OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:ns4
(Results
1 - 25
of
57
) sorted by relevancy
1
2
3
/src/external/mpl/bind/dist/bin/tests/system/bailiwick/
tests_bailiwick.py
29
servers["
ns4
"].rndc("flush")
39
def prime_cache(
ns4
: NamedInstance) -> None:
41
res = isctest.query.tcp(msg,
ns4
.ip)
53
def send_trigger_query(
ns4
: NamedInstance, qname: str) -> None:
55
isctest.query.tcp(msg,
ns4
.ip)
62
def check_domain_hijack(
ns4
: NamedInstance) -> None:
65
ns4
.rndc("dumpdb -cache")
68
res = isctest.query.tcp(msg,
ns4
.ip)
72
res = isctest.query.tcp(msg,
ns4
.ip)
87
ns4
= servers["ns4"
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/filters/
setup.sh
17
(cd
ns4
&& $SHELL -e sign.sh)
/src/external/mpl/bind/dist/bin/tests/system/migrate2kasp/
setup.sh
25
cd
ns4
/src/external/mpl/bind/dist/bin/tests/system/multisigner/
setup.sh
24
cd
ns4
tests_multisigner.py
506
def test_multisigner(ns3,
ns4
):
516
isctest.kasp.wait_keymgr_done(
ns4
, zone)
525
keys4 = isctest.kasp.keydir_to_keylist(zone,
ns4
.identifier)
530
check_dnssec(
ns4
, zone, keys4, expected4)
539
check_add_zsk(
ns4
, zone, keys4, expected4, [zsks3[0]], extra)
540
check_no_dnssec_in_journal(
ns4
, zone)
544
check_remove_zsk(
ns4
, zone, keys4, expected4, [zsks3[0]], extra, check_fail=True)
545
check_no_dnssec_in_journal(
ns4
, zone)
554
check_add_cdnskey(
ns4
, zone, keys4, expected4, [ksks3[0]], extra)
555
check_no_dnssec_in_journal(
ns4
, zone
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/redirect/
setup.sh
20
cp
ns4
/example.db.in
ns4
/example.db
tests.sh
376
$DIG $DIGOPTS nonexist. @10.53.0.4 -b 10.53.0.2 a >dig.out.
ns4
.test$n || ret=1
377
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=1
378
grep "nonexist. .*100.100.100.1" dig.out.
ns4
.test$n >/dev/null || ret=1
385
rm -f
ns4
/named.stats 2>/dev/null
387
PRE_RED=$(sed -n -e "s/[ ]*\([0-9]*\).queries resulted in NXDOMAIN that were redirected$/\1/p"
ns4
/named.stats)
388
PRE_SUC=$(sed -n -e "s/[ ]*\([0-9]*\).queries resulted in NXDOMAIN that were redirected and resulted in a successful remote lookup$/\1/p"
ns4
/named.stats)
389
$DIG $DIGOPTS nonexist. @10.53.0.4 -b 10.53.0.2 aaaa >dig.out.
ns4
.test$n || ret=1
390
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=1
391
grep "nonexist. .*2001:ffff:ffff::6464:6401" dig.out.
ns4
.test$n >/dev/null || ret=1
398
rm -f
ns4
/named.stats 2>/dev/nul
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/resolver/
setup.sh
17
cp
ns4
/tld1.db
ns4
/tld.db
tests.sh
224
# ns5 is the recusor being tested.
ns4
holds the sourcens zone containing
236
dig_with_opts +norecurse @10.53.0.4 target${nscount}.sourcens ns >dig.
ns4
.out.${nscount}.${n}
237
sourcerecs=$(grep NS dig.
ns4
.out.${nscount}.${n} | grep -cv ';')
255
stop_server
ns4
256
touch
ns4
/named.noaa
257
start_server --noclean --restart --port ${PORT}
ns4
|| ret=1
263
dig_with_opts +tcp . @10.53.0.4 soa >dig.
