| /src/external/mpl/bind/bin/nsupdate/ |
| Makefile | 5 PROG= nsupdate 6 MAN= nsupdate.1 9 DIST=${IDIST}/bin/nsupdate
|
| /src/external/mpl/bind/bin/ |
| Makefile | 3 SUBDIR= dig host named nslookup nsupdate rndc dnssec check tools \
|
| /src/external/mpl/bind/dist/bin/tests/system/nsupdate/ |
| tests.sh | 27 # Run nsupdate system test. 31 # Re-run nsupdate system test to confirm everything still works. 94 $NSUPDATE -k ns1/ddns.key >nsupdate.out 2>&1 <<END && ret=1 100 grep NOTAUTH nsupdate.out >/dev/null 2>&1 || ret=1 110 $NSUPDATE -k ns1/ddns.key >nsupdate.out 2>&1 <<END && ret=1 116 grep NOTAUTH nsupdate.out >/dev/null 2>&1 || ret=1 126 # nsupdate will print a ">" prompt to stdout as it gets each input line. 127 $NSUPDATE -k ns1/ddns.key <<END >/dev/null || ret= [all...] |
| /src/external/mpl/bind/dist/contrib/scripts/ |
| zone-edit.sh.in | 24 nsupdate=${bindir}/nsupdate 28 echo "Usage: zone-edit <zone> [dig options] [ -- nsupdate options ]" 88 ) | ${nsupdate} "$@"
|
| /src/external/mpl/bind/dist/bin/tests/system/ssumaxtype/ |
| tests_ssumaxtype.py | 80 ns1.nsupdate(up) 92 ns1.nsupdate(up) 98 ns1.nsupdate(up) 121 ns1.nsupdate(up) 147 ns1.nsupdate(up) 153 ns1.nsupdate(up, expected_rcode=dns.rcode.SERVFAIL)
|
| /src/external/mpl/bind/dist/bin/tests/system/tsiggss/ |
| tests.sh | 42 $NSUPDATE -g -d ns1/update.txt >nsupdate.out${num} 2>&1 || { 44 sed "s/^/I:/" nsupdate.out${num} 49 tkeyout=$(awk '/recvmsg reply from GSS-TSIG query/,/Sending update to/' nsupdate.out${num}) 57 grep -q "flags: qr; QUESTION: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1" nsupdate.out${num} || { 139 $NSUPDATE -k ns1/Kkey.example.nil.*.private <<END >/dev/null 2>&1 || ret=1 154 $NSUPDATE <<END >nsupdate.out${n} 2>&1 && ret=1 157 grep "realm is too long" nsupdate.out${n} >/dev/null || ret=1 158 grep "syntax error" nsupdate.out${n} >/dev/null || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/checknames/ |
| tests.sh | 93 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || not=0 109 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=1 125 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=1 142 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=1 159 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/catz/ |
| tests.sh | 174 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1 209 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1 244 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1 270 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1 294 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/multisigner/ |
| tests_multisigner.py | 167 primary.nsupdate(update_msg) 179 f"- zone {zone} {server.identifier}: make sure we did not try to sign with the keys added with nsupdate" 210 primary.nsupdate(update_msg) 254 primary.nsupdate(update_msg) 290 primary.nsupdate(update_msg) 326 primary.nsupdate(update_msg) 370 primary.nsupdate(update_msg) 406 primary.nsupdate(update_msg) 442 primary.nsupdate(update_msg) 486 primary.nsupdate(update_msg [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/nsec3/ |
| tests_nsec3_initial.py | 145 ns3.nsupdate(update_msg, expected_rcode=dns.rcode.REFUSED)
|
| /src/external/mpl/bind/dist/bin/tests/system/upforwd/ |
