HomeSort by: relevance | last modified time | path
    Searched refs:AXFR (Results 1 - 11 of 11) sorted by relevancy

  /src/external/mpl/bind/dist/bin/tests/system/proxy/
tests.sh 185 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TCP)" -p "${EXTRAPORT1}" -b 10.53.0.10 @10.53.0.1 +tcp +proxy="1.2.3.4-4.3.2.1#53" AXFR example-proxy-do53
186 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY encrypted)" -p "${TLSPORT}" -b 10.53.0.10 @10.53.0.1 +tls +proxy="1.2.3.4-4.3.2.1#853" AXFR example-proxy-encrypted-dot
187 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY plain)" -p "${EXTRAPORT2}" -b 10.53.0.10 @10.53.0.1 +tls +proxy-plain="1.2.3.4-4.3.2.1#853" AXFR example-proxy-plain-dot
189 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TCP, IPv6)" -p "${EXTRAPORT1}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tcp +proxy="1.2.3.4-4.3.2.1#53" AXFR example-proxy-do53
190 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY encrypted, IPv6)" -p "${TLSPORT}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tls +proxy="1.2.3.4-4.3.2.1#853" AXFR example-proxy-encrypted-dot
191 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY plain, IPv6)" -p "${EXTRAPORT2}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tls +proxy-plain="1.2.3.4-4.3.2.1#853" AXFR example-proxy-plain-dot
193 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TCP)" -p "${EXTRAPORT1}" -b 10.53.0.10 @10.53.0.1 +tcp +proxy="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#53" AXFR example-proxy-do53
194 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TLS/PROXY encrypted)" -p "${TLSPORT}" -b 10.53.0.10 @10.53.0.1 +tls +proxy="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#853" AXFR example-proxy-encrypted-dot
195 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TLS/PROXY plain)" -p "${EXTRAPORT2}" -b 10.53.0.10 @10.53.0.1 +tls +proxy-plain="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#853" AXFR example-proxy-plain-dot
197 run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TCP, IPv6)" -p "${EXTRAPORT1}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tcp +proxy="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#53" AXFR example-proxy-do5
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/ixfr/
tests.sh 40 echo_i "testing initial AXFR ($n)"
46 /AXFR/
48 /AXFR/
50 nil. 300 TXT "initial AXFR"
53 /AXFR/
76 $DIG $DIGOPTS @10.53.0.1 nil. TXT | grep 'initial AXFR' >/dev/null || ret=1
94 nil. 300 TXT "initial AXFR"
114 echo_i "testing AXFR fallback after IXFR failure (not exact error) ($n)"
117 # Provide a broken IXFR response and a working fallback AXFR response
129 /AXFR/
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/xfer/ans9/
ans.py 32 Yield SOA and AXFR responses. Every new AXFR response increments the SOA
47 # expected to send a SOA query over UDP and then an AXFR query over
66 if qctx.qtype != dns.rdatatype.AXFR:
67 # If QTYPE=AXFR, we will continue cramming RRsets into the ANSWER
70 # If QTYPE was not SOA or AXFR, abort. Yeah, we just sent a broken
87 # Generate the AXFR with a txt rrset.
100 # Finish the AXFR transaction by sending the second SOA RRset.
  /src/external/mpl/bind/dist/bin/tests/system/doth/
tests.sh 76 dig_with_tls_opts -b 10.53.0.10 "@10.53.0.$srv_number" "${zone_name}." AXFR >"dig.out.ns$srv_number.${zone_name}.test$n" || return 1
87 dig_with_tls_opts example. -b 10.53.0.10 @10.53.0.1 axfr >dig.out.ns1.test$n || ret=1
89 digcomp example.axfr.good dig.out.ns1.test$n || ret=1
97 digcomp example.axfr.good "dig.out.ns2.example.test$n" || ret=1
219 digcomp example.axfr.good "dig.out.ns3.example.test$n" || ret=1
243 digcomp example.axfr.good "dig.out.ns4.example.test$n" || ret=1
287 dig_with_tls_opts +comm @10.53.0.1 . AXFR >dig.out.test$n || ret=1
296 dig_with_opts example. -b 10.53.0.10 @10.53.0.1 axfr >dig.out.ns1.test$n || ret=1
320 "$DIG" +tls $common_dig_options -p "${HTTPSPORT}" +comm @10.53.0.1 . AXFR >dig.out.test$n
405 dig_with_https_opts +comm @10.53.0.1 . AXFR >dig.out.test$n || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/digdelv/
