Searched refs:null (Results 1 - 25 of 96) sorted by relevance

1234

/bind-9.6-ESV-R11/bin/tests/system/ixfr/
H A Dprereq.sh20 if $PERL -e 'use Net::DNS;' 2>/dev/null
/bind-9.6-ESV-R11/bin/tests/system/resolver/
H A Dprereq.sh20 if $PERL -e 'use Net::DNS;' 2>/dev/null
H A Dtests.sh29 grep "status: NXDOMAIN" dig.out > /dev/null || ret=1
36 grep "status: NOERROR" dig.out > /dev/null || ret=1
42 $DIG +tcp www.example.com. a @10.53.0.1 -p 5300 >/dev/null || status=1
45 $DIG +tcp cname1.example.com. a @10.53.0.1 -p 5300 >/dev/null || status=1
48 $DIG +tcp cname2.example.com. a @10.53.0.1 -p 5300 >/dev/null || status=1
51 $DIG +tcp www.example.com. a @10.53.0.1 -p 5300 >/dev/null || status=1
58 grep 'flags: qr rd;' dig.ns4.out.${n} > /dev/null || ret=1
67 grep "status: NOERROR" dig.ns5.out.${n} > /dev/null || ret=1
76 grep "status: NOERROR" dig.ns5.out.${n} > /dev/null || ret=1
85 grep "status: NXDOMAIN" dig.ns5.out.${n} > /dev/null || re
[all...]
/bind-9.6-ESV-R11/bin/tests/system/upforwd/
H A Dprereq.sh19 if $PERL -e 'use Net::DNS;' 2>/dev/null
/bind-9.6-ESV-R11/bin/tests/system/xfer/
H A Dprereq.sh19 if $PERL -e 'use Net::DNS;' 2>/dev/null
21 if $PERL -e 'use Net::DNS; die if $Net::DNS::VERSION == 0.73;' 2>/dev/null
/bind-9.6-ESV-R11/bin/tests/system/spf/
H A Dtests.sh26 grep "zone spf/IN: loaded serial 0" ns1/named.run > /dev/null || ret=1
27 grep "'x.spf' found SPF/TXT" ns1/named.run > /dev/null || ret=1
28 grep "'y.spf' found SPF/SPF" ns1/named.run > /dev/null || ret=1
29 grep "'spf' found SPF/" ns1/named.run > /dev/null && ret=1
31 grep "zone warn/IN: loaded serial 0" ns1/named.run > /dev/null || ret=1
32 grep "'x.warn' found SPF/TXT" ns1/named.run > /dev/null || ret=1
33 grep "'y.warn' found SPF/SPF" ns1/named.run > /dev/null || ret=1
34 grep "'warn' found SPF/" ns1/named.run > /dev/null && ret=1
36 grep "zone nowarn/IN: loaded serial 0" ns1/named.run > /dev/null || ret=1
37 grep "'x.nowarn' found SPF/" ns1/named.run > /dev/null
[all...]
/bind-9.6-ESV-R11/bin/tests/system/builtin/
H A Dtests.sh24 grep "automatic empty zone" ns1/named.run > /dev/null || ret=1
25 grep "received control channel command 'reconfig'" ns1/named.run > /dev/null || ret=1
26 grep "reloading configuration succeeded" ns1/named.run > /dev/null || ret=1
28 grep "zone serial (0) unchanged." ns1/named.run > /dev/null && ret=1
33 $RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 reload > /dev/null
35 grep "automatic empty zone" ns1/named.run > /dev/null || ret=1
36 grep "received control channel command 'reload'" ns1/named.run > /dev/null || ret=1
37 grep "reloading configuration succeeded" ns1/named.run > /dev/null || ret=1
39 grep "zone serial (0) unchanged." ns1/named.run > /dev/null && ret=1
/bind-9.6-ESV-R11/lib/dns/rdata/generic/
H A Dnull_10.c90 dns_rdata_null_t *null = source; local
94 REQUIRE(null->common.rdtype == type);
95 REQUIRE(null->common.rdclass == rdclass);
96 REQUIRE(null->data != NULL || null->length == 0);
101 return (mem_tobuffer(target, null->data, null->length));
106 dns_rdata_null_t *null = target; local
112 null->common.rdclass = rdata->rdclass;
113 null
128 dns_rdata_null_t *null = source; local
[all...]
