OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:SOA
(Results
1 - 25
of
42
) sorted by relevancy
1
2
/src/external/mpl/bind/dist/bin/tests/system/ixfr/
tests.sh
24
$DIG $DIGOPTS "@$1" "$2"
SOA
>"$4"
25
serial=$(awk '$4 == "
SOA
" { print $7 }' "$4")
44
/
SOA
/
45
nil. 300
SOA
ns.nil. root.nil. 1 300 300 604800 300
47
nil. 300
SOA
ns.nil. root.nil. 1 300 300 604800 300
54
nil. 300
SOA
ns.nil. root.nil. 1 300 300 604800 300
85
# Then we do a
SOA
-only update.
88
/
SOA
/
89
nil. 300
SOA
ns.nil. root.nil. 3 300 300 604800 300
91
nil. 300
SOA
ns.nil. root.nil. 3 300 300 604800 30
[
all
...]
setup.sh
24
@ 15 IN
SOA
ns1.test. hostmaster.test. (
/src/external/mpl/bind/dist/bin/tests/system/doth/
tests.sh
255
dig_with_tls_opts @10.53.0.1 .
SOA
>dig.out.test$n || ret=1
263
dig_with_tls_opts -6 @fd92:7065:b8e:ffff::1 .
SOA
>dig.out.test$n || ret=1
271
dig_with_tls_opts @10.53.0.2 example
SOA
>dig.out.test$n || ret=1
279
dig_with_tls_opts -6 @fd92:7065:b8e:ffff::2 example
SOA
>dig.out.test$n || ret=1
305
dig_with_opts @10.53.0.1 example
SOA
>dig.out.test$n || ret=1
331
"$DIG" +https $common_dig_options -p "${TLSPORT}" "$@" @10.53.0.1 .
SOA
>dig.out.test$n && ret=1
339
dig_with_https_opts +stat @10.53.0.1 .
SOA
>dig.out.test$n || ret=1
348
dig_with_https_opts +stat -6 @fd92:7065:b8e:ffff::1 .
SOA
>dig.out.test$n || ret=1
357
dig_with_https_opts @10.53.0.2 example
SOA
>dig.out.test$n || ret=1
365
dig_with_https_opts -6 @fd92:7065:b8e:ffff::2 example
SOA
>dig.out.test$n || ret=
[
all
...]
tests_gnutls.py
38
# Prepare the example/
SOA
query which will be sent over TLS.
39
query = isctest.query.create("example.", dns.rdatatype.
SOA
)
61
# Send the example/
SOA
query to the standard input of gnutls-cli. Do
114
dns.rdatatype.
SOA
,
/src/external/mpl/bind/dist/bin/tests/system/nsec3/
tests_nsec3_change.py
50
query = isctest.query.create(fqdn, dns.rdatatype.
SOA
)
56
dns.rdatatype.
SOA
,
70
# After reconfig, the NSEC3PARAM TTL should match the new
SOA
MINIMUM.
97
"
soa
-minimum": 900,
/src/external/mpl/bind/dist/bin/tests/system/xfer/ans9/
ans.py
32
Yield
SOA
and AXFR responses. Every new AXFR response increments the
SOA
45
# This is oversimplified because I am lazy - we are appending the
SOA
47
# expected to send a
SOA
query over UDP and then an AXFR query over
48
# TCP. Responses to both of those start with a
SOA
RRset in the ANSWER
55
dns.rdatatype.
SOA
,
62
if qctx.qtype == dns.rdatatype.
SOA
:
63
# If QTYPE=
SOA
, the
SOA
record is the complete response.
