Searched refs:insecure (Results 1 - 8 of 8) sorted by relevance

/bind-9.11.3/bin/tests/system/dsdigest/
H A Dtests.sh39 echo "I:checking that validation with no supported digest algorithms results in insecure"
44 $DIG $DIGOPTS a.bad. @10.53.0.4 a > dig.out.insecure || ret=1
45 grep "NOERROR" dig.out.insecure > /dev/null || ret=1
46 grep "flags:[^;]* ad[ ;]" dig.out.insecure > /dev/null && ret=1
/bind-9.11.3/bin/tests/system/dnssec/ns4/
H A Dnamed5.conf56 zone insecure.secure.example {
71 zone insecure.secure.example {
/bind-9.11.3/bin/tests/system/autosign/ns3/
H A Dnamed.conf65 zone "insecure.example" {
67 file "insecure.example.db";
161 zone "secure-to-insecure.example" {
163 file "secure-to-insecure.example.db";
165 dnssec-secure-to-insecure yes;
173 dnssec-secure-to-insecure yes;
H A Dkeygen.sh163 # secure-to-insecure transition test zone; used to test removal of
166 setup secure-to-insecure.example
172 # another secure-to-insecure transition test zone; used to test
/bind-9.11.3/bin/tests/system/autosign/
H A Dclean.sh49 rm -f ns3/secure-to-insecure.example.db
H A Dtests.sh531 # Check the insecure.example domain
535 $DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
536 $DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
547 $DIG $DIGOPTS q.insecure.example. a @10.53.0.3 \
549 $DIG $DIGOPTS q.insecure.example. a @10.53.0.4 \
691 # Check the insecure.secure.example domain (insecurity proof)
695 $DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.2 a \
697 $DIG $DIGOPTS +noauth a.insecure.secure.example. @10.53.0.4 a \
707 # Check a negative response in insecure.secure.example
711 $DIG $DIGOPTS q.insecure
[all...]
/bind-9.11.3/bin/tests/system/dnssec/
H A Dtests.sh484 # Check the insecure.example domain
488 $DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
489 $DIG $DIGOPTS +noauth a.insecure.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
501 $DELV $DELVOPTS @10.53.0.4 a a.insecure.example > delv.out$n || ret=1
502 grep "a.insecure.example..*10.0.0.1" delv.out$n > /dev/null || ret=1
510 $DIG $DIGOPTS +noauth a.insecure.nsec3.example. @10.53.0.3 a > dig.out.ns3.test$n || ret=1
511 $DIG $DIGOPTS +noauth a.insecure.nsec3.example. @10.53.0.4 a > dig.out.ns4.test$n || ret=1
523 $DELV $DELVOPTS @10.53.0.4 a a.insecure.nsec3.example > delv.out$n || ret=1
524 grep "a.insecure.nsec3.example..*10.0.0.1" delv.out$n > /dev/null || ret=1
532 $DIG $DIGOPTS +noauth a.insecure
[all...]
/bind-9.11.3/lib/dns/
H A Dacl.c578 * insecure.
615 * Return ISC_TRUE iff the acl 'a' is considered insecure, that is,
625 isc_boolean_t insecure; local
637 insecure = insecure_prefix_found;
639 if (insecure)
646 /* A negated match can never be insecure. */
669 /* No insecure elements were found. */

Completed in 84 milliseconds