/bind-9.6-ESV-R11/bin/tests/system/zonechecks/
H A Dtests.sh28 if grep "is a CNAME" cname.out > /dev/null
42 if grep "is below a DNAME" dname.out > /dev/null
56 if grep "has no address records" noaddress.out > /dev/null
70 if grep "has no address records" noaddress.out > /dev/null
86 if grep "appears to be an address" a.out > /dev/null
98 if grep "appears to be an address" a.out > /dev/null
112 if grep "appears to be an address" a.out > /dev/null
128 if grep "appears to be an address" aaaa.out > /dev/null
140 if grep "appears to be an address" aaaa.out > /dev/null
154 if grep "appears to be an address" aaaa.out > /dev/null
[all...]
/bind-9.6-ESV-R11/unit/atf-src/atf-sh/
H A Datf_check_test.sh44 grep 'Executing command.*true' stdout >/dev/null || \
49 grep 'Executing command.*false' stdout >/dev/null || \
66 grep 'Executing command.*echo bar' stdout >/dev/null || \
68 grep 'stdout does not match golden output' stderr >/dev/null || \
70 grep 'stderr' stderr >/dev/null && \
72 grep '^-foo' stderr >/dev/null || \
74 grep '^+bar' stderr >/dev/null || \
91 grep 'Executing command.*echo bar' stdout >/dev/null || \
93 grep 'stdout' stderr >/dev/null && \
95 grep 'stderr does not match golden output' stderr >/dev/null || \
[all...]
/bind-9.6-ESV-R11/bin/tests/system/logfileconfig/
H A Dtests.sh45 grep "reloading configuration failed" named.run > /dev/null 2>&1
59 mkdir -p $DIRFILE >/dev/null 2>&1
65 grep "checking logging configuration failed: invalid file" named.run > /dev/null 2>&1
82 mkfifo $PIPEFILE >/dev/null 2>&1
88 grep "checking logging configuration failed: invalid file" named.run > /dev/null 2>&1
107 ln -s $PLAINFILE $SYMFILE >/dev/null 2>&1
113 grep "reloading configuration failed" named.run > /dev/null 2>&1
131 $myNAMED > /dev/null 2>&1
148 grep "reloading configuration failed" named.run > /dev/null 2>&1
162 mkdir -p $DIRFILE >/dev/null
[all...]
/bind-9.6-ESV-R11/bin/tests/system/dlz/
H A Dtests.sh35 grep "status: NOERROR" dig.out.ns1.test$n > /dev/null || ret=1
36 grep "example.com..*DNAME.*example.net." dig.out.ns1.test$n > /dev/null || ret=1
37 grep "foo.example.com..*CNAME.*foo.example.net." dig.out.ns1.test$n > /dev/null || ret=1
38 grep "flags:[^;]* aa[ ;]" dig.out.ns1.test$n > /dev/null || ret=1
46 grep "example.com..*IN.IXFR" dig.out.ns1.test$n > /dev/null || ret=1
47 grep "example.com..*10.IN.DNAME.example.net." dig.out.ns1.test$n > /dev/null || ret=1
48 grep "example.com..*10.IN.NS.example.com." dig.out.ns1.test$n > /dev/null || ret=1
56 grep "example.com..*IN.IXFR" dig.out.ns1.test$n > /dev/null || ret=1
57 grep "example.com..*10.IN.DNAME.example.net." dig.out.ns1.test$n > /dev/null && ret=1
58 grep "example.com..*10.IN.NS.example.com." dig.out.ns1.test$n > /dev/null
[all...]
