OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:AXFR
(Results
1 - 11
of
11
) sorted by relevancy
/src/external/mpl/bind/dist/bin/tests/system/proxy/
tests.sh
185
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TCP)" -p "${EXTRAPORT1}" -b 10.53.0.10 @10.53.0.1 +tcp +proxy="1.2.3.4-4.3.2.1#53"
AXFR
example-proxy-do53
186
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY encrypted)" -p "${TLSPORT}" -b 10.53.0.10 @10.53.0.1 +tls +proxy="1.2.3.4-4.3.2.1#853"
AXFR
example-proxy-encrypted-dot
187
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY plain)" -p "${EXTRAPORT2}" -b 10.53.0.10 @10.53.0.1 +tls +proxy-plain="1.2.3.4-4.3.2.1#853"
AXFR
example-proxy-plain-dot
189
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TCP, IPv6)" -p "${EXTRAPORT1}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tcp +proxy="1.2.3.4-4.3.2.1#53"
AXFR
example-proxy-do53
190
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY encrypted, IPv6)" -p "${TLSPORT}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tls +proxy="1.2.3.4-4.3.2.1#853"
AXFR
example-proxy-encrypted-dot
191
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv4 addresses is being used by BIND (TLS/PROXY plain, IPv6)" -p "${EXTRAPORT2}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tls +proxy-plain="1.2.3.4-4.3.2.1#853"
AXFR
example-proxy-plain-dot
193
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TCP)" -p "${EXTRAPORT1}" -b 10.53.0.10 @10.53.0.1 +tcp +proxy="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#53"
AXFR
example-proxy-do53
194
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TLS/PROXY encrypted)" -p "${TLSPORT}" -b 10.53.0.10 @10.53.0.1 +tls +proxy="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#853"
AXFR
example-proxy-encrypted-dot
195
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TLS/PROXY plain)" -p "${EXTRAPORT2}" -b 10.53.0.10 @10.53.0.1 +tls +proxy-plain="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#853"
AXFR
example-proxy-plain-dot
197
run_dig_test_expect_success "$testing: check if ports information from a PROXYv2 header with IPv6 addresses is being used by BIND (TCP, IPv6)" -p "${EXTRAPORT1}" -b fd92:7065:b8e:ffff::10 @fd92:7065:b8e:ffff::1 +tcp +proxy="fd0f:99d3:98a7::1234-fd0f:99d3:98a7::4321#53"
AXFR
example-proxy-do5
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/ixfr/
tests.sh
40
echo_i "testing initial
AXFR
($n)"
46
/
AXFR
/
48
/
AXFR
/
50
nil. 300 TXT "initial
AXFR
"
53
/
AXFR
/
76
$DIG $DIGOPTS @10.53.0.1 nil. TXT | grep 'initial
AXFR
' >/dev/null || ret=1
94
nil. 300 TXT "initial
AXFR
"
114
echo_i "testing
AXFR
fallback after IXFR failure (not exact error) ($n)"
117
# Provide a broken IXFR response and a working fallback
AXFR
response
129
/
AXFR
/
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/xfer/ans9/
ans.py
32
Yield SOA and
AXFR
responses. Every new
AXFR
response increments the SOA
47
# expected to send a SOA query over UDP and then an
AXFR
query over
66
if qctx.qtype != dns.rdatatype.
AXFR
:
67
# If QTYPE=
AXFR
, we will continue cramming RRsets into the ANSWER
70
# If QTYPE was not SOA or
AXFR
, abort. Yeah, we just sent a broken
87
# Generate the
AXFR
with a txt rrset.
100
# Finish the
AXFR
transaction by sending the second SOA RRset.
/src/external/mpl/bind/dist/bin/tests/system/doth/
tests.sh
76
dig_with_tls_opts -b 10.53.0.10 "@10.53.0.$srv_number" "${zone_name}."
AXFR
>"dig.out.ns$srv_number.${zone_name}.test$n" || return 1
87
dig_with_tls_opts example. -b 10.53.0.10 @10.53.0.1
axfr
>dig.out.ns1.test$n || ret=1
89
digcomp example.
axfr
.good dig.out.ns1.test$n || ret=1
97
digcomp example.
axfr
.good "dig.out.ns2.example.test$n" || ret=1
219
digcomp example.
axfr
.good "dig.out.ns3.example.test$n" || ret=1
243
digcomp example.
axfr
.good "dig.out.ns4.example.test$n" || ret=1
287
dig_with_tls_opts +comm @10.53.0.1 .
AXFR
>dig.out.test$n || ret=1
296
dig_with_opts example. -b 10.53.0.10 @10.53.0.1
axfr
>dig.out.ns1.test$n || ret=1
320
"$DIG" +tls $common_dig_options -p "${HTTPSPORT}" +comm @10.53.0.1 .
AXFR
>dig.out.test$n
405
dig_with_https_opts +comm @10.53.0.1 .