70
# If QTYPE was not
SOA
or AXFR, abort. Yeah, we just sent a broke
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/mirror/
tests.sh
74
ORIGINAL_SERIAL=$(awk '$2 == "
SOA
" {print $5}' ns2/verify.db.in)
82
$DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned
SOA
>dig.out.ns3.test$n 2>&1 || ret=1
95
$DIG $DIGOPTS @10.53.0.3 +norec verify-untrusted
SOA
>dig.out.ns3.test$n 2>&1 || ret=1
108
$DIG $DIGOPTS @10.53.0.3 +norec verify-csk
SOA
>dig.out.ns3.test$n 2>&1 || ret=1
120
$DIG $DIGOPTS @10.53.0.3 +norec verify-axfr
SOA
>dig.out.ns3.test$n 2>&1 || ret=1
123
nextpartpeek ns3/named.run | grep "No correct ${DEFAULT_ALGORITHM} signature for verify-axfr
SOA
" >/dev/null || ret=1
137
$DIG $DIGOPTS @10.53.0.3 +norec verify-axfr
SOA
>dig.out.ns3.test$n 2>&1 || ret=1
170
$DIG $DIGOPTS @10.53.0.3 +norec verify-ixfr
SOA
>dig.out.ns3.test$n 2>&1 || ret=1
175
nextpartpeek ns3/named.run | grep "No correct ${DEFAULT_ALGORITHM} signature for verify-ixfr
SOA
" >/dev/null || ret=1
197
$DIG $DIGOPTS @10.53.0.3 +norec verify-ixfr
SOA
>dig.out.ns3.test$n 2>&1 || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/resolver/ans10/
ans.py
39
#
SOA
gets a unsigned response.
67
elif rrtype ==
SOA
:
68
r.answer.append(dns.rrset.from_text(qname, 1, IN,
SOA
, ". . 0 0 0 0 0"))
70
r.authority.append(dns.rrset.from_text(qname, 1, IN,
SOA
, ". . 0 0 0 0 0"))
/src/external/mpl/bind/dist/bin/tests/system/timeouts/
tests_tcp_timeouts.py
172
# Receive the initial DNS message with
SOA
174
soa
= response.get_rrset(
175
dns.message.ANSWER, name, dns.rdataclass.IN, dns.rdatatype.
SOA
177
assert
soa
is not None
179
# Pull DNS message from wire until the second
SOA
is received
184
soa
= response.get_rrset(
185
dns.message.ANSWER, name, dns.rdataclass.IN, dns.rdatatype.
SOA
187
if
soa
is not None:
189
assert
soa
is not None
228
# Receive the initial DNS message with
SOA
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/inline/
tests.sh
30
$DIG $DIGOPTS "@$1" "$2"
SOA
>"$4"
31
serial=$(awk '$4 == "
SOA
" { print $7 }' "$4")
81
$DIG $DIGOPTS @10.53.0.3 +noall +answer +dnssec expired
SOA
>dig.out.ns3.test$n || ret=1
187
update add bits 0
SOA
ns2.bits. . 2011072400 20 20 1814400 3600
191
$DIG $DIGOPTS @10.53.0.2 bits
SOA
>dig.out.ns2.test$n || ret=1
202
$DIG $DIGOPTS @10.53.0.3 bits
SOA
>dig.out.ns3.test$n || ret=1
264
update add noixfr 0
SOA
ns4.noixfr. . 2011072400 20 20 1814400 3600
268
$DIG $DIGOPTS @10.53.0.4 noixfr
SOA
>dig.out.ns4.test$n || ret=1
279
$DIG $DIGOPTS @10.53.0.3 noixfr
SOA
>dig.out.ns3.test$n || ret=1
369
echo_i "check adding record fails when
SOA
serial not changed ($n)
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/case/
tests.sh
21
$DIG $DIGOPTS "@$1" "$2"
SOA
>"$4"
22
serial=$(awk '$4 == "
SOA
" { print $7 }' "$4")
33
$DIG $DIGOPTS
soa
example. @10.53.0.2 >dig.ns2.test$n || true
34
grep
SOA
dig.ns2.test$n >/dev/null && break
38
$DIG $DIGOPTS
soa
dynamic. @10.53.0.2 >dig.ns2.test$n || true
39
grep
SOA
dig.ns2.test$n >/dev/null && break
88
echo_i "change
SOA
