/bind-9.11.3/bin/tests/system/upforwd/ |
H A D | prereq.sh | 9 if $PERL -e 'use Net::DNS;' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/ixfr/ |
H A D | prereq.sh | 9 if $PERL -e 'use Net::DNS;' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/xfer/ |
H A D | prereq.sh | 9 if $PERL -e 'use Net::DNS;' 2>/dev/null 11 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION >= 0.69 && $Net::DNS::VERSION <= 0.74);' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/statistics/ |
H A D | prereq.sh | 9 if $PERL -e 'use Net::DNS;' 2>/dev/null 11 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION >= 0.76 && $Net::DNS::VERSION <= 0.77);' 2>/dev/null
|
H A D | tests.sh | 31 $RNDCCMD -s 10.53.0.2 stats > /dev/null 2>&1 33 grep "1 Addresses in hash table" ns2/named.stats > /dev/null || ret=1 40 grep "Cache Statistics" ns2/named.stats > /dev/null || ret=1 46 $DIGCMD a.example.info. @10.53.0.2 any > /dev/null 2>&1 49 $RNDCCMD -s 10.53.0.2 stats > /dev/null 2>&1 50 grep "2 Addresses in hash table" ns2/named.stats > /dev/null || ret=1 58 $RNDCCMD -s 10.53.0.3 stats > /dev/null 2>&1 64 $DIGCMD +tries=2 +time=1 +recurse @10.53.0.3 foo.info. any > /dev/null 2>&1 68 $RNDCCMD -s 10.53.0.3 stats > /dev/null 2>&1 76 grep "2 recursing clients" ns3/named.stats > /dev/null || re [all...] |
/bind-9.11.3/bin/tests/system/reclimit/ |
H A D | prereq.sh | 12 if $PERL -e 'use Net::DNS;' 2>/dev/null 14 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION <= 0.78);' 2>/dev/null 26 if $PERL -e 'use Net::DNS::Nameserver;' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/chain/ |
H A D | prereq.sh | 16 if $PYTHON -c "import dns" 2> /dev/null 28 if $PERL -e 'use Net::DNS;' 2>/dev/null 30 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION >= 0.69 && $Net::DNS::VERSION <= 0.74);' 2>/dev/null 41 if $PERL -e 'use Net::DNS::Nameserver;' 2>/dev/null
|
H A D | tests.sh | 19 grep "status: NOERROR" dig.out.ns2.short > /dev/null || ret=1 27 grep "status: NOERROR" dig.out.ns4.short > /dev/null || ret=1 35 grep "status: NOERROR" dig.out.ns2.long > /dev/null || ret=1 43 grep "status: NOERROR" dig.out.ns4.long > /dev/null || ret=1 51 grep "status: YXDOMAIN" dig.out.ns2.toolong > /dev/null || ret=1 59 grep "status: YXDOMAIN" dig.out.ns4.cachedtoolong > /dev/null || ret=1 60 grep '^long-dname\.example\..*DNAME.*long' dig.out.ns4.cachedtoolong > /dev/null || ret=1 68 grep "status: YXDOMAIN" dig.out.ns4.uncachedtoolong > /dev/null || ret=1 69 grep '^toolong-dname\.example\..*DNAME.*long' dig.out.ns4.uncachedtoolong > /dev/null || ret=1 77 grep "status: NOERROR" dig.out.ns2.cname > /dev/null || re [all...] |
/bind-9.11.3/bin/tests/system/statschannel/ |
H A D | prereq.sh | 11 if $PERL -e 'use File::Fetch;' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/dnssec/ |
H A D | prereq.sh | 12 if $PERL -e 'use Net::DNS;' 2>/dev/null 14 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION >= 0.69 && $Net::DNS::VERSION <= 0.70);' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/nsupdate/ |
H A D | prereq.sh | 12 if $PERL -e 'use Net::DNS;' 2>/dev/null 14 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION >= 0.69 && $Net::DNS::VERSION <= 0.70);' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/resolver/ |
H A D | prereq.sh | 12 if $PERL -e 'use Net::DNS;' 2>/dev/null 14 if $PERL -e 'use Net::DNS; die if ($Net::DNS::VERSION eq "0.76" || $Net::DNS::VERSION eq "0.77");' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/spf/ |