ns4
.out.${n} || ret=1
264
grep 'flags: qr rd;' dig.
ns4
.out.${n} >/dev/null || ret=1
295
stop_server
ns4
296
rm
ns4
/named.noa
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/xfer-servers-list/
tests_xfer_servers_list.py
42
def test_xfer_servers_list(ns1, ns2, ns3,
ns4
, templates):
43
# First, wait for ns2, ns3 and
ns4
to xfrin foo.fr and answer it
46
wait_for_initial_xfrin(
ns4
)
55
seq = [(ns2, "notifykey2"), (ns3, "notifykey3"), (
ns4
, "notifykey4")]
59
# Then, ns1 update foo.fr. It notifies ns2, ns3 and
ns4
about it
61
with ns2.watch_log_from_here() as ns2_watcher, ns3.watch_log_from_here() as ns3_watcher,
ns4
.watch_log_from_here() as ns4_watcher:
68
check_soa(
ns4
, 2)
/src/external/mpl/bind/dist/bin/tests/system/kasp/
setup.sh
32
cd
ns4
/src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh
122
$DIG +tcp +dnssec -p "$PORT" a.insecure.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=1
123
grep "ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2" dig.out.
ns4
.test$n >/dev/null || ret=1
124
grep "ns\\.insecure\\.example\\..*A.10\\.53\\.0\\.3" dig.out.
ns4
.test$n >/dev/null || ret=1
150
dig_with_opts +noauth +noadd +nodnssec +adflag a.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=1
151
digcomp dig.out.ns2.test$n dig.out.
ns4
.test$n || ret=1
152
grep "flags:.*ad.*QUERY" dig.out.
ns4
.test$n >/dev/null || ret=1
162
dig_with_opts +noauth +noadd +nodnssec +noadflag a.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=1
163
digcomp dig.out.ns2.test$n dig.out.
ns4
.test$n || ret=1
164
grep "flags:.*ad.*QUERY" dig.out.
ns4
.test$n >/dev/null && ret=1
180
dig_with_opts +noauth a.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/mkeys/
setup.sh
23
(cd
ns4
&& $SHELL sign.sh)
28
cd
ns4
/src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/
tests.sh
187
$DIG $DIGOPTS @10.53.0.4 example SOA >dig.out.
ns4
.test$n
188
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=1
193
$DIG $DIGOPTS @10.53.0.4 root-key-sentinel-is-ta-${oldid}.example A >dig.out.
ns4
.test$n || ret=1
194
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=1
199
$DIG $DIGOPTS @10.53.0.4 root-key-sentinel-not-ta-${oldid}.example A >dig.out.
ns4
.test$n || ret=1
200
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=1
205
$DIG $DIGOPTS @10.53.0.4 root-key-sentinel-is-ta-${newid}.example A >dig.out.
ns4
.test$n || ret=1
206
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=1
211
$DIG $DIGOPTS @10.53.0.4 root-key-sentinel-not-ta-${newid}.example A >dig.out.
ns4
.test$n || ret=1
212
grep "status: NOERROR" dig.out.