tests.sh 1046 dig_with_opts @10.53.0.5 example AXFR +tries=2 >dig.out.test$n 2>&1 && ret=1
1053 echo_i "checking exit code for a retry upon TCP EOF (partial AXFR -> partial AXFR) ($n)"
1056 dig_with_opts @10.53.0.5 example AXFR +tries=2 >dig.out.test$n 2>&1 && ret=1
1063 echo_i "checking exit code for a retry upon TCP EOF (immediate -> partial AXFR) ($n)"
1066 dig_with_opts @10.53.0.5 example AXFR +tries=2 >dig.out.test$n 2>&1 && ret=1
1073 echo_i "checking exit code for a retry upon TCP EOF (partial AXFR -> immediate) ($n)"
1076 dig_with_opts @10.53.0.5 example AXFR +tries=2 >dig.out.test$n 2>&1 && ret=1
1083 echo_i "checking exit code for a retry upon TCP EOF (immediate -> complete AXFR) ($n)"
1086 dig_with_opts @10.53.0.5 example AXFR +tries=2 >dig.out.test$n 2>&1 || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/mirror/
tests.sh 25 # end with the "IXFR failed" status, which is followed by an AXFR retry and
116 echo_i "checking that an AXFR of an incorrectly signed mirror zone is rejected ($n)"
119 wait_for_transfer verify-axfr
120 $DIG $DIGOPTS @10.53.0.3 +norec verify-axfr SOA >dig.out.ns3.test$n 2>&1 || ret=1
123 nextpartpeek ns3/named.run | grep "No correct ${DEFAULT_ALGORITHM} signature for verify-axfr SOA" >/dev/null || ret=1
124 nextpartpeek ns3/named.run | grep "verify-axfr.*mirror zone is now in use" >/dev/null && ret=1
129 echo_i "checking that an AXFR of an updated, correctly signed mirror zone is accepted ($n)"
133 cat ns2/verify-axfr.db.good.signed >ns2/verify-axfr.db.signed
134 reload_zone verify-axfr ${UPDATED_SERIAL_GOOD
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/xfer/
tests.sh 32 $DIG $DIGOPTS example. @10.53.0.2 axfr >dig.out.ns2.test$n || tmp=1
47 $DIG $DIGOPTS $ZONE @$SERVER axfr >dig.out.test$n || return 1
69 $DIG $DIGOPTS tsigzone. @10.53.0.2 axfr -y "${DEFAULT_HMAC}:tsigzone.:1234abcd8765" >dig.out.ns2.test$n || tmp=1
76 $DIG $DIGOPTS tsigzone. @10.53.0.3 axfr -y "${DEFAULT_HMAC}:tsigzone.:1234abcd8765" >dig.out.ns3.test$n || return 1
174 @10.53.0.3 axfr >dig.out.ns3.test$n || tmp=1
191 @10.53.0.6 axfr >dig.out.ns6.test$n || tmp=1
195 @10.53.0.3 axfr >dig.out.ns3.test$n || tmp=1
212 @10.53.0.6 axfr >dig.out.ns6.test$n || tmp=1
216 @10.53.0.1 axfr >dig.out.ns1.test$n || tmp=1
244 @10.53.0.1 axfr >dig.out.ns1.test$n || tmp=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/autosign/
tests.sh 179 $DIG $DIGOPTS $z @10.53.0.1 axfr | awk '$4 == "RRSIG" {print $9}' | sort | uniq -c | cat_i
183 $DIG $DIGOPTS $z @10.53.0.2 axfr | awk '$4 == "RRSIG" {print $9}' | sort | uniq -c | cat_i
187 $DIG $DIGOPTS $z @10.53.0.3 axfr | awk '$4 == "RRSIG" {print $9}' | sort | uniq -c | cat_i
261 $DIG $DIGOPTS AXFR oldsigs.example @10.53.0.3 >dig.out.test$n || return 1
282 $DIG $DIGOPTS axfr oldsigs.example @10.53.0.3 >dig.out.ns3.test$n || ret=1
1181 $DIG $DIGOPTS @10.53.0.3 axfr inaczsk2.example >dig.out.ns3.test$n || ret=1
1217 $DIG $DIGOPTS delzsk.example AXFR @10.53.0.3 >dig.out.ns3.3.test$n || ret=1
1324 $DIG $DIGOPTS @10.53.0.2 axfr "${zone}" >dig.out.axfr.ns2.test$n || ret=1
1325 grep "^${hash}.${zone}." dig.out.axfr.ns2.test$n >/dev/null && ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/isctest/
kasp.py 812 transfer = _query(server, fqdn, dns.rdatatype.AXFR, tsig=tsig)
814 isctest.log.debug(f"no response for {fqdn} AXFR from {server.ip}")
817 isctest.log.debug(f"{rcode} response for {fqdn} AXFR from {server.ip}")
819 zonefile = f"{zone}.axfr"
  /src/external/mpl/bind/dist/bin/tests/system/inline/
tests.sh 61 $DIG $DIGOPTS @10.53.0.3 axfr nsec3. \
70 $DIG $DIGOPTS @10.53.0.3 bits. AXFR >dig.out.ns3.test$n || return 1
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh 3349 before=$($DIG axfr siginterval.example -p "$PORT" @10.53.0.3 | grep RRSIG.SOA)
3354 after=$($DIG axfr siginterval.example -p "$PORT" @10.53.0.3 | grep RRSIG.SOA)
3453 dig_with_opts split-rrsig AXFR @10.53.0.7 >dig.out.test$n || ret=1
4048 dig_with_opts axfr occluded.example @10.53.0.3 >dig.out.ns3.test$n || ret=1
4535 dig_with_opts @10.53.0.2 hours-vs-days AXFR >dig.out.ns2.test$n

Completed in 42 milliseconds