/bind-9.6-ESV-R11/bin/tests/system/checkconf/
H A Dtests.sh25 $CHECKCONF good.conf > /dev/null 2>&1 || ret=1
31 $CHECKCONF bad.conf > /dev/null 2>&1 || ret=0
37 $CHECKCONF badtsig.conf > /dev/null 2>&1
43 $CHECKCONF -z hint-nofile.conf > /dev/null 2>&1 && ret=1
55 $CHECKCONF badzero.conf > /dev/null 2>&1
62 $CHECKCONF badzero.conf > /dev/null 2>&1
71 $CHECKCONF badzero.conf > /dev/null 2>&1
80 $CHECKCONF badzero.conf > /dev/null 2>&1
/bind-9.6-ESV-R11/bin/tests/system/dnssec/
H A Dprereq.sh22 if $KEYGEN -a RSAMD5 -b 512 -n zone -r random.data foo > /dev/null 2>&1
/bind-9.6-ESV-R11/bin/tests/system/pending/
H A Dprereq.sh20 if $KEYGEN -a RSAMD5 -b 512 -n zone -r random.data foo > /dev/null 2>&1
/bind-9.6-ESV-R11/bin/tests/system/rndc/
H A Dtests.sh28 $RNDCCMD status > /dev/null || ret=1
34 $RNDC -s 10.53.0.2 -p 9953 -c ns2/secondkey.conf status > /dev/null || ret=1
40 $RNDC -s 10.53.0.3 -p 9953 -c ../common/rndc.conf dumpdb > /dev/null || ret=1
44 grep "Dump complete" ns3/named_dump.db > /dev/null || tmp=1
/bind-9.6-ESV-R11/bin/tests/system/tkey/
H A Dprereq.sh22 if $KEYGEN -a RSAMD5 -b 512 -n zone -r random.data foo > /dev/null 2>&1
/bind-9.6-ESV-R11/bin/tests/system/emptyzones/
H A Dtests.sh26 $RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 reload > /dev/null || ret=1
29 $RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 reload > /dev/null || ret=1
31 $DIG +vc version.bind txt ch @10.53.0.1 -p 5300 > /dev/null || ret=1
/bind-9.6-ESV-R11/bin/tests/system/additional/
H A Dtests.sh63 grep "L64" dig.out.$n > /dev/null || ret=1
64 grep "L32" dig.out.$n > /dev/null || ret=1
66 grep "L64" dig.out.$n > /dev/null && ret=1
67 grep "L32" dig.out.$n > /dev/null && ret=1
79 grep "L64" dig.out.$n > /dev/null && ret=1
80 grep "L32" dig.out.$n > /dev/null && ret=1
82 grep "L64" dig.out.$n > /dev/null && ret=1
83 grep "L32" dig.out.$n > /dev/null && ret=1
95 grep "LP" dig.out.$n > /dev/null && ret=1
96 grep "L64" dig.out.$n > /dev/null
[all...]
/bind-9.6-ESV-R11/bin/tests/system/wildcard/
H A Dtests.sh33 grep -i 'a\.wild\.nsec\..*NSEC.*nsec\..*NSEC' dig.out.ns1.test$n > /dev/null || ret=1
41 grep -i 'a\.wild\.nsec\..*NSEC.*nsec\..*NSEC' dig.out.ns2.test$n > /dev/null || ret=1
42 grep -i 'flags:.* ad[ ;]' dig.out.ns2.test$n > /dev/null && ret=1
50 grep -i 'a\.wild\.nsec\..*NSEC.*nsec\..*NSEC' dig.out.ns3.test$n > /dev/null || ret=1
51 grep -i 'flags:.* ad[ ;]' dig.out.ns3.test$n > /dev/null || ret=1
59 grep -i 'a\.wild\.nsec\..*NSEC.*nsec\..*NSEC' dig.out.ns5.test$n > /dev/null || ret=1
60 grep -i 'flags:.* ad[ ;]' dig.out.ns5.test$n > /dev/null && ret=1
68 grep -i 'a\.wild\.nsec\..*NSEC.*nsec\..*NSEC' dig.out.ns4.test$n > /dev/null || ret=1
69 grep -i 'flags:.* ad[ ;]' dig.out.ns4.test$n > /dev/null || ret=1
77 grep -i 'a\.wild\.private\.nsec\..*NSEC.*private\.nsec\..*NSEC' dig.out.ns3.test$n > /dev/null || re
[all...]
