HomeSort by: relevance | last modified time | path
    Searched refs:nsupdate (Results 1 - 21 of 21) sorted by relevancy

  /src/external/mpl/bind/bin/nsupdate/
Makefile 5 PROG= nsupdate
6 MAN= nsupdate.1
9 DIST=${IDIST}/bin/nsupdate
  /src/external/mpl/bind/bin/
Makefile 3 SUBDIR= dig host named nslookup nsupdate rndc dnssec check tools \
  /src/external/mpl/bind/dist/bin/tests/system/nsupdate/
tests.sh 27 # Run nsupdate system test.
31 # Re-run nsupdate system test to confirm everything still works.
94 $NSUPDATE -k ns1/ddns.key >nsupdate.out 2>&1 <<END && ret=1
100 grep NOTAUTH nsupdate.out >/dev/null 2>&1 || ret=1
110 $NSUPDATE -k ns1/ddns.key >nsupdate.out 2>&1 <<END && ret=1
116 grep NOTAUTH nsupdate.out >/dev/null 2>&1 || ret=1
126 # nsupdate will print a ">" prompt to stdout as it gets each input line.
127 $NSUPDATE -k ns1/ddns.key <<END >/dev/null || ret=
    [all...]
  /src/external/mpl/bind/dist/contrib/scripts/
zone-edit.sh.in 24 nsupdate=${bindir}/nsupdate
28 echo "Usage: zone-edit <zone> [dig options] [ -- nsupdate options ]"
88 ) | ${nsupdate} "$@"
  /src/external/mpl/bind/dist/bin/tests/system/ssumaxtype/
tests_ssumaxtype.py 80 ns1.nsupdate(up)
92 ns1.nsupdate(up)
98 ns1.nsupdate(up)
121 ns1.nsupdate(up)
147 ns1.nsupdate(up)
153 ns1.nsupdate(up, expected_rcode=dns.rcode.SERVFAIL)
  /src/external/mpl/bind/dist/bin/tests/system/tsiggss/
tests.sh 42 $NSUPDATE -g -d ns1/update.txt >nsupdate.out${num} 2>&1 || {
44 sed "s/^/I:/" nsupdate.out${num}
49 tkeyout=$(awk '/recvmsg reply from GSS-TSIG query/,/Sending update to/' nsupdate.out${num})
57 grep -q "flags: qr; QUESTION: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1" nsupdate.out${num} || {
139 $NSUPDATE -k ns1/Kkey.example.nil.*.private <<END >/dev/null 2>&1 || ret=1
154 $NSUPDATE <<END >nsupdate.out${n} 2>&1 && ret=1
157 grep "realm is too long" nsupdate.out${n} >/dev/null || ret=1
158 grep "syntax error" nsupdate.out${n} >/dev/null || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/checknames/
tests.sh 93 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || not=0
109 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=1
125 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=1
142 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=1
159 $NSUPDATE -d <<END >nsupdate.out.test$n 2>&1 || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/catz/
tests.sh 174 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1
209 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1
244 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1
270 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=1
294 $NSUPDATE -d <<END >>nsupdate.out.test$n 2>&1 || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/multisigner/
tests_multisigner.py 167 primary.nsupdate(update_msg)
179 f"- zone {zone} {server.identifier}: make sure we did not try to sign with the keys added with nsupdate"
210 primary.nsupdate(update_msg)
254 primary.nsupdate(update_msg)
290 primary.nsupdate(update_msg)
326 primary.nsupdate(update_msg)
370 primary.nsupdate(update_msg)
406 primary.nsupdate(update_msg)
442 primary.nsupdate(update_msg)
486 primary.nsupdate(update_msg
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/nsec3/
tests_nsec3_initial.py 145 ns3.nsupdate(update_msg, expected_rcode=dns.rcode.REFUSED)
  /src/external/mpl/bind/dist/bin/tests/system/upforwd/
tests.sh 112 $NSUPDATE -y "${DEFAULT_HMAC}:update.example:c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K" -- - <<EOF || ret=1
165 $NSUPDATE -y "${DEFAULT_HMAC}:update.example:c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K" -S -O -- - <<EOF || ret=1
238 $NSUPDATE -- - <<EOF || ret=1
326 $NSUPDATE -y "${DEFAULT_HMAC}:update.example:c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K" -- - <<EOF || ret=1
392 $NSUPDATE -k $keyname.private -- - <<EOF >nsupdate.out.test$n 2>&1 || ret=1
427 $NSUPDATE -k $keyname.private -S -O -- - <<EOF >nsupdate.out.test$n 2>&1 || ret=1
465 $NSUPDATE -d -D -k $keyname.private -- - <<EOF >nsupdate.out.test$n.$i 2>&1 && good=$((good + 1)) || bad=$((bad + 1)
    [all...]