owner case via update ($n)"
92
update add dYNAMIc 0
SOA
mname1. . 2000042408 20 20 1814400 3600
110
echo_i "check
SOA
owner case is transferred to secondary ($n)"
/src/external/mpl/bind/dist/bin/tests/system/
genzone.sh
28
@ 86400 IN
SOA
ns${primary} hostmaster (
66
; see
SOA
record at top of file
185
;nxt01 NXT a.secure.nil. ( NS
SOA
MX RRSIG KEY LOC NXT )
274
nsec01 NSEC a.secure.nil. ( NS
SOA
MX RRSIG DNSKEY LOC NSEC )
294
8f1tmio9avcom2k0frp92lgcumak0cad NSEC3 1 0 10 D2CF0294C020CE6C 8FPNS2UCT7FBS643THP2B77PEQ77K6IU A NS
SOA
MX AAAA RRSIG DNSKEY NSEC3PARAM
/src/external/mpl/bind/dist/bin/tests/system/reclimit/
tests.sh
286
check_manytypes 1 manytypes.big "${rrtype}" NOERROR big
SOA
120 || ret=1
290
check_manytypes 2 manytypes.big "${rrtype}" NOERROR big
SOA
"" 120 || ret=1
305
check_manytypes 1 manytypes.big "TYPE${ntype}" NOERROR big
SOA
120 || ret=1
311
check_manytypes 2 manytypes.big "TYPE${ntype}" NOERROR big
SOA
"" 120 || ret=1
343
check_manytypes 1 manytypes.big "TYPE${ntype}" NOERROR big
SOA
0 || ret=1
349
check_manytypes 2 manytypes.big "TYPE${ntype}" NOERROR big
SOA
0 || ret=1
362
check_manytypes 1 manytypes.big "${rrtype}" NOERROR big
SOA
120 || ret=1
366
check_manytypes 2 manytypes.big "${rrtype}" NOERROR big
SOA
"" 120 || ret=1
/src/external/mpl/bind/dist/bin/tests/system/rpz/
setup.sh
35
sed -e "/
SOA
/s/blx/bl$NM/g" ns3/base.db >ns3/bl$NM.db
85
@
SOA
. hostmaster.ns.example.tld5. ( 1 3600 1200 604800 60 )
94
@
SOA
. hostmaster.ns.blperf. ( 1 3600 1200 604800 60 )
/src/external/mpl/bind/dist/bin/tests/system/forward/ans6/
ans.py
40
- all other queries elicit a negative response with a common
SOA
record.
62
response_type = dns.rdatatype.
SOA
/src/external/mpl/bind/dist/bin/tests/system/qmin/
qmin_ans.py
81
and qctx.response.authority[0].rdtype == dns.rdatatype.
SOA
/src/external/mpl/bind/dist/bin/tests/system/serve-stale/ans2/
ans.pl
49
my $
SOA
= "example 300 IN
SOA
. . 0 0 0 0 300";
52
my $ssSOA = "delegated.serve.stale 300 IN
SOA
. . 0 0 0 0 300";
59
my $slowSOA = "slow 300 IN
SOA
. . 0 0 0 0 300";
63
my $slownegSOA = "slow 2 IN
SOA
. . 0 0 0 0 300";
71
my $negSOA = "example 2 IN
SOA
. . 0 0 0 0 300";
72
my $ssnegSOA = "delegated.serve.stale 2 IN
SOA
. . 0 0 0 0 300";
129
my $rr = new Net::DNS::RR($
SOA
);
139
} elsif ($qtype eq "
SOA
") {
140
my $rr = new Net::DNS::RR($
SOA
);
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/enginepkcs11/
tests.sh
87
dig_with_opts "$zone" @10.53.0.1
SOA
>dig.out.
soa
.$zone.$n || ret=1
88
awk '$4 == "RRSIG" { print $11 }' dig.out.
soa
.$zone.$n >dig.out.keyids.$zone.$n || ret=1
92
test "$ret" -eq 0 || echo_i "failed (
SOA
RRset not signed with key $zskid1)"
125
echo_i "Test
SOA
response for $zone after inline signing ($n)"
127
dig_with_opts "$zone" @10.53.0.1
SOA
>dig.out.
soa
.$zone.$n || return 1
128
awk '$4 == "RRSIG" { print $11 }' dig.out.
soa
.$zone.$n >dig.out.keyids.$zone.$n || return 1
136
test "$ret" -eq 0 || echo_i "failed (expected 2
SOA
RRSIG records)"
202
echo_i "Test
SOA
response for $zone ($n)
[
all
...]