H A D | tests.sh | 18 grep "zone spf/IN: loaded serial 0" ns1/named.run > /dev/null || ret=1 19 grep "'y.spf' found type SPF" ns1/named.run > /dev/null || ret=1 20 grep "'spf' found type SPF" ns1/named.run > /dev/null && ret=1 22 grep "zone warn/IN: loaded serial 0" ns1/named.run > /dev/null || ret=1 23 grep "'y.warn' found type SPF" ns1/named.run > /dev/null || ret=1 24 grep "'warn' found type SPF" ns1/named.run > /dev/null && ret=1 26 grep "zone nowarn/IN: loaded serial 0" ns1/named.run > /dev/null || ret=1 27 grep "'y.nowarn' found type SPF" ns1/named.run > /dev/null && ret=1 28 grep "'nowarn' found type SPF" ns1/named.run > /dev/null && ret=1
|
/bind-9.11.3/bin/tests/system/stress/ |
H A D | prereq.sh | 12 if $PERL -e 'use Net::DNS;' 2>/dev/null
|
/bind-9.11.3/bin/tests/system/smartsign/ |
H A D | tests.sh | 58 $SETTIME -A now+30s $cksk2 > /dev/null 82 echo "$pzoneout" | grep 'KSKs: 1 active, 0 stand-by, 0 revoked' > /dev/null || ret=1 83 echo "$pzoneout" | grep 'ZSKs: 1 active, 0 stand-by, 0 revoked' > /dev/null || ret=1 84 echo "$czoneout" | grep 'KSKs: 1 active, 1 stand-by, 1 revoked' > /dev/null || ret=1 85 echo "$czoneout" | grep 'ZSKs: 1 active, 2 stand-by, 0 revoked' > /dev/null || ret=1 98 echo "$pzoneout" | grep 'KSKs: 1 active, 0 stand-by, 0 revoked' > /dev/null || ret=1 99 echo "$pzoneout" | grep 'ZSKs: 1 active, 0 present, 0 revoked' > /dev/null || ret=1 100 echo "$czoneout" | grep 'KSKs: 1 active, 1 stand-by, 1 revoked' > /dev/null || ret=1 101 echo "$czoneout" | grep 'ZSKs: 1 active, 2 present, 0 revoked' > /dev/null || ret=1 111 grep "key id = $pzid" $pfile.signed > /dev/null || { [all...] |
/bind-9.11.3/lib/dns/rdata/generic/ |
H A D | null_10.c | 81 dns_rdata_null_t *null = source; local 85 REQUIRE(null->common.rdtype == type); 86 REQUIRE(null->common.rdclass == rdclass); 87 REQUIRE(null->data != NULL || null->length == 0); 92 return (mem_tobuffer(target, null->data, null->length)); 97 dns_rdata_null_t *null = target; local 103 null->common.rdclass = rdata->rdclass; 104 null 119 dns_rdata_null_t *null = source; local [all...] |
/bind-9.11.3/bin/tests/system/ |
H A D | cleanpkcs11.sh | 16 $PK11DEL -w0 > /dev/null 2>&1
|
/bind-9.11.3/bin/tests/system/dnssec/ns5/ |
H A D | sign.sh | 29 $SETTIME -R now ${keyname}.key > /dev/null 32 $KEYGEN -r $RANDFILE -q $zone > /dev/null 33 $KEYGEN -r $RANDFILE -qfk $zone > /dev/null 34 $SIGNER -S -r $RANDFILE -o $zone -f $zonefile $infile > /dev/null 2>&1
|
/bind-9.11.3/bin/tests/system/rsabigexponent/ |
H A D | prereq.sh | 14 if $BIGKEY > /dev/null 2>&1
|
/bind-9.11.3/unit/atf-src/atf-sh/ |
H A D | atf_check_test.sh | 40 grep 'Executing command.*true' stdout >/dev/null || \ 45 grep 'Executing command.*false' stdout >/dev/null || \ 62 grep 'Executing command.*echo bar' stdout >/dev/null || \ 64 grep 'stdout does not match golden output' stderr >/dev/null || \ 66 grep 'stderr' stderr >/dev/null && \ 68 grep '^-foo' stderr >/dev/null || \ 70 grep '^+bar' stderr >/dev/null || \ 87 grep 'Executing command.*echo bar' stdout >/dev/null || \ 89 grep 'stdout' stderr >/dev/null && \ 91 grep 'stderr does not match golden output' stderr >/dev/null || \ [all...] |
/bind-9.11.3/bin/tests/system/ednscompliance/ |
H A D | tests.sh | 20 grep "EDNS: version: 100," dig.out$n > /dev/null || { ret=1; reason="version"; } 28 grep "; OPT=100" dig.out$n > /dev/null || { ret=1; reason="option"; } 36 grep "MBZ: 0x0080," dig.out$n > /dev/null || { ret=1; reason="flags"; } 44 grep "status: BADVERS," dig.out$n > /dev/null || { ret=1; reason="status"; } 45 grep "EDNS: version: 0," dig.out$n > /dev/null || { ret=1; reason="version"; } 46 grep "IN.SOA." dig.out$n > /dev/null && { ret=1; reaons="soa"; } 54 grep "status: NOERROR," dig.out$n > /dev/null || { ret=1; reason="status"; } 55 grep "EDNS: version: 0," dig.out$n > /dev/null || { ret=1; reason="version"; } 56 grep "; OPT=100" dig.out$n > /dev/null && { ret=1; reason="option"; } 57 grep "IN.SOA." dig.out$n > /dev/null || { re [all...] |
