Lines Matching refs:insecure
484 # Check the insecure.example domain
488 $DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
489 $DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
501 $DELV $DELVOPTS @10.53.0.4 a a.insecure.example > delv.out$n || ret=1
502 grep "a.insecure.example..*10.0.0.1" delv.out$n > /dev/null || ret=1
510 $DIG $DIGOPTS +noauth a.insecure.nsec3.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
511 $DIG $DIGOPTS +noauth a.insecure.nsec3.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
523 $DELV $DELVOPTS @10.53.0.4 a a.insecure.nsec3.example > delv.out$n || ret=1
524 grep "a.insecure.nsec3.example..*10.0.0.1" delv.out$n > /dev/null || ret=1
532 $DIG $DIGOPTS +noauth a.insecure.optout.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
533 $DIG $DIGOPTS +noauth a.insecure.optout.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
545 $DELV $DELVOPTS @10.53.0.4 a a.insecure.optout.example > delv.out$n || ret=1
546 grep "a.insecure.optout.example..*10.0.0.1" delv.out$n > /dev/null || ret=1
554 $DIG $DIGOPTS q.insecure.example. a @10.53.0.3 \
556 $DIG $DIGOPTS q.insecure.example. a @10.53.0.4 \
569 $DELV $DELVOPTS @10.53.0.4 a q.insecure.example > delv.out$n 2>&1 || ret=1
578 $DIG $DIGOPTS q.insecure.nsec3.example. a @10.53.0.3 \
580 $DIG $DIGOPTS q.insecure.nsec3.example. a @10.53.0.4 \
593 $DELV $DELVOPTS @10.53.0.4 a q.insecure.nsec3.example > delv.out$n 2>&1 || ret=1
602 $DIG $DIGOPTS q.insecure.optout.example. a @10.53.0.3 \
604 $DIG $DIGOPTS q.insecure.optout.example. a @10.53.0.4 \
617 $DELV $DELVOPTS @10.53.0.4 a q.insecure.optout.example > delv.out$n 2>&1 || ret=1
626 $DIG $DIGOPTS r.insecure.example. soa @10.53.0.3 \
628 $DIG $DIGOPTS r.insecure.example. soa @10.53.0.4 \
641 $DIG $DIGOPTS r.insecure.nsec3.example. soa @10.53.0.3 \
643 $DIG $DIGOPTS r.insecure.nsec3.example. soa @10.53.0.4 \
656 $DIG $DIGOPTS r.insecure.optout.example. soa @10.53.0.3 \
658 $DIG $DIGOPTS r.insecure.optout.example. soa @10.53.0.4 \
842 $DIG $DIGOPTS a.insecure.example. a @10.53.0.5 > dig.out.ns5.test$n || ret=1
920 # Check the insecure.secure.example domain (insecurity proof)
924 $DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.2 a \
926 $DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.4 a \
936 # Check a negative response in insecure.secure.example
940 $DIG $DIGOPTS q.insecure.secure.example. @10.53.0.2 a > dig.out.ns2.test$n \
942 $DIG $DIGOPTS q.insecure.secure.example. @10.53.0.4 a > dig.out.ns4.test$n \
954 $DIG $DIGOPTS r.insecure.secure.example. @10.53.0.2 soa > dig.out.ns2.test$n \
956 $DIG $DIGOPTS r.insecure.secure.example. @10.53.0.4 soa > dig.out.ns4.test$n \
1051 $DIG $DIGOPTS +noauth a.insecure.example. soa @10.53.0.4 \
1053 $DIG $DIGOPTS +noauth +cdflag a.insecure.example. soa @10.53.0.5 \
1066 $DIG $DIGOPTS q.insecure.example. a @10.53.0.4 \
1068 $DIG $DIGOPTS +cdflag q.insecure.example. a @10.53.0.5 \
1629 echo "I:checking optout NSEC3 referral with only insecure delegations ($n)"
1638 echo "I:checking optout NSEC3 NXDOMAIN with only insecure delegations ($n)"
1647 echo "I:checking optout NSEC3 nodata with only insecure delegations ($n)"
2438 echo "I:checking that a insecure zone beneath a cname resolves ($n)"
2440 $DIG $DIGOPTS soa insecure.below-cname.example. @10.53.0.4 > dig.out.ns4.test$n || ret=1
2460 firstVal=`$DIG $myDIGOPTS insecure.example. dnskey| awk '$1 != ";;" { print $2 }'`
2462 secondVal=`$DIG $myDIGOPTS insecure.example. dnskey| awk '$1 != ";;" { print $2 }'`
2466 thirdVal=`$DIG $myDIGOPTS insecure.example. dnskey|awk '$1 != ";;" { print $2 }'`
2934 echo "I:check insecure delegation between static-stub zones ($n)"
2936 $DIG $DIGOPTS ns insecure.secure.example \
3204 echo "I:checking that unknown DNSKEY algorithm validates as insecure ($n)"
3234 echo "I:checking that unknown DNSKEY algorithm + unknown NSEC3 has algorithm validates as insecure ($n)"