HomeSort by: relevance | last modified time | path
    Searched refs:SOA (Results 1 - 25 of 42) sorted by relevancy

1 2

  /src/external/mpl/bind/dist/bin/tests/system/ixfr/
tests.sh 24 $DIG $DIGOPTS "@$1" "$2" SOA >"$4"
25 serial=$(awk '$4 == "SOA" { print $7 }' "$4")
44 /SOA/
45 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300
47 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300
54 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300
85 # Then we do a SOA-only update.
88 /SOA/
89 nil. 300 SOA ns.nil. root.nil. 3 300 300 604800 300
91 nil. 300 SOA ns.nil. root.nil. 3 300 300 604800 30
    [all...]
setup.sh 24 @ 15 IN SOA ns1.test. hostmaster.test. (
  /src/external/mpl/bind/dist/bin/tests/system/doth/
tests.sh 255 dig_with_tls_opts @10.53.0.1 . SOA >dig.out.test$n || ret=1
263 dig_with_tls_opts -6 @fd92:7065:b8e:ffff::1 . SOA >dig.out.test$n || ret=1
271 dig_with_tls_opts @10.53.0.2 example SOA >dig.out.test$n || ret=1
279 dig_with_tls_opts -6 @fd92:7065:b8e:ffff::2 example SOA >dig.out.test$n || ret=1
305 dig_with_opts @10.53.0.1 example SOA >dig.out.test$n || ret=1
331 "$DIG" +https $common_dig_options -p "${TLSPORT}" "$@" @10.53.0.1 . SOA >dig.out.test$n && ret=1
339 dig_with_https_opts +stat @10.53.0.1 . SOA >dig.out.test$n || ret=1
348 dig_with_https_opts +stat -6 @fd92:7065:b8e:ffff::1 . SOA >dig.out.test$n || ret=1
357 dig_with_https_opts @10.53.0.2 example SOA >dig.out.test$n || ret=1
365 dig_with_https_opts -6 @fd92:7065:b8e:ffff::2 example SOA >dig.out.test$n || ret=
    [all...]
tests_gnutls.py 38 # Prepare the example/SOA query which will be sent over TLS.
39 query = isctest.query.create("example.", dns.rdatatype.SOA)
61 # Send the example/SOA query to the standard input of gnutls-cli. Do
114 dns.rdatatype.SOA,
  /src/external/mpl/bind/dist/bin/tests/system/nsec3/
tests_nsec3_change.py 50 query = isctest.query.create(fqdn, dns.rdatatype.SOA)
56 dns.rdatatype.SOA,
70 # After reconfig, the NSEC3PARAM TTL should match the new SOA MINIMUM.
97 "soa-minimum": 900,
  /src/external/mpl/bind/dist/bin/tests/system/xfer/ans9/
ans.py 32 Yield SOA and AXFR responses. Every new AXFR response increments the SOA
45 # This is oversimplified because I am lazy - we are appending the SOA
47 # expected to send a SOA query over UDP and then an AXFR query over
48 # TCP. Responses to both of those start with a SOA RRset in the ANSWER
55 dns.rdatatype.SOA,
62 if qctx.qtype == dns.rdatatype.SOA:
63 # If QTYPE=SOA, the SOA record is the complete response.
70 # If QTYPE was not SOA or AXFR, abort. Yeah, we just sent a broke
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/mirror/
tests.sh 74 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' ns2/verify.db.in)
82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1
95 $DIG $DIGOPTS @10.53.0.3 +norec verify-untrusted SOA >dig.out.ns3.test$n 2>&1 || ret=1
108 $DIG $DIGOPTS @10.53.0.3 +norec verify-csk SOA >dig.out.ns3.test$n 2>&1 || ret=1
120 $DIG $DIGOPTS @10.53.0.3 +norec verify-axfr SOA >dig.out.ns3.test$n 2>&1 || ret=1
123 nextpartpeek ns3/named.run | grep "No correct ${DEFAULT_ALGORITHM} signature for verify-axfr SOA" >/dev/null || ret=1
137 $DIG $DIGOPTS @10.53.0.3 +norec verify-axfr SOA >dig.out.ns3.test$n 2>&1 || ret=1
170 $DIG $DIGOPTS @10.53.0.3 +norec verify-ixfr SOA >dig.out.ns3.test$n 2>&1 || ret=1
175 nextpartpeek ns3/named.run | grep "No correct ${DEFAULT_ALGORITHM} signature for verify-ixfr SOA" >/dev/null || ret=1
197 $DIG $DIGOPTS @10.53.0.3 +norec verify-ixfr SOA >dig.out.ns3.test$n 2>&1 || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/resolver/ans10/
ans.py 39 # SOA gets a unsigned response.