/src/external/bsd/nsd/dist/doc/
differences.tex
242
\subsubsection{b-soattl - BIND sets
SOA
TTL in authority section to 0 for
SOA
queries}
245
This happens when asking for the
SOA
for a domain that is not served.
253
;; foo.bar. IN
SOA
265
;; foo.bar. IN
SOA
270
. 0 IN
SOA
A.ROOT-SERVERS.NET. NSTLD.VERISIGN-GRS.COM. (
289
;; foo.bar. IN
SOA
294
. 86400 IN
SOA
a.root-servers.net. nstld.verisign-grs.com. (
308
BIND conforms to internet-draft draft-andrews-dnsext-
soa
-discovery which
319
SOA
(CLASS=IN) for the zone, as for an authoritative nxdomain
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/zonechecks/
tests.sh
209
checkfor "files: reload.db,
soa
.db$" rndc.out.prereload
210
echo "@ 0
SOA
. . 2 0 0 0 0" >ns1/
soa
.db
213
$DIG $DIGOPTS reload.example
SOA
@10.53.0.1 >dig.out
218
checkfor "files: reload.db,
soa
.db$" rndc.out.postreload
220
echo "@ 0
SOA
. . 3 0 0 0 0" >ns1/reload.db
224
$DIG $DIGOPTS reload.example
SOA
@10.53.0.1 >dig.out
/src/external/bsd/unbound/dist/testdata/
common.sh
288
SERIAL=`dig -p $4 @$3 $1
SOA
+short | awk '{ print $3 }'`
291
echo "** \"dig -p $4 @$3 $1
SOA
+short\" failed!"
/src/external/mpl/bind/dist/bin/tests/system/cookie/
cookie_ans.py
65
_tld(qctx), 2, qctx.qclass, dns.rdatatype.
SOA
, ". . 0 0 0 0 2"
185
if qctx.qtype == dns.rdatatype.
SOA
:
/src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/
tests.sh
52
$DIG $DIGOPTS @10.53.0.2 example
SOA
>dig.out.ns2.test$n || ret=1
58
$DIG $DIGOPTS @10.53.0.3 example
SOA
>dig.out.ns3.test$n || ret=1
187
$DIG $DIGOPTS @10.53.0.4 example
SOA
>dig.out.ns4.test$n
/src/external/mpl/bind/dist/bin/tests/system/addzone/
tests.sh
724
$DIG $DIGOPTS @10.53.0.3
SOA
"test4.baz" >dig.out.1.test$n || ret=1
727
$DIG $DIGOPTS @10.53.0.3
SOA
"test5.baz" >dig.out.2.test$n || ret=1
730
$DIG $DIGOPTS @10.53.0.3
SOA
'test/.baz' >dig.out.3.test$n || ret=1
733
$DIG $DIGOPTS @10.53.0.3
SOA
'test\\.baz' >dig.out.4.test$n || ret=1
736
$DIG $DIGOPTS @10.53.0.3
SOA
'test\032.baz' >dig.out.5.test$n || ret=1
739
$DIG $DIGOPTS @10.53.0.3
SOA
'test\010.baz' >dig.out.6.test$n || ret=1
/src/external/mpl/bind/dist/bin/tests/system/nsupdate/
setup.sh
30
update.nil IN
SOA
ns1.example.nil. hostmaster.example.nil. (
Completed in 46 milliseconds
1
2
Indexes created Sat Feb 28 05:31:39 UTC 2026