HomeSort by: relevance | last modified time | path
    Searched refs:ns4 (Results 1 - 25 of 57) sorted by relevancy

1 2 3

  /src/external/mpl/bind/dist/bin/tests/system/bailiwick/
tests_bailiwick.py 29 servers["ns4"].rndc("flush")
39 def prime_cache(ns4: NamedInstance) -> None:
41 res = isctest.query.tcp(msg, ns4.ip)
53 def send_trigger_query(ns4: NamedInstance, qname: str) -> None:
55 isctest.query.tcp(msg, ns4.ip)
62 def check_domain_hijack(ns4: NamedInstance) -> None:
65 ns4.rndc("dumpdb -cache")
68 res = isctest.query.tcp(msg, ns4.ip)
72 res = isctest.query.tcp(msg, ns4.ip)
87 ns4 = servers["ns4"
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/filters/
setup.sh 17 (cd ns4 && $SHELL -e sign.sh)
  /src/external/mpl/bind/dist/bin/tests/system/migrate2kasp/
setup.sh 25 cd ns4
  /src/external/mpl/bind/dist/bin/tests/system/multisigner/
setup.sh 24 cd ns4
tests_multisigner.py 506 def test_multisigner(ns3, ns4):
516 isctest.kasp.wait_keymgr_done(ns4, zone)
525 keys4 = isctest.kasp.keydir_to_keylist(zone, ns4.identifier)
530 check_dnssec(ns4, zone, keys4, expected4)
539 check_add_zsk(ns4, zone, keys4, expected4, [zsks3[0]], extra)
540 check_no_dnssec_in_journal(ns4, zone)
544 check_remove_zsk(ns4, zone, keys4, expected4, [zsks3[0]], extra, check_fail=True)
545 check_no_dnssec_in_journal(ns4, zone)
554 check_add_cdnskey(ns4, zone, keys4, expected4, [ksks3[0]], extra)
555 check_no_dnssec_in_journal(ns4, zone
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/redirect/
setup.sh 20 cp ns4/example.db.in ns4/example.db
tests.sh 376 $DIG $DIGOPTS nonexist. @10.53.0.4 -b 10.53.0.2 a >dig.out.ns4.test$n || ret=1
377 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1
378 grep "nonexist. .*100.100.100.1" dig.out.ns4.test$n >/dev/null || ret=1
385 rm -f ns4/named.stats 2>/dev/null
387 PRE_RED=$(sed -n -e "s/[ ]*\([0-9]*\).queries resulted in NXDOMAIN that were redirected$/\1/p" ns4/named.stats)
388 PRE_SUC=$(sed -n -e "s/[ ]*\([0-9]*\).queries resulted in NXDOMAIN that were redirected and resulted in a successful remote lookup$/\1/p" ns4/named.stats)
389 $DIG $DIGOPTS nonexist. @10.53.0.4 -b 10.53.0.2 aaaa >dig.out.ns4.test$n || ret=1
390 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1
391 grep "nonexist. .*2001:ffff:ffff::6464:6401" dig.out.ns4.test$n >/dev/null || ret=1
398 rm -f ns4/named.stats 2>/dev/nul
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/resolver/
setup.sh 17 cp ns4/tld1.db ns4/tld.db
tests.sh 224 # ns5 is the recusor being tested. ns4 holds the sourcens zone containing
236 dig_with_opts +norecurse @10.53.0.4 target${nscount}.sourcens ns >dig.ns4.out.${nscount}.${n}
237 sourcerecs=$(grep NS dig.ns4.out.${nscount}.${n} | grep -cv ';')
255 stop_server ns4
256 touch ns4/named.noaa
257 start_server --noclean --restart --port ${PORT} ns4 || ret=1
263 dig_with_opts +tcp . @10.53.0.4 soa >dig.ns4.out.${n} || ret=1
264 grep 'flags: qr rd;' dig.ns4.out.${n} >/dev/null || ret=1
295 stop_server ns4
296 rm ns4/named.noa
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/xfer-servers-list/
tests_xfer_servers_list.py 42 def test_xfer_servers_list(ns1, ns2, ns3, ns4, templates):
43 # First, wait for ns2, ns3 and ns4 to xfrin foo.fr and answer it
46 wait_for_initial_xfrin(ns4)
55 seq = [(ns2, "notifykey2"), (ns3, "notifykey3"), (ns4, "notifykey4")]
59 # Then, ns1 update foo.fr. It notifies ns2, ns3 and ns4 about it
61 with ns2.watch_log_from_here() as ns2_watcher, ns3.watch_log_from_here() as ns3_watcher, ns4.watch_log_from_here() as ns4_watcher:
68 check_soa(ns4, 2)
  /src/external/mpl/bind/dist/bin/tests/system/kasp/
setup.sh 32 cd ns4
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh 122 $DIG +tcp +dnssec -p "$PORT" a.insecure.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
123 grep "ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2" dig.out.ns4.test$n >/dev/null || ret=1
124 grep "ns\\.insecure\\.example\\..*A.10\\.53\\.0\\.3" dig.out.ns4.test$n >/dev/null || ret=1
150 dig_with_opts +noauth +noadd +nodnssec +adflag a.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
151 digcomp dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
152 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=1
