1. 09 Mar, 2018 4 commits
  2. 27 Oct, 2017 1 commit
    • Evan Hunt's avatar
      [master] remove isc-hmac-fixup · 959d2940
      Evan Hunt authored
      4797.	[func]		Removed "isc-hmac-fixup", as the versions of BIND that
      			had the bug it worked around are long past end of
      			life. [RT #46411]
      959d2940
  3. 07 Oct, 2017 1 commit
  4. 08 Sep, 2017 1 commit
    • Evan Hunt's avatar
      [master] add libns and remove liblwres · 8eb88aaf
      Evan Hunt authored
      4708.   [cleanup]       Legacy Windows builds (i.e. for XP and earlier)
                              are no longer supported. [RT #45186]
      
      4707.	[func]		The lightweight resolver daemon and library (lwresd
      			and liblwres) have been removed. [RT #45186]
      
      4706.	[func]		Code implementing name server query processing has
      			been moved from bin/named to a new library "libns".
      			Functions remaining in bin/named are now prefixed
      			with "named_" rather than "ns_".  This will make it
      			easier to write unit tests for name server code, or
      			link name server functionality into new tools.
      			[RT #45186]
      8eb88aaf
  5. 31 Oct, 2016 1 commit
  6. 27 Oct, 2016 1 commit
  7. 19 Oct, 2016 1 commit
  8. 04 Feb, 2015 1 commit
  9. 23 Apr, 2014 1 commit
  10. 27 Feb, 2014 1 commit
    • Evan Hunt's avatar
      [master] merge several interdependent fixes · 98922b2b
      Evan Hunt authored
      3760.   [bug]           Improve SIT with native PKCS#11 and on Windows.
      			[RT #35433]
      
      3759.   [port]          Enable delve on Windows. [RT #35441]
      
      3758.   [port]          Enable export library APIs on windows. [RT #35382]
      98922b2b
  11. 21 Feb, 2014 2 commits
  12. 12 Feb, 2014 1 commit
  13. 14 Jan, 2014 1 commit
    • Evan Hunt's avatar
      [master] native PKCS#11 support · ba751492
      Evan Hunt authored
      3705.	[func]		"configure --enable-native-pkcs11" enables BIND
      			to use the PKCS#11 API for all cryptographic
      			functions, so that it can drive a hardware service
      			module directly without the need to use a modified
      			OpenSSL as intermediary (so long as the HSM's vendor
      			provides a complete-enough implementation of the
      			PKCS#11 interface). This has been tested successfully
      			with the Thales nShield HSM and with SoftHSMv2 from
      			the OpenDNSSEC project. [RT #29031]
      ba751492
  14. 04 Dec, 2013 1 commit