Lines Matching refs:grep

52 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
64 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
76 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
86 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
87 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
95 grep "AUTHORITY: 4," dig.out.ns3.test$n > /dev/null || ret=1
96 grep "status: NOERROR" dig.out.ns3.test$n > /dev/null || ret=1
104 grep "AUTHORITY: 4," dig.out.ns3.test$n > /dev/null || ret=1
105 grep "status: NOERROR" dig.out.ns3.test$n > /dev/null || ret=1
115 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
116 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
128 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
129 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
139 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
140 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
152 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
153 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
165 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
167 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
177 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
178 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
179 grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
191 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
192 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
193 grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
205 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
206 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
207 grep "ANSWER: 0" dig.out.ns4.test$n > /dev/null || ret=1
217 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
218 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
228 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
240 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
242 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
254 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
256 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
266 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
268 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
278 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
280 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
292 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
294 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
306 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
308 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
320 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
322 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
334 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
335 grep "0 IN SOA" dig.out.ns4.test$n > /dev/null || ret=1
337 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
349 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
350 grep "0 IN SOA" dig.out.ns4.test$n > /dev/null || ret=1
352 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
364 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
365 grep "0 IN SOA" dig.out.ns4.test$n > /dev/null || ret=1
367 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
381 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
382 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
394 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
395 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
407 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
408 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
420 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
421 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
433 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
434 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
446 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
447 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
459 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
460 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
472 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
473 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
485 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
486 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
498 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
499 #grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
509 grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
520 grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
528 grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
536 grep "SERVFAIL" dig.out.ns5.test$n > /dev/null || ret=1
544 grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
561 grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
579 grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
593 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
595 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
609 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
611 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
623 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
625 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
635 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
636 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
650 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
652 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
662 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
664 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
674 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
684 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
696 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
698 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
710 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
712 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
713 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
725 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
727 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
728 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null && ret=1
