unbound/testdata
Wouter Wijngaards 038550c889 - Fix #1234: shortening DNAME loop produces duplicate DNAME records
in ANSWER section.


git-svn-id: file:///svn/unbound/trunk@4047 be551aaa-1e26-0410-a405-d3ace91eadb9
2017-03-10 13:04:24 +00:00
..
00-lint.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
01-doc.tpkg Fixup for dnstap. 2014-08-18 14:42:26 +00:00
02-unittest.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
03-testbound.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
04-checkconf.tpkg - Fix #1155: test status code of unbound-control in 04-checkconf, not the status 2016-11-10 11:20:27 +00:00
05-asynclook.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
06-ianaports.tpkg - iana portlist test updated so it does not touch the source 2014-01-28 10:12:13 +00:00
07-confroot.tpkg testset port to vista/mingw. 2008-11-24 15:05:33 +00:00
08-host-lib.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
09-unbound-control.tpkg - Added local-zones and local-data bulk addition and removal functionality in 2016-11-30 11:22:29 +00:00
10-unbound-anchor.tpkg fixup script tests 2017-03-09 13:23:06 +00:00
acl.rpl access-control 2007-11-19 15:32:55 +00:00
autotrust_10key.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_2exceed.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_early.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_nosign.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_nosignnew.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_once.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_twice.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_fail.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_failsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_legacy.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_sigs.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_zsk.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_missing_all.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_missing_returns.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_missing.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_probefail.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_probefailsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revoked_use.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revoked_with_invalid.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revtp_read.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revtp_use.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revtp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_rollalgo_unknown.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_rollalgo.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_rollover.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_valid_use.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_data.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_dnskey.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_ds_entry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_ent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_key_entry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_prime_entry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_prime.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
common.sh - updated fwd_zero for newer nc. Updated common.sh for newer netstat. 2013-01