162 dig_with_opts +noauth +noadd +nodnssec +noadflag a.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
163 digcomp dig.out.ns2.test$n dig.out.ns4.test$n || ret=1
164 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null && ret=1
180 dig_with_opts +noauth a.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/mkeys/
setup.sh 23 (cd ns4 && $SHELL sign.sh)
28 cd ns4
  /src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/
tests.sh 187 $DIG $DIGOPTS @10.53.0.4 example SOA >dig.out.ns4.test$n
188 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1
193 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-is-ta-${oldid}.example A >dig.out.ns4.test$n || ret=1
194 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1
199 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-not-ta-${oldid}.example A >dig.out.ns4.test$n || ret=1
200 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1
205 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-is-ta-${newid}.example A >dig.out.ns4.test$n || ret=1
206 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1
211 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-not-ta-${newid}.example A >dig.out.ns4.test$n || ret=1
212 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/rndc/
setup.sh 20 $SHELL ${TOP_SRCDIR}/bin/tests/system/genzone.sh 2 >ns4/example.db
39 >ns4/key${1}.conf 2>/dev/null
40 grep -E -v '(^# Start|^# End|^# Use|^[^#])' ns4/key$1.conf | cut -c3- \
41 | sed 's/allow { 10.53.0.4/allow { any/' >>ns4/named.conf
53 cat >>ns4/named.conf <<-EOF
tests.sh 375 $RNDC -s 10.53.0.4 -p ${EXTRAPORT1} -c ns4/key1.conf status >/dev/null 2>&1 || ret=1
377 $RNDC -s 10.53.0.4 -p ${EXTRAPORT1} -c ns4/key${i}.conf status >/dev/null 2>&1 && ret=1
388 $RNDC -s 10.53.0.4 -p ${EXTRAPORT2} -c ns4/key2.conf status >/dev/null 2>&1 || ret=1
390 $RNDC -s 10.53.0.4 -p ${EXTRAPORT2} -c ns4/key${i}.conf status >/dev/null 2>&1 && ret=1
398 $RNDC -s 10.53.0.4 -p ${EXTRAPORT3} -c ns4/key3.conf status >/dev/null 2>&1 || ret=1
400 $RNDC -s 10.53.0.4 -p ${EXTRAPORT3} -c ns4/key${i}.conf status >/dev/null 2>&1 && ret=1
408 $RNDC -s 10.53.0.4 -p ${EXTRAPORT4} -c ns4/key4.conf status >/dev/null 2>&1 || ret=1
410 $RNDC -s 10.53.0.4 -p ${EXTRAPORT4} -c ns4/key${i}.conf status >/dev/null 2>&1 && ret=1
418 $RNDC -s 10.53.0.4 -p ${EXTRAPORT5} -c ns4/key5.conf status >/dev/null 2>&1 || ret=1
420 $RNDC -s 10.53.0.4 -p ${EXTRAPORT5} -c ns4/key${i}.conf status >/dev/null 2>&1 && ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/autosign/
tests.sh 272 $DIG $DIGOPTS +noauth a.oldsigs.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
273 digcomp dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
274 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=1
293 $DIG $DIGOPTS +noauth q.nsec3.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
294 digcomp dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
295 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=1
296 grep "status: NXDOMAIN" dig.out.ns4.test$n >/dev/null || ret=1
307 $DIG $DIGOPTS +noauth q.autonsec3.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
308 digcomp dig.out.ns3.test$n dig.out.ns4.test$n || ret=1
309 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/xfer/
setup.sh 23 cp -f ns4/root.db.in ns4/root.db
24 $PERL -e 'for ($i=0;$i<10000;$i++){ printf("x%u 0 in a 10.53.0.1\n", $i);}' >>ns4/root.db
  /src/external/mpl/bind/dist/bin/tests/system/catz/
setup.sh 25 cp -f ns4/catalog.example.db.in ns4/catalog-self.example.db
  /src/external/mpl/bind/dist/bin/tests/system/staticstub/ns3/
sign.sh 20 (cd ../ns4 && $SHELL -e sign.sh)
22 cp ../ns4/dsset-sub.example. .
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/ns1/
sign.sh 51 cp trusted.conf ../ns4/trusted.conf
60 cp managed.conf ../ns4/managed.conf
  /src/external/mpl/bind/dist/bin/tests/system/dsdigest/ns1/
sign.sh 36 cp trusted.conf ../ns4/trusted.conf
  /src/external/mpl/bind/dist/bin/tests/system/pending/ns1/
sign.sh 35 cp trusted.conf ../ns4/trusted.conf
  /src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/ns1/
sign.sh 35 cp trusted.conf ../ns4/trusted.conf
  /src/external/mpl/bind/dist/bin/tests/system/staticstub/ns2/
named.conf.j2 63 server-addresses { ::1; }; #ns4

Completed in 35 milliseconds

1 2 3