67 elif rrtype == SOA:
68 r.answer.append(dns.rrset.from_text(qname, 1, IN, SOA, ". . 0 0 0 0 0"))
70 r.authority.append(dns.rrset.from_text(qname, 1, IN, SOA, ". . 0 0 0 0 0"))
  /src/external/mpl/bind/dist/bin/tests/system/timeouts/
tests_tcp_timeouts.py 172 # Receive the initial DNS message with SOA
174 soa = response.get_rrset(
175 dns.message.ANSWER, name, dns.rdataclass.IN, dns.rdatatype.SOA
177 assert soa is not None
179 # Pull DNS message from wire until the second SOA is received
184 soa = response.get_rrset(
185 dns.message.ANSWER, name, dns.rdataclass.IN, dns.rdatatype.SOA
187 if soa is not None:
189 assert soa is not None
228 # Receive the initial DNS message with SOA
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/inline/
tests.sh 30 $DIG $DIGOPTS "@$1" "$2" SOA >"$4"
31 serial=$(awk '$4 == "SOA" { print $7 }' "$4")
81 $DIG $DIGOPTS @10.53.0.3 +noall +answer +dnssec expired SOA >dig.out.ns3.test$n || ret=1
187 update add bits 0 SOA ns2.bits. . 2011072400 20 20 1814400 3600
191 $DIG $DIGOPTS @10.53.0.2 bits SOA >dig.out.ns2.test$n || ret=1
202 $DIG $DIGOPTS @10.53.0.3 bits SOA >dig.out.ns3.test$n || ret=1
264 update add noixfr 0 SOA ns4.noixfr. . 2011072400 20 20 1814400 3600
268 $DIG $DIGOPTS @10.53.0.4 noixfr SOA >dig.out.ns4.test$n || ret=1
279 $DIG $DIGOPTS @10.53.0.3 noixfr SOA >dig.out.ns3.test$n || ret=1
369 echo_i "check adding record fails when SOA serial not changed ($n)
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/case/
tests.sh 21 $DIG $DIGOPTS "@$1" "$2" SOA >"$4"
22 serial=$(awk '$4 == "SOA" { print $7 }' "$4")
33 $DIG $DIGOPTS soa example. @10.53.0.2 >dig.ns2.test$n || true
34 grep SOA dig.ns2.test$n >/dev/null && break
38 $DIG $DIGOPTS soa dynamic. @10.53.0.2 >dig.ns2.test$n || true
39 grep SOA dig.ns2.test$n >/dev/null && break
88 echo_i "change SOA owner case via update ($n)"
92 update add dYNAMIc 0 SOA mname1. . 2000042408 20 20 1814400 3600
110 echo_i "check SOA owner case is transferred to secondary ($n)"
  /src/external/mpl/bind/dist/bin/tests/system/
genzone.sh 28 @ 86400 IN SOA ns${primary} hostmaster (
66 ; see SOA record at top of file
185 ;nxt01 NXT a.secure.nil. ( NS SOA MX RRSIG KEY LOC NXT )
274 nsec01 NSEC a.secure.nil. ( NS SOA MX RRSIG DNSKEY LOC NSEC )
294 8f1tmio9avcom2k0frp92lgcumak0cad NSEC3 1 0 10 D2CF0294C020CE6C 8FPNS2UCT7FBS643THP2B77PEQ77K6IU A NS SOA MX AAAA RRSIG DNSKEY NSEC3PARAM
  /src/external/mpl/bind/dist/bin/tests/system/reclimit/
tests.sh 286 check_manytypes 1 manytypes.big "${rrtype}" NOERROR big SOA 120 || ret=1
290 check_manytypes 2 manytypes.big "${rrtype}" NOERROR big SOA "" 120 || ret=1
305 check_manytypes 1 manytypes.big "TYPE${ntype}" NOERROR big SOA 120 || ret=1
311 check_manytypes 2 manytypes.big "TYPE${ntype}" NOERROR big SOA "" 120 || ret=1
343 check_manytypes 1 manytypes.big "TYPE${ntype}" NOERROR big SOA 0 || ret=1
349 check_manytypes 2 manytypes.big "TYPE${ntype}" NOERROR big SOA 0 || ret=1
362 check_manytypes 1 manytypes.big "${rrtype}" NOERROR big SOA 120 || ret=1
366 check_manytypes 2 manytypes.big "${rrtype}" NOERROR big SOA "" 120 || ret=1
  /src/external/mpl/bind/dist/bin/tests/system/rpz/
setup.sh 35 sed -e "/SOA/s/blx/bl$NM/g" ns3/base.db >ns3/bl$NM.db
85 @ SOA . hostmaster.ns.example.tld5. ( 1 3600 1200 604800 60 )
94 @ SOA . hostmaster.ns.blperf. ( 1 3600 1200 604800 60 )
  /src/external/mpl/bind/dist/bin/tests/system/forward/ans6/
ans.py 40 - all other queries elicit a negative response with a common SOA record.