738 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
740 grep "ANSWER: 6" dig.out.ns4.test$n > /dev/null || ret=1
752 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
754 grep "ANSWER: 4" dig.out.ns4.test$n > /dev/null || ret=1
766 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
770 grep "ANSWER: 5" dig.out.ns4.test$n > /dev/null || ret=1
782 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
784 grep "ANSWER: 4" dig.out.ns4.test$n > /dev/null || ret=1
796 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
808 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
810 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
822 grep "NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
824 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
837 grep "flags:.*ad.*QUERY" dig.out.ns6.test$n > /dev/null && ret=1
850 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
863 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
872 grep "AUTHORITY: 0" dig.out.ns7.test$n > /dev/null || ret=1
875 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
884 grep "AUTHORITY: 0" dig.out.ns7.test$n > /dev/null || ret=1
887 grep "status: NXDOMAIN" dig.out.ns4.test$n > /dev/null || ret=1
902 grep "flags:.*ad.*QUERY" dig.out.ns6.test$n > /dev/null || ret=1
911 grep "status: NOERROR" dig.out.ns2.test$n > /dev/null || ret=1
920 grep "status: NOERROR" dig.out.ns3.test$n > /dev/null || ret=1
950 grep "IQF9LQTLKKNFK0KVIFELRAK4IC4QLTMG.example. 0 IN NSEC3 1 0 10 - IQF9LQTLKKNFK0KVIFELRAK4IC4QLTMG A NS SOA RRSIG DNSKEY NSEC3PARAM" example.db > /dev/null
969 grep "SOA 5 1 50" signer/example.db.after > /dev/null || ret=1
990 grep "^sub1\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 || ret=1
991 grep "^ns\.sub2\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 || ret=1
1003 grep "^sub1\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 && ret=1
1004 grep "^ns\.sub2\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 && ret=1
1022 grep "^sub1\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 || ret=1
1023 grep "^ns\.sub2\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 || ret=1
1035 grep "^sub1\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 && ret=1
1036 grep "^ns\.sub2\.example\..*RRSIG[ ]A[ ]" signer/example2.db.signed > /dev/null 2>&1 && ret=1
1048 expect=`$DIG $DIGOPTS +short normalthenrrsig.secure.example. @10.53.0.3 rrsig | grep '^A' ` || ret=1
1052 grep "flags:.*ra.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1065 grep "flags:.*ra.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
1076 grep "status: NXDOMAIN" dig.out.ns2.test$n > /dev/null || ret=1
1087 grep "status: NOERROR" dig.out.ns2.test$n > /dev/null || ret=1
1088 grep "3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN.*NSEC3 1 1 1 - 3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN" dig.out.ns2.test$n > /dev/null || ret=1
1096 grep "status: NXDOMAIN" dig.out.ns2.test$n > /dev/null || ret=1
1097 grep "3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN.*NSEC3 1 1 1 - 3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN" dig.out.ns2.test$n > /dev/null || ret=1
1105 grep "status: NOERROR" dig.out.ns2.test$n > /dev/null || ret=1
1106 grep "3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN.*NSEC3 1 1 1 - 3KL3NK1HKQ4IUEEHBEF12VGFKUETNBAN" dig.out.ns2.test$n > /dev/null || ret=1
1114 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
1115 grep "flags:[^;]* ad[^;]*;" dig.out.ns4.test$n > /dev/null || ret=1
1136 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1137 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
1145 grep "RRSIG.SOA" dig.out.ns3.test$n > /dev/null || ret=1
1153 grep "SERVFAIL" dig.out.ns4.test$n > /dev/null || ret=1
1154 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
1155 grep "expired.example .*: RRSIG has expired" ns4/named.run > /dev/null || ret=1
1168 grep DNSKEY ${kskname}.key | sed -e 's/^/update add /' -e 's/IN/300 IN/'
1173 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
1174 grep "flags:.* ad[ ;]" dig.out.ns4.test$n > /dev/null || ret=1
1175 grep "NSEC3 .* TYPE65534" dig.out.ns4.test$n > /dev/null || ret=1
1183 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
1184 grep "ANSWER: 1," dig.out.ns4.test$n > /dev/null || ret=1
1192 grep "NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
1193 grep "ANSWER: 2," dig.out.ns4.test$n > /dev/null || ret=1
1194 grep "flags:.* ad[ ;]" dig.out.ns4.test$n > /dev/null || ret=1
1203 grep 'flags:.* ad;' dig.out.ns4.test$n >/dev/null || ret=1
1204 grep 'RRSIG.*SOA.* UPPER\.EXAMPLE\. ' dig.out.ns4.test$n > /dev/null || ret=1
1213 grep 'flags:.* ad;' dig.out.ns4.test$n >/dev/null || ret=1
1214 grep 'RRSIG.*SOA.* lower\.example\. ' dig.out.ns4.test$n > /dev/null || ret=1
1226 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1227 grep "CNAME" dig.out.ns4.test$n > /dev/null || ret=1
1239 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1240 grep "CNAME" dig.out.ns4.test$n > /dev/null && ret=1
1252 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1253 grep "CNAME" dig.out.ns4.test$n > /dev/null && ret=1
1265 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1266 grep "CNAME" dig.out.ns4.test$n > /dev/null || ret=1
1267 grep "DNAME" dig.out.ns4.test$n > /dev/null || ret=1
1279 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null || ret=1
1280 grep "DNAME" dig.out.ns4.test$n > /dev/null || ret=1
1287 lines=`grep "reading private key file expiring.example" ns3/named.run | wc -l`
1296 nsec3=`grep "IN.NSEC3" dig.out.ds.ns6.test$n | wc -l`
1300 nsec3=`grep "IN.NSEC3" dig.out.ns6.test$n | wc -l`
1304 grep "flags:.*ad.*QUERY" dig.out.soa.ns4.test$n > /dev/null || ret=1
1307 grep "status: NOERROR" dig.out.ns4.test$n > /dev/null || ret=1
1308 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n > /dev/null && ret=1
1315 after=`$DIG axfr siginterval.example -p 5300 @10.53.0.3 | grep RRSIG.SOA`
1319 before=`$DIG axfr siginterval.example -p 5300 @10.53.0.3 | grep RRSIG.SOA`
1326 after=`$DIG axfr siginterval.example -p 5300 @10.53.0.3 | grep RRSIG.SOA`