheduling zone resigndo not run DNSSEC events when no policy is setnamedb: remove dname.h inclusionfunctional tests: no DNSSEC changes allowed via DDNSignore DNSSEC_KEY_ALREADY_PRESENT error when loading private key[dnssec] KASP events, set dname and flags for new keys[dnssec] KASP events, fix checking for initial keysenable DNSSEC event processing in serverrequestor: cancel on no datarequestor: don't connect unless requestedrewrite zone signing pipelineupdate zone signing to use new context APImove RR set signing into server, use new context APIkey loading based on new DNSSEC contextDNSSEC policy update from zonecleanupsnew DNSSEC context for RR set signing[dnssec] dnssec_kasp_zone_get_name()[dnssec] policy, add signature refresh and NSEC3 mode[dnssec] allow policy without nameserial arithmetic, separate module[dnssec] fix leak in kasp_store testtrie: missing type conversion before abs()remove broken debugDDNS, disallow modifications of all DNSSEC related recordstests: remove temporary databasetests: remove temporary databaseunittests: Fixed leaks in requestor & process_queryfix assertion fail when signing new zonedoc: added meta description to comply with newer Pelican versionsrequestor: wait for readability, discerning process error codezone signing, do not retain unknown DNSKEYs in zone apexlibknot key, void dependency on zscannerzone signing, hide internal structs from headerevents: ignore slave events (refresh, xfer) if master zoneevents: ignore slave events (refresh, xfer) if master zoneremove broken debug
Loading