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-cds.c 405 write_parent_set(const char *path, const char *inplace, bool nsupdate,
416 if (nsupdate && inplace == NULL) {
1021 vbprintf(1, "warning: no TTL in nsupdate script\n");
1058 " -u emit nsupdate script\n"
1099 bool nsupdate = false; local
1153 nsupdate = true;
1291 write_parent_set(ds_path, inplace, nsupdate, &old_ds_set);
1352 if (nsupdate) {
1356 write_parent_set(ds_path, inplace, nsupdate, &new_ds_set);
  /src/external/mpl/bind/dist/bin/tests/system/rollover_multisigner/
tests_rollover_multisigner.py 173 ns3.nsupdate(update_msg)
188 ns3.nsupdate(update_msg)
  /src/external/mpl/bind/dist/bin/tests/system/pending/
tests.sh 31 $NSUPDATE -d <<END >>nsupdate.out.test 2>&1 || _ret=1
  /src/external/mpl/bind/dist/bin/tests/system/rndc/
tests.sh 29 $NSUPDATE -p ${PORT} -k ns2/session.key >/dev/null 2>&1 <<END || ret=1
76 $NSUPDATE -p ${PORT} -k ns2/session.key >/dev/null 2>&1 <<END && ret=1
96 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.1.test$n 2>&1 <<END || ret=1
135 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.1.test$n 2>&1 <<END || ret=1
175 $NSUPDATE -p ${PORT} -k ns2/session.key >/dev/null 2>&1 <<END || ret=1
226 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.1.test$n 2>&1 <<END || ret=1
252 $NSUPDATE -p ${PORT} -k ns2/session.key >nsupdate.out.2.test$n 2>&1 <<END || ret=
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/xfer/
tests_xfer.py 89 def nsupdate(config): function
90 isctest.run.cmd(isctest.vars.ALL["NSUPDATE"], input_text=config.encode("utf-8"))
460 nsupdate(nsupdate_config)
  /src/external/mpl/bind/dist/bin/tests/system/dnstap/
tests.sh 126 $NSUPDATE <<-EOF
502 $NSUPDATE <<-EOF >nsupdate.out 2>&1 && ret=1
508 grep "update failed: NOTAUTH" nsupdate.out >/dev/null || ret=1
  /src/external/mpl/bind/dist/bin/tests/system/kasp/
tests_kasp.py 963 ns3.nsupdate(update_msg)
974 ns3.nsupdate(update_msg)
  /src/external/mpl/bind/dist/bin/tests/system/digdelv/
tests.sh 93 echo_i "check nsupdate handles UPDATE response to QUERY ($n)"
96 $NSUPDATE <<EOF >nsupdate.out.test$n 2>&1 || res=$?
102 grep "invalid OPCODE in response to SOA query" nsupdate.out.test$n >/dev/null || ret=1
  /src/external/mpl/bind/dist/bin/tests/system/autosign/
tests.sh 791 $NSUPDATE >/dev/null 2>&1 <<END || status=1
1191 $NSUPDATE >nsupdate.out.test$n 2>&1 <<END
1298 ) | $NSUPDATE
1317 ) | $NSUPDATE
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh 2880 ) | $NSUPDATE
3585 ) | $NSUPDATE >nsupdate.out.test$n 2>&1
3595 echo_i "check that CDS records are signed only using KSK when added by nsupdate ($n)"
3608 ) | $NSUPDATE
3620 echo_i "check that CDS deletion records are signed only using KSK when added by nsupdate ($n)"
3629 ) | $NSUPDATE
3671 ) | $NSUPDATE
3847 ) | $NSUPDATE >nsupdate.out.test$n 2>&
    [all...]

Completed in 75 milliseconds