/bind-9.11.3/bin/tests/system/checkds/ |
H A D | tests.sh | 28 grep 'SHA-1' checkds.out.$n > /dev/null 2>&1 || ret=1 29 grep 'SHA-256' checkds.out.$n > /dev/null 2>&1 || ret=1 37 grep 'SHA-1' checkds.out.$n > /dev/null 2>&1 || ret=1 38 grep 'SHA-256' checkds.out.$n > /dev/null 2>&1 || ret=1 46 grep 'SHA-1' checkds.out.$n > /dev/null 2>&1 || ret=1 47 grep 'SHA-256' checkds.out.$n > /dev/null 2>&1 || ret=1 55 grep 'SHA-1' checkds.out.$n > /dev/null 2>&1 || ret=1 56 grep 'SHA-256' checkds.out.$n > /dev/null 2>&1 || ret=1 64 grep 'SHA-1' checkds.out.$n > /dev/null 2>&1 || ret=1 65 grep 'SHA-256' checkds.out.$n > /dev/null [all...] |
/bind-9.11.3/bin/tests/system/dlz/ |
H A D | tests.sh | 27 grep "status: NOERROR" dig.out.ns1.test$n > /dev/null || ret=1 28 grep "example.com..*DNAME.*example.net." dig.out.ns1.test$n > /dev/null || ret=1 29 grep "foo.example.com..*CNAME.*foo.example.net." dig.out.ns1.test$n > /dev/null || ret=1 30 grep "flags:[^;]* aa[ ;]" dig.out.ns1.test$n > /dev/null || ret=1 38 grep "example.com..*IN.IXFR" dig.out.ns1.test$n > /dev/null || ret=1 39 grep "example.com..*10.IN.DNAME.example.net." dig.out.ns1.test$n > /dev/null || ret=1 40 grep "example.com..*10.IN.NS.example.com." dig.out.ns1.test$n > /dev/null || ret=1 48 grep "example.com..*IN.IXFR" dig.out.ns1.test$n > /dev/null || ret=1 49 grep "example.com..*10.IN.DNAME.example.net." dig.out.ns1.test$n > /dev/null && ret=1 50 grep "example.com..*10.IN.NS.example.com." dig.out.ns1.test$n > /dev/null [all...] |
/bind-9.11.3/bin/tests/system/integrity/ |
H A D | tests.sh | 18 grep "status: SERVFAIL," dig.out.test$n > /dev/null || ret=1 19 grep "zone mx-cname-fail/IN: mx-cname-fail/MX 'cname.mx-cname-fail' is a CNAME (illegal)" ns1/named.run > /dev/null || ret=1 27 grep "status: NOERROR," dig.out.test$n > /dev/null || ret=1 28 grep "zone mx-cname-warn/IN: mx-cname-warn/MX 'cname.mx-cname-warn' is a CNAME (illegal)" ns1/named.run > /dev/null || ret=1 36 grep "status: NOERROR," dig.out.test$n > /dev/null || ret=1 37 grep "zone mx-cname-ignore/IN: mx-cname-ignore/MX 'cname.mx-cname-ignore' is a CNAME (illegal)" ns1/named.run > /dev/null && ret=1 45 grep "status: NOERROR," dig.out.test$n > /dev/null || ret=1 46 grep "zone no-mx-cname-fail/IN: no-mx-cname-fail/MX 'cname.no-mx-cname-fail' is a CNAME (illegal)" ns1/named.run > /dev/null && ret=1 54 grep "status: NOERROR," dig.out.test$n > /dev/null || ret=1 55 grep "zone no-mx-cname-warn/IN: no-mx-cname-warn/MX 'cname.no-mx-cname-warn' is a CNAME (illegal)" ns1/named.run > /dev/null [all...] |
/bind-9.11.3/bin/tests/system/runtime/ |
H A D | tests.sh | 17 grep "unable to listen on any configured interface" ns2/named.run > /dev/null && ret=1 18 grep "another named process" ns2/named.run > /dev/null && ret=1 29 grep "unable to listen on any configured interface" ns2/named2.run > /dev/null && break 32 grep "unable to listen on any configured interface" ns2/named2.run > /dev/null || ret=1 35 grep "exiting (due to fatal error)" ns2/named2.run > /dev/null && break 38 pid=`cat ns2/named2.pid 2>/dev/null` 39 test "${pid:+set}" = set && $KILL -15 ${pid} >/dev/null 2>&1 49 grep "another named process" ns2/named3.run > /dev/null || ret=1 50 pid=`cat ns2/named3.pid 2>/dev/null` 51 test "${pid:+set}" = set && $KILL -15 ${pid} >/dev/null [all...] |