ns4
.test$n >/dev/null || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/rndc/
setup.sh
20
$SHELL ${TOP_SRCDIR}/bin/tests/system/genzone.sh 2 >
ns4
/example.db
39
>
ns4
/key${1}.conf 2>/dev/null
40
grep -E -v '(^# Start|^# End|^# Use|^[^#])'
ns4
/key$1.conf | cut -c3- \
41
| sed 's/allow { 10.53.0.4/allow { any/' >>
ns4
/named.conf
53
cat >>
ns4
/named.conf <<-EOF
tests.sh
375
$RNDC -s 10.53.0.4 -p ${EXTRAPORT1} -c
ns4
/key1.conf status >/dev/null 2>&1 || ret=1
377
$RNDC -s 10.53.0.4 -p ${EXTRAPORT1} -c
ns4
/key${i}.conf status >/dev/null 2>&1 && ret=1
388
$RNDC -s 10.53.0.4 -p ${EXTRAPORT2} -c
ns4
/key2.conf status >/dev/null 2>&1 || ret=1
390
$RNDC -s 10.53.0.4 -p ${EXTRAPORT2} -c
ns4
/key${i}.conf status >/dev/null 2>&1 && ret=1
398
$RNDC -s 10.53.0.4 -p ${EXTRAPORT3} -c
ns4
/key3.conf status >/dev/null 2>&1 || ret=1
400
$RNDC -s 10.53.0.4 -p ${EXTRAPORT3} -c
ns4
/key${i}.conf status >/dev/null 2>&1 && ret=1
408
$RNDC -s 10.53.0.4 -p ${EXTRAPORT4} -c
ns4
/key4.conf status >/dev/null 2>&1 || ret=1
410
$RNDC -s 10.53.0.4 -p ${EXTRAPORT4} -c
ns4
/key${i}.conf status >/dev/null 2>&1 && ret=1
418
$RNDC -s 10.53.0.4 -p ${EXTRAPORT5} -c
ns4
/key5.conf status >/dev/null 2>&1 || ret=1
420
$RNDC -s 10.53.0.4 -p ${EXTRAPORT5} -c
ns4
/key${i}.conf status >/dev/null 2>&1 && ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/autosign/
tests.sh
272
$DIG $DIGOPTS +noauth a.oldsigs.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=1
273
digcomp dig.out.ns3.test$n dig.out.
ns4
.test$n || ret=1
274
grep "flags:.*ad.*QUERY" dig.out.
ns4
.test$n >/dev/null || ret=1
293
$DIG $DIGOPTS +noauth q.nsec3.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=1
294
digcomp dig.out.ns3.test$n dig.out.
ns4
.test$n || ret=1
295
grep "flags:.*ad.*QUERY" dig.out.
ns4
.test$n >/dev/null || ret=1
296
grep "status: NXDOMAIN" dig.out.
ns4
.test$n >/dev/null || ret=1
307
$DIG $DIGOPTS +noauth q.autonsec3.example. @10.53.0.4 a >dig.out.
ns4
.test$n || ret=1
308
digcomp dig.out.ns3.test$n dig.out.
ns4
.test$n || ret=1
309
grep "flags:.*ad.*QUERY" dig.out.
ns4
.test$n >/dev/null || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/xfer/
setup.sh
23
cp -f
ns4
/root.db.in
ns4
/root.db
24
$PERL -e 'for ($i=0;$i<10000;$i++){ printf("x%u 0 in a 10.53.0.1\n", $i);}' >>
ns4
/root.db
/src/external/mpl/bind/dist/bin/tests/system/catz/
setup.sh
25
cp -f
ns4
/catalog.example.db.in
ns4
/catalog-self.example.db
/src/external/mpl/bind/dist/bin/tests/system/staticstub/ns3/
sign.sh
20
(cd ../
ns4
&& $SHELL -e sign.sh)
22
cp ../
ns4
/dsset-sub.example. .
/src/external/mpl/bind/dist/bin/tests/system/dnssec/ns1/
sign.sh
51
cp trusted.conf ../
ns4
/trusted.conf
60
cp managed.conf ../
ns4
/managed.conf
/src/external/mpl/bind/dist/bin/tests/system/dsdigest/ns1/
sign.sh
36
cp trusted.conf ../
ns4
/trusted.conf
/src/external/mpl/bind/dist/bin/tests/system/pending/ns1/
sign.sh
35
cp trusted.conf ../
ns4
/trusted.conf
/src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/ns1/
sign.sh
35
cp trusted.conf ../
ns4
/trusted.conf
/src/external/mpl/bind/dist/bin/tests/system/staticstub/ns2/
named.conf.j2
63
server-addresses { ::1; }; #
ns4
Completed in 35 milliseconds
1
2
3
Indexes created Sat Feb 28 05:31:39 UTC 2026