OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:ns8
(Results
1 - 14
of
14
) sorted by relevancy
/src/external/mpl/bind/dist/bin/tests/system/inline/
tests_signed_zone_files.py
60
Check whether all signed zone files in the "
ns8
" subdirectory contain the
62
The test assumes that all "*.signed" files in the "
ns8
" subdirectory are in
78
for signed_zone in sorted(glob.glob("
ns8
/*.signed")):
tests.sh
1315
nextpart
ns8
/named.run >nextpart.pre$n.out
1320
touch
ns8
/example??.com.db
1324
nextpart
ns8
/named.run >nextpart.post$n.out
1334
nextpart
ns8
/named.run >nextpart.pre$n.out
1337
nextpart
ns8
/named.run >nextpart.post$n.out
1345
dig_with_opts @10.53.0.8 example SOA >dig.out.
ns8
.test$n.soa1 || ret=1
1346
cp
ns8
/example2.db.in
ns8
/example.db || ret=1
1347
nextpart
ns8
/named.run >/dev/null
1349
wait_for_log 3 "all zones loaded"
ns8
/named.ru
[
all
...]
setup.sh
56
cd
ns8
/src/external/mpl/bind/dist/bin/tests/system/nsupdate/krb/
setup.sh
88
kadmin.local addprinc -maxlife ${lifetime}d -randkey DNS/
ns8
.example.com@EXAMPLE.COM
92
kadmin.local ktadd -k
ns8
-server.keytab DNS/
ns8
.example.com@EXAMPLE.COM
107
cp
ns8
-server.keytab ../
ns8
/dns-other-than-KRB5_KTNAME.keytab
112
cp krb5-machine.ccache ../
ns8
/machine.ccache
/src/external/mpl/bind/dist/bin/tests/system/xfer/
setup.sh
33
$PERL -e 'for ($i=0;$i<4096;$i++){ printf("name%u 259200 A 1.2.3.4\nname%u 259200 TXT \"Hello World %u\"\n", $i, $i, $i);}' >
ns8
/small.db
34
$PERL -e 'printf("large IN TYPE45234 \\# 48000 "); for ($i=0;$i<16*3000;$i++) { printf("%02x", $i % 256); } printf("\n");' >
ns8
/large.db
tests.sh
552
num_messages=$(cat
ns8
/named.run | grep "sending TCP message of" | wc -l)
/src/external/mpl/bind/dist/bin/tests/system/nsupdate/
setup.sh
83
cp -f
ns8
/in-addr.db.in
ns8
/in-addr.db
84
cp -f
ns8
/example.com.db.in
ns8
/example.com.db
tests.sh
2580
KRB5CCNAME="FILE:$(pwd)/
ns8
/machine.ccache"
2590
$DIG $DIGOPTS +tcp @10.53.0.8 xxx.machine.example.com A >dig.out.
ns8
.test$n || ret=1
2591
grep "status: NOERROR" dig.out.
ns8
.test$n >/dev/null || ret=1
2592
grep "xxx.machine.example.com..*A.*10.53.0.8" dig.out.
ns8
.test$n >/dev/null || ret=1
2601
KRB5CCNAME="FILE:$(pwd)/
ns8
/machine.ccache"
2612
$DIG $DIGOPTS +tcp @10.53.0.8 foo.example.com A >dig.out.
ns8
.test$n || ret=1
2613
grep "status: NXDOMAIN" dig.out.
ns8
.test$n >/dev/null || ret=1
/src/external/mpl/bind/dist/bin/tests/system/rpz/
setup.sh
39
cp
ns8
/manual-update-rpz.db.in
ns8
/manual-update-rpz.db
tests.sh
31
ns8
=$ns.8 # another rewriting resolver
881
$DIG walled.tld2 -p ${PORT} +noall +add @$
ns8
>dig.out.${t} || setret "failed"
/src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh
4073
# This nameserver (
ns8
) is loaded with a bunch of trust anchors. Some of
4081
grep -q "ignoring static-key for 'disabled\.trusted\.': algorithm is disabled"
ns8
/named.run || ret=1
4082
grep -q "ignoring static-key for 'unsupported\.trusted\.': algorithm is unsupported"
ns8
/named.run || ret=1
4083
grep -q "ignoring static-key for 'revoked\.trusted\.': bad key type"
ns8
/named.run || ret=1
4084
grep -q "ignoring initial-key for 'disabled\.managed\.': algorithm is disabled"
ns8
/named.run || ret=1
4085
grep -q "ignoring initial-key for 'unsupported\.managed\.': algorithm is unsupported"
ns8
/named.run || ret=1
4086
grep -q "ignoring initial-key for 'revoked\.managed\.': bad key type"
ns8
/named.run || ret=1
4094
# resolver with trust anchors for the given zone (
ns8
). Both are expected to
4099
dig_with_opts @10.53.0.8 a.secure.trusted A >dig.out.
ns8
.test$n
4101
grep "status: NOERROR," dig.out.
ns8
.test$n >/dev/null || ret=
[
all
...]
/src/external/mpl/bind/dist/bin/tests/system/cookie/
tests.sh
221
nextpart
ns8
/named.run >/dev/null
224
wait_for_log_peek 3 "missing required cookie from 10.53.0.7#"
ns8
/named.run || ret=1
225
wait_for_log_peek 3 "connected from"
ns8
/named.run || ret=1
/src/external/mpl/bind/dist/bin/tests/system/
conftest.py
690
def
ns8
(servers):
function
691
return servers["
ns8
"]
/src/external/mpl/bind/dist/bin/tests/system/dnssec/ns3/
sign.sh
56
# Make trusted-keys and managed keys conf sections for
ns8
.
70
keyfile_to_initial_keys $keyname1 $keyname2 $keyname3 $keyname4 $keyname5 >../
ns8
/managed.conf
73
keyfile_to_static_keys $keyname1 $keyname2 $keyname3 $keyname4 $keyname5 >../
ns8
/trusted.conf
352
# to mimic unsupported DS digest (see
ns8
).
Completed in 51 milliseconds
Indexes created Sat Feb 28 05:31:39 UTC 2026