bind9/bin
Mark Andrews 7f13c9d3fa When signing with a new algorithm preserve NSEC/NSEC3 chains
If the zone already has existing NSEC/NSEC3 chains then zone_sign
needs to continue to use them.  If there are no chains then use
kasp setting otherwise generate an NSEC chain.

(cherry picked from commit 4b55201459)
2023-03-15 00:18:54 +11:00
..
check Fix the reference to RFC 1035 in named-compilezone(1) 2023-02-13 16:33:38 +00:00
confgen Update sources to Clang 15 formatting 2022-11-29 09:14:07 +01:00
delv Update sources to Clang 15 formatting 2022-11-29 09:14:07 +01:00
dig Cleanup OpenSSL reference on bad option 2023-02-16 22:31:52 +00:00
dnssec dnssec-checkds: cleanup memory on error paths 2023-02-09 09:00:28 +11:00
named Now logs UV versions when starting up 2023-03-03 09:31:54 +01:00
nsupdate Handle address lookup failure more gracefully 2023-02-01 00:36:42 +11:00
plugins Implement incremental hash table resizing in isc_ht 2023-01-11 17:15:33 +01:00
rndc Update sources to Clang 15 formatting 2022-11-29 09:14:07 +01:00
tests When signing with a new algorithm preserve NSEC/NSEC3 chains 2023-03-15 00:18:54 +11:00
tools named-rrchecker: have fatal cleanup 2023-02-07 11:15:21 +11:00
Makefile.am Remove native PKCS#11 support 2021-09-09 15:35:39 +02:00