| tests.sh | 112 $NSUPDATE -y "${DEFAULT_HMAC}:update.example:c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K" -- - <<EOF || ret=1 165 $NSUPDATE -y "${DEFAULT_HMAC}:update.example:c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K" -S -O -- - <<EOF || ret=1 238 $NSUPDATE -- - <<EOF || ret=1 326 $NSUPDATE -y "${DEFAULT_HMAC}:update.example:c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K" -- - <<EOF || ret=1 392 $NSUPDATE -k $keyname.private -- - <<EOF >nsupdate.out.test$n 2>&1 || ret=1 427 $NSUPDATE -k $keyname.private -S -O -- - <<EOF >nsupdate.out.test$n 2>&1 || ret=1 465 $NSUPDATE -d -D -k $keyname.private -- - <<EOF >nsupdate.out.test$n.$i 2>&1 && good=$((good + 1)) || bad=$((bad + 1) [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-cds.c | 405 write_parent_set(const char *path, const char *inplace, bool nsupdate, 416 if (nsupdate && inplace == NULL) { 1021 vbprintf(1, "warning: no TTL in nsupdate script\n"); 1058 " -u emit nsupdate script\n" 1099 bool nsupdate = false; local 1153 nsupdate = true; 1291 write_parent_set(ds_path, inplace, nsupdate, &old_ds_set); 1352 if (nsupdate) { 1356 write_parent_set(ds_path, inplace, nsupdate, &new_ds_set);
|
| /src/external/mpl/bind/dist/bin/tests/system/rollover_multisigner/ |
| tests_rollover_multisigner.py | 173 ns3.nsupdate(update_msg) 188 ns3.nsupdate(update_msg)
|
| /src/external/mpl/bind/dist/bin/tests/system/pending/ |
| tests.sh | 31 $NSUPDATE -d <<END >>nsupdate.out.test 2>&1 || _ret=1
|
| /src/external/mpl/bind/dist/bin/tests/system/rndc/ |
| tests.sh | 29 $NSUPDATE -p ${PORT} -k ns2/session.key >/dev/null 2>&1 <<END || ret=1 76 $NSUPDATE -p ${PORT} -k ns2/session.key >/dev/null 2>&1 <<END && ret=1 96 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.1.test$n 2>&1 <<END || ret=1 135 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.1.test$n 2>&1 <<END || ret=1 175 $NSUPDATE -p ${PORT} -k ns2/session.key >/dev/null 2>&1 <<END || ret=1 226 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.1.test$n 2>&1 <<END || ret=1 252 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.2.test$n 2>&1 <<END || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/xfer/ |
| tests_xfer.py | 89 def nsupdate(config): function 90 isctest.run.cmd(isctest.vars.ALL["NSUPDATE"], input_text=config.encode("utf-8")) 460 nsupdate(nsupdate_config)
|
| /src/external/mpl/bind/dist/bin/tests/system/dnstap/ |
| tests.sh | 126 $NSUPDATE <<-EOF 502 $NSUPDATE <<-EOF >nsupdate.out 2>&1 && ret=1 508 grep "update failed: NOTAUTH" nsupdate.out >/dev/null || ret=1
|
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ |
| tests_kasp.py | 963 ns3.nsupdate(update_msg) 974 ns3.nsupdate(update_msg)
|
| /src/external/mpl/bind/dist/bin/tests/system/digdelv/ |
| tests.sh | 93 echo_i "check nsupdate handles UPDATE response to QUERY ($n)" 96 $NSUPDATE <<EOF >nsupdate.out.test$n 2>&1 || res=$? 102 grep "invalid OPCODE in response to SOA query" nsupdate.out.test$n >/dev/null || ret=1
|
| /src/external/mpl/bind/dist/bin/tests/system/autosign/ |
| tests.sh | 791 $NSUPDATE >/dev/null 2>&1 <<END || status=1 1191 $NSUPDATE >nsupdate.out.test$n 2>&1 <<END 1298 ) | $NSUPDATE 1317 ) | $NSUPDATE
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec/ |
| tests.sh | 2880 ) | $NSUPDATE 3585 ) | $NSUPDATE >nsupdate.out.test$n 2>&1 3595 echo_i "check that CDS records are signed only using KSK when added by nsupdate ($n)" 3608 ) | $NSUPDATE 3620 echo_i "check that CDS deletion records are signed only using KSK when added by nsupdate ($n)" 3629 ) | $NSUPDATE 3671 ) | $NSUPDATE 3847 ) | $NSUPDATE >nsupdate.out.test$n 2>& [all...] |