AXFR
>dig.out.test$n || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/digdelv/
tests.sh
1046
dig_with_opts @10.53.0.5 example
AXFR
+tries=2 >dig.out.test$n 2>&1 && ret=1
1053
echo_i "checking exit code for a retry upon TCP EOF (partial
AXFR
-> partial
AXFR
) ($n)"
1056
dig_with_opts @10.53.0.5 example
AXFR
+tries=2 >dig.out.test$n 2>&1 && ret=1
1063
echo_i "checking exit code for a retry upon TCP EOF (immediate -> partial
AXFR
) ($n)"
1066
dig_with_opts @10.53.0.5 example
AXFR
+tries=2 >dig.out.test$n 2>&1 && ret=1
1073
echo_i "checking exit code for a retry upon TCP EOF (partial
AXFR
-> immediate) ($n)"
1076
dig_with_opts @10.53.0.5 example
AXFR
+tries=2 >dig.out.test$n 2>&1 && ret=1
1083
echo_i "checking exit code for a retry upon TCP EOF (immediate -> complete
AXFR
) ($n)"
1086
dig_with_opts @10.53.0.5 example
AXFR
+tries=2 >dig.out.test$n 2>&1 || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/mirror/
tests.sh
25
# end with the "IXFR failed" status, which is followed by an
AXFR
retry and
116
echo_i "checking that an
AXFR
of an incorrectly signed mirror zone is rejected ($n)"
119
wait_for_transfer verify-
axfr
120
$DIG $DIGOPTS @10.53.0.3 +norec verify-
axfr
SOA >dig.out.ns3.test$n 2>&1 || ret=1
123
nextpartpeek ns3/named.run | grep "No correct ${DEFAULT_ALGORITHM} signature for verify-
axfr
SOA" >/dev/null || ret=1
124
nextpartpeek ns3/named.run | grep "verify-
axfr
.*mirror zone is now in use" >/dev/null && ret=1
129
echo_i "checking that an
AXFR
of an updated, correctly signed mirror zone is accepted ($n)"
133
cat ns2/verify-
axfr
.db.good.signed >ns2/verify-
axfr
.db.signed
134
reload_zone verify-
axfr
${UPDATED_SERIAL_GOOD
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/xfer/
tests.sh
32
$DIG $DIGOPTS example. @10.53.0.2
axfr
>dig.out.ns2.test$n || tmp=1
47
$DIG $DIGOPTS $ZONE @$SERVER
axfr
>dig.out.test$n || return 1
69
$DIG $DIGOPTS tsigzone. @10.53.0.2
axfr
-y "${DEFAULT_HMAC}:tsigzone.:1234abcd8765" >dig.out.ns2.test$n || tmp=1
76
$DIG $DIGOPTS tsigzone. @10.53.0.3
axfr
-y "${DEFAULT_HMAC}:tsigzone.:1234abcd8765" >dig.out.ns3.test$n || return 1
174
@10.53.0.3
axfr
>dig.out.ns3.test$n || tmp=1
191
@10.53.0.6
axfr
>dig.out.ns6.test$n || tmp=1
195
@10.53.0.3
axfr
>dig.out.ns3.test$n || tmp=1
212
@10.53.0.6
axfr
>dig.out.ns6.test$n || tmp=1
216
@10.53.0.1
axfr
>dig.out.ns1.test$n || tmp=1
244
@10.53.0.1
axfr
>dig.out.ns1.test$n || tmp=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/autosign/
tests.sh
179
$DIG $DIGOPTS $z @10.53.0.1
axfr
| awk '$4 == "RRSIG" {print $9}' | sort | uniq -c | cat_i
183
$DIG $DIGOPTS $z @10.53.0.2
axfr
| awk '$4 == "RRSIG" {print $9}' | sort | uniq -c | cat_i
187
$DIG $DIGOPTS $z @10.53.0.3
axfr
| awk '$4 == "RRSIG" {print $9}' | sort | uniq -c | cat_i
261
$DIG $DIGOPTS
AXFR
oldsigs.example @10.53.0.3 >dig.out.test$n || return 1
282
$DIG $DIGOPTS
axfr
oldsigs.example @10.53.0.3 >dig.out.ns3.test$n || ret=1
1181
$DIG $DIGOPTS @10.53.0.3
axfr
inaczsk2.example >dig.out.ns3.test$n || ret=1
1217
$DIG $DIGOPTS delzsk.example
AXFR
@10.53.0.3 >dig.out.ns3.3.test$n || ret=1
1324
$DIG $DIGOPTS @10.53.0.2
axfr
"${zone}" >dig.out.
axfr
.ns2.test$n || ret=1
1325
grep "^${hash}.${zone}." dig.out.
axfr
.ns2.test$n >/dev/null && ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/isctest/
kasp.py
812
transfer = _query(server, fqdn, dns.rdatatype.
AXFR
, tsig=tsig)
814
isctest.log.debug(f"no response for {fqdn}
AXFR
from {server.ip}")
817
isctest.log.debug(f"{rcode} response for {fqdn}
AXFR
from {server.ip}")
819
zonefile = f"{zone}.
axfr
"
/src/external/mpl/bind/dist/bin/tests/system/inline/
tests.sh
61
$DIG $DIGOPTS @10.53.0.3
axfr
nsec3. \
70
$DIG $DIGOPTS @10.53.0.3 bits.
AXFR
>dig.out.ns3.test$n || return 1
/src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh
3349
before=$($DIG
axfr
siginterval.example -p "$PORT" @10.53.0.3 | grep RRSIG.SOA)
3354
after=$($DIG
axfr
siginterval.example -p "$PORT" @10.53.0.3 | grep RRSIG.SOA)
3453
dig_with_opts split-rrsig
AXFR
@10.53.0.7 >dig.out.test$n || ret=1
4048
dig_with_opts
axfr
occluded.example @10.53.0.3 >dig.out.ns3.test$n || ret=1
4535
dig_with_opts @10.53.0.2 hours-vs-days
AXFR
>dig.out.ns2.test$n
Completed in 42 milliseconds
Indexes created Sat Feb 28 05:31:39 UTC 2026