62 response_type = dns.rdatatype.SOA
  /src/external/mpl/bind/dist/bin/tests/system/qmin/
qmin_ans.py 81 and qctx.response.authority[0].rdtype == dns.rdatatype.SOA
  /src/external/mpl/bind/dist/bin/tests/system/serve-stale/ans2/
ans.pl 49 my $SOA = "example 300 IN SOA . . 0 0 0 0 300";
52 my $ssSOA = "delegated.serve.stale 300 IN SOA . . 0 0 0 0 300";
59 my $slowSOA = "slow 300 IN SOA . . 0 0 0 0 300";
63 my $slownegSOA = "slow 2 IN SOA . . 0 0 0 0 300";
71 my $negSOA = "example 2 IN SOA . . 0 0 0 0 300";
72 my $ssnegSOA = "delegated.serve.stale 2 IN SOA . . 0 0 0 0 300";
129 my $rr = new Net::DNS::RR($SOA);
139 } elsif ($qtype eq "SOA") {
140 my $rr = new Net::DNS::RR($SOA);
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/enginepkcs11/
tests.sh 87 dig_with_opts "$zone" @10.53.0.1 SOA >dig.out.soa.$zone.$n || ret=1
88 awk '$4 == "RRSIG" { print $11 }' dig.out.soa.$zone.$n >dig.out.keyids.$zone.$n || ret=1
92 test "$ret" -eq 0 || echo_i "failed (SOA RRset not signed with key $zskid1)"
125 echo_i "Test SOA response for $zone after inline signing ($n)"
127 dig_with_opts "$zone" @10.53.0.1 SOA >dig.out.soa.$zone.$n || return 1
128 awk '$4 == "RRSIG" { print $11 }' dig.out.soa.$zone.$n >dig.out.keyids.$zone.$n || return 1
136 test "$ret" -eq 0 || echo_i "failed (expected 2 SOA RRSIG records)"
202 echo_i "Test SOA response for $zone ($n)
    [all...]
  /src/external/bsd/nsd/dist/doc/
differences.tex 242 \subsubsection{b-soattl - BIND sets SOA TTL in authority section to 0 for SOA queries}
245 This happens when asking for the SOA for a domain that is not served.
253 ;; foo.bar. IN SOA
265 ;; foo.bar. IN SOA
270 . 0 IN SOA A.ROOT-SERVERS.NET. NSTLD.VERISIGN-GRS.COM. (
289 ;; foo.bar. IN SOA
294 . 86400 IN SOA a.root-servers.net. nstld.verisign-grs.com. (
308 BIND conforms to internet-draft draft-andrews-dnsext-soa-discovery which
319 SOA (CLASS=IN) for the zone, as for an authoritative nxdomain
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/zonechecks/
tests.sh 209 checkfor "files: reload.db, soa.db$" rndc.out.prereload
210 echo "@ 0 SOA . . 2 0 0 0 0" >ns1/soa.db
213 $DIG $DIGOPTS reload.example SOA @10.53.0.1 >dig.out
218 checkfor "files: reload.db, soa.db$" rndc.out.postreload
220 echo "@ 0 SOA . . 3 0 0 0 0" >ns1/reload.db
224 $DIG $DIGOPTS reload.example SOA @10.53.0.1 >dig.out
  /src/external/bsd/unbound/dist/testdata/
common.sh 288 SERIAL=`dig -p $4 @$3 $1 SOA +short | awk '{ print $3 }'`
291 echo "** \"dig -p $4 @$3 $1 SOA +short\" failed!"
  /src/external/mpl/bind/dist/bin/tests/system/cookie/
cookie_ans.py 65 _tld(qctx), 2, qctx.qclass, dns.rdatatype.SOA, ". . 0 0 0 0 2"
185 if qctx.qtype == dns.rdatatype.SOA:
  /src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/
tests.sh 52 $DIG $DIGOPTS @10.53.0.2 example SOA >dig.out.ns2.test$n || ret=1
58 $DIG $DIGOPTS @10.53.0.3 example SOA >dig.out.ns3.test$n || ret=1
187 $DIG $DIGOPTS @10.53.0.4 example SOA >dig.out.ns4.test$n
  /src/external/mpl/bind/dist/bin/tests/system/addzone/
tests.sh 724 $DIG $DIGOPTS @10.53.0.3 SOA "test4.baz" >dig.out.1.test$n || ret=1
727 $DIG $DIGOPTS @10.53.0.3 SOA "test5.baz" >dig.out.2.test$n || ret=1
730 $DIG $DIGOPTS @10.53.0.3 SOA 'test/.baz' >dig.out.3.test$n || ret=1
733 $DIG $DIGOPTS @10.53.0.3 SOA 'test\\.baz' >dig.out.4.test$n || ret=1
736 $DIG $DIGOPTS @10.53.0.3 SOA 'test\032.baz' >dig.out.5.test$n || ret=1
739 $DIG $DIGOPTS @10.53.0.3 SOA 'test\010.baz' >dig.out.6.test$n || ret=1
  /src/external/mpl/bind/dist/bin/tests/system/nsupdate/
setup.sh 30 update.nil IN SOA ns1.example.nil. hostmaster.example.nil. (

Completed in 46 milliseconds

1 2