/netbsd-current/external/mpl/bind/dist/bin/tests/system/rpz/ |
H A D | tests.sh | 370 nxdomain() { function 376 ckresult "$*" proto.nxdomain 467 digcmd nonexistent @$ns2 >proto.nxdomain || return 1 468 grep "status: NXDOMAIN" proto.nxdomain >/dev/null || return 1 530 nxdomain a0-1.tld2 # 2 534 nxdomain a4-2.tld2 # 6 rewrite based on CNAME target 535 nxdomain a4-2-cname.tld2 # 7 552 nxdomain c1.crash2.tld3 # 24 assert in rbtdb.c 553 nxdomain a0-1.tld2 +dnssec # 25 simple DO=1 without signatures 554 nxdomain a [all...] |
H A D | setup.sh | 75 # bl-{given,disabled,passthru,no-data,nxdomain,cname,wildcard,garden, 78 for NM in '' -2 -given -disabled -passthru -no-op -nodata -nxdomain -cname -wildcname -garden -drop -tcp-only; do
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/synthfromdnssec/ |
H A D | clean.sh | 41 rm -f ./nxdomain.out ./insecure.nxdomain.out 47 rm -f ./minimal.nxdomain.out
|
H A D | tests.sh | 130 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n nxdomain.out 210 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n insecure.nxdomain.out 286 dig_with_opts nxdomain.minimal. @10.53.0.${ns} a >dig.out.ns${ns}.test$n || ret=1 291 [ $ns -eq 2 ] && cp dig.out.ns${ns}.test$n minimal.nxdomain.out 368 digcomp nxdomain.out dig.out.ns${ns}.test$n || ret=1 496 digcomp insecure.nxdomain.out dig.out.ns${ns}.test$n || ret=1 590 digcomp minimal.nxdomain.out dig.out.ns${ns}.test$n || ret=1
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/nsupdate/ |
H A D | update_test.pl | 114 test("NOERROR", ["pre", nxdomain("a.$zone")]); 130 test("YXDOMAIN", ["pre", nxdomain("a.$zone")]); 190 test("NOERROR", ["pre", nxdomain("a.$zone")]); 201 test("NOERROR", ["pre", nxdomain("a.$zone")]); 316 test("NOERROR", ["pre", nxdomain("w.$zone")]);
|
/netbsd-current/external/bsd/unbound/dist/contrib/ |
H A D | libunbound.so.conf | 6 typedef ub_nxdomain = enum(name_exists, nxdomain);
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/statistics/ans4/ |
H A D | ans.pl | 98 } elsif ($qname =~ /^nxdomain\.example\.net$/i) {
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/zonechecks/ |
H A D | tests.sh | 67 if $CHECKZONE . nxdomain.db >nxdomain.out; then
|
/netbsd-current/external/bsd/unbound/dist/testcode/ |
H A D | asynclook.c | 130 info->result->nxdomain) 132 info->result->nxdomain?"(no such host)": 230 if(result->nxdomain != 0) { 231 printf("%s: error result->nxdomain is set.\n", desc);
|
/netbsd-current/external/bsd/unbound/dist/libunbound/ |
H A D | unbound.h | 164 * If false, there was no data (nxdomain may be true, rcode can be set). 173 int nxdomain; member in struct:ub_result
|
H A D | libworker.c | 539 /* rcode, havedata, nxdomain, secure, bogus */ 544 res->nxdomain = 1;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/resolver/ans3/ |
H A D | ans.pl | 77 } elsif ($qname eq "nxdomain.example.net") { 107 } elsif ($qname =~ /^nxdomain\.example\.net$/i) {
|
/netbsd-current/external/bsd/nsd/dist/doc/ |
H A D | differences.tex | 122 b-classany-nxdomain (\ref{b-classany-nxdomain}) & 5 & 0.00\% \\ 313 \subsubsection{b-classany-nxdomain - BIND gives an auth answer for class ANY nxdomain} 314 \label{b-classany-nxdomain} 317 BIND and NSD reply with AA bit cleared. For not existing domains (nxdomain) 319 SOA (CLASS=IN) for the zone, as for an authoritative nxdomain. 379 nxdomain queries.
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/serve-stale/ |
H A D | tests.sh | 69 echo_i "prime cache nxdomain.example TXT ($n)" 71 $DIG -p ${PORT} @10.53.0.1 nxdomain.example TXT >dig.out.test$n 131 $DIG -p ${PORT} @10.53.0.1 nxdomain.example TXT >dig.out.test$((n + 5)) & 176 echo_i "check stale nxdomain.example TXT ($n)" 339 $DIG -p ${PORT} @10.53.0.1 nxdomain.example TXT >dig.out.test$((n + 4)) & 368 echo_i "check stale nxdomain.example TXT (serve-stale off) ($n)" 397 $DIG -p ${PORT} @10.53.0.1 nxdomain.example TXT >dig.out.test$((n + 4)) & 432 echo_i "check stale nxdomain.example TXT (serve-stale on) ($n)" 465 $DIG -p ${PORT} @10.53.0.1 nxdomain.example TXT >dig.out.test$((n + 4)) & 500 echo_i "check stale nxdomain [all...] |
/netbsd-current/external/bsd/unbound/dist/smallapp/ |
H A D | unbound-host.c | 378 ret = result->nxdomain;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/dlzexternal/ |
H A D | tests.sh | 81 prereq nxdomain testdc3.example.nil
|
/netbsd-current/external/ibm-public/postfix/dist/src/dns/ |
H A D | Makefile.in | 151 $(SHLIB_ENV) $(VALGRIND) ./test_dns_lookup mx,a nxdomain.porcupine.org; \
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/resolver/ |
H A D | tests.sh | 37 dig_with_opts +tcp nxdomain.example.net @10.53.0.1 a >dig.out.ns1.test${n} || ret=1 46 resolve_with_opts -t a -s 10.53.0.1 nxdomain.example.net 2>resolve.out.ns1.test${n} || ret=1 47 grep "resolution failed: ncache nxdomain" resolve.out.ns1.test${n} >/dev/null || ret=1
|
/netbsd-current/external/mpl/bind/dist/bin/named/ |
H A D | statschannel.c | 291 SET_NSSTATDESC(nxdomain, "queries resulted in NXDOMAIN", "QryNXDOMAIN"); 383 SET_RESSTATDESC(nxdomain, "NXDOMAIN received", "NXDOMAIN");
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/autosign/ |
H A D | tests.sh | 934 echo_i "checking privately secure to nxdomain works ($n)" 936 $DIG $DIGOPTS +noauth private2secure-nxdomain.private.secure.example. SOA @10.53.0.4 >dig.out.ns4.test$n || ret=1
|