Searched refs:nxdomain (Results 1 - 15 of 15) sorted by relevance
/bind-9.11.3/bin/tests/system/rpz/ |
H A D | tests.sh | 233 nxdomain () { function 239 ckresult "$*" proto.nxdomain 306 digcmd nonexistent @$ns2 >proto.nxdomain 314 nxdomain a0-1.tld2 # 2 318 nxdomain a4-2.tld2 # 6 rewrite based on CNAME target 319 nxdomain a4-2-cname.tld2 # 7 336 nxdomain c1.crash2.tld3 # 24 assert in rbtdb.c 337 nxdomain a0-1.tld2 +dnssec # 25 simple DO=1 without signatures 338 nxdomain a0-1.tld2s +nodnssec # 26 simple DO=0 with signatures 340 nxdomain a [all...] |
H A D | setup.sh | 21 # bl-{given,disabled,passthru,no-data,nxdomain,cname,wildcard,garden, 24 for NM in '' -2 -given -disabled -passthru -no-op -nodata -nxdomain -cname -wildcname -garden -drop -tcp-only; do
|
/bind-9.11.3/bin/tests/system/nsupdate/ |
H A D | update_test.pl | 110 test("NOERROR", ["pre", nxdomain("a.$zone")]); 126 test("YXDOMAIN", ["pre", nxdomain("a.$zone")]); 186 test("NOERROR", ["pre", nxdomain("a.$zone")]); 197 test("NOERROR", ["pre", nxdomain("a.$zone")]); 312 test("NOERROR", ["pre", nxdomain("w.$zone")]);
|
H A D | tests.sh | 842 $SAMPLEUPDATE -P 5300 -a 10.53.0.1 -a 10.53.0.2 -p "nxdomain exists.sample" \ 843 add "nxdomain-exists.sample 0 in a 1.2.3.4" > update.out.test$n 2>&1 844 $SAMPLEUPDATE -P 5300 -a 10.53.0.2 -p "nxdomain exists.sample" \ 845 add "check-nxdomain-exists.sample 0 in a 1.2.3.4" > update.out.check$n 2>&1 846 $DIG +tcp @10.53.0.1 -p 5300 a nxdomain-exists.sample > dig.out.ns1.test$n 847 $DIG +tcp @10.53.0.2 -p 5300 a nxdomain-exists.sample > dig.out.ns2.test$n 848 $DIG +tcp @10.53.0.2 -p 5300 a check-nxdomain-exists.sample > check.out.ns2.test$n 859 $SAMPLEUPDATE -P 5300 -a 10.53.0.1 -a 10.53.0.2 -p "yxdomain nxdomain.sample" \ 860 add "yxdomain-nxdomain.sample 0 in a 1.2.3.4" > update.out.test$n 2>&1 861 $SAMPLEUPDATE -P 5300 -a 10.53.0.2 -p "yxdomain nxdomain [all...] |
/bind-9.11.3/bin/tests/system/redirect/ns4/ |
H A D | named.conf | 29 nxdomain-redirect "redirect";
|
/bind-9.11.3/bin/tests/system/resolver/ans2/ |
H A D | ans.pl | 88 } elsif ($qname =~ /^nxdomain\.example\.net$/i) {
|
/bind-9.11.3/bin/tests/system/statistics/ans4/ |
H A D | ans.pl | 92 } elsif ($qname =~ /^nxdomain\.example\.net$/i) {
|
/bind-9.11.3/bin/tests/system/rpz/ns3/ |
H A D | named.conf | 37 zone "bl-nxdomain" policy nxdomain; 75 zone "bl-nxdomain." {type master; file "bl-nxdomain.db";
|
/bind-9.11.3/lib/samples/ |
H A D | nsprobe.c | 62 nxdomain, enumerator in enum:__anon325 110 unsigned long nxdomain; member in struct:lcl_stat 333 case nxdomain: 334 stattype = "nxdomain"; 335 increment_entry(&server_stat.nxdomain); 336 increment_entry(&local_stat.nxdomain); 395 if (local_stat.nxdomain > 0U) { 397 printf("%s:nxdomain\n", trans->domain); 398 increment_entry(&domain_stat.nxdomain); 524 *resultp = nxdomain; [all...] |
/bind-9.11.3/bin/tests/system/zonechecks/ |
H A D | tests.sh | 58 if $CHECKZONE . nxdomain.db > nxdomain.out
|
/bind-9.11.3/bin/tests/system/dlzexternal/ |
H A D | tests.sh | 74 prereq nxdomain testdc3.example.nil
|
/bind-9.11.3/bin/tests/system/resolver/ |
H A D | tests.sh | 18 $DIG +tcp nxdomain.example.net @10.53.0.1 a -p 5300 > dig.out.ns1.test${n} || ret=1 27 ${RESOLVE} -p 5300 -t a -s 10.53.0.1 nxdomain.example.net 2> resolve.out.ns1.test${n} || ret=1 28 grep "resolution failed: ncache nxdomain" resolve.out.ns1.test${n} > /dev/null || ret=1
|
/bind-9.11.3/bin/tests/system/autosign/ |
H A D | tests.sh | 780 echo "I:checking privately secure to nxdomain works ($n)" 782 $DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.2 \ 784 $DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.4 \
|
/bind-9.11.3/bin/named/ |
H A D | statschannel.c | 246 SET_NSSTATDESC(nxdomain, "queries resulted in NXDOMAIN", "QryNXDOMAIN"); 315 SET_RESSTATDESC(nxdomain, "NXDOMAIN received", "NXDOMAIN");
|
/bind-9.11.3/bin/tests/system/dnssec/ |
H A D | tests.sh | 296 grep "resolution failed: ncache nxdomain" delv.out$n > /dev/null || ret=1 319 grep "resolution failed: ncache nxdomain" delv.out$n > /dev/null || ret=1 343 grep "resolution failed: ncache nxdomain" delv.out$n > /dev/null || ret=1 570 grep "resolution failed: ncache nxdomain" delv.out$n > /dev/null || ret=1 594 grep "resolution failed: ncache nxdomain" delv.out$n > /dev/null || ret=1 618 grep "resolution failed: ncache nxdomain" delv.out$n > /dev/null || ret=1 1188 echo "I:checking privately secure to nxdomain works ($n)" 1190 $DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.2 \ 1192 $DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.4 \ 1201 echo "I:checking privately secure wildcard to nxdomain work [all...] |
Completed in 61 milliseconds