/bind-9.6-ESV-R11/bin/tests/system/acl/
H A Dtests.sh32 grep "^;" dig.out > /dev/null 2>&1 || { echo "I:test $t failed" ; status=1; }
38 grep "^;" dig.out > /dev/null 2>&1 && { echo "I:test $t failed" ; status=1; }
48 grep "^;" dig.out > /dev/null 2>&1 || { echo "I:test $t failed" ; status=1; }
54 grep "^;" dig.out > /dev/null 2>&1 || { echo "I:test $t failed" ; status=1; }
59 grep "^;" dig.out > /dev/null 2>&1 && { echo "I:test $t failed" ; status=1; }
71 grep "^;" dig.out > /dev/null 2>&1 && { echo "I:test $t failed" ; status=1; }
77 grep "^;" dig.out > /dev/null 2>&1 && { echo "I:test $t failed" ; status=1; }
83 grep "^;" dig.out > /dev/null 2>&1 && { echo "I:test $t failed" ; status=1; }
89 grep "^;" dig.out > /dev/null 2>&1 && { echo "I:test $t failed" ; status=1; }
95 grep "^;" dig.out > /dev/null
[all...]
/bind-9.6-ESV-R11/bin/tests/system/wildcard/ns1/
H A Dsign.sh31 keyname1=`$KEYGEN -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
32 keyname2=`$KEYGEN -f KSK -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
36 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
45 keyname1=`$KEYGEN -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
46 keyname2=`$KEYGEN -f KSK -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
50 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
58 keyname1=`$KEYGEN -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
59 keyname2=`$KEYGEN -f KSK -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
63 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
82 keyname1=`$KEYGEN -r $RANDFILE -a NSEC3RSASHA1 -b 1024 -n zone $zone 2> /dev/null`
[all...]
/bind-9.6-ESV-R11/bin/tests/system/dlv/ns3/
H A Dsign.sh37 keyname1=`$KEYGEN -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
38 keyname2=`$KEYGEN -f KSK -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
42 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
52 keyname1=`$KEYGEN -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
53 keyname2=`$KEYGEN -f KSK -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
57 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
67 keyname1=`$KEYGEN -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
68 keyname2=`$KEYGEN -f KSK -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
72 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
82 keyname1=`$KEYGEN -r $RANDFILE -a DSA -b 768 -n zone $zone 2> /dev/null`
[all...]
/bind-9.6-ESV-R11/bin/tests/system/checkzone/
H A Dtests.sh47 grep "'x.example' found SPF/TXT" test.out1.$n > /dev/null || ret=1
48 grep "'y.example' found SPF/SPF" test.out1.$n > /dev/null || ret=1
49 grep "'example' found SPF/" test.out1.$n > /dev/null && ret=1
50 grep "'x.example' found SPF/" test.out2.$n > /dev/null && ret=1
51 grep "'y.example' found SPF/" test.out2.$n > /dev/null && ret=1
52 grep "'example' found SPF/" test.out2.$n > /dev/null && ret=1
/bind-9.6-ESV-R11/bin/tests/system/dname/
H A Dtests.sh27 grep "status: NOERROR" dig.out.ns2.short > /dev/null || ret=1
34 grep "status: NOERROR" dig.out.ns4.short > /dev/null || ret=1
41 grep "status: NOERROR" dig.out.ns2.long > /dev/null || ret=1
48 grep "status: NOERROR" dig.out.ns4.long > /dev/null || ret=1
55 grep "status: YXDOMAIN" dig.out.ns2.toolong > /dev/null || ret=1
62 grep "status: YXDOMAIN" dig.out.ns4.toolong > /dev/null || ret=1

Completed in 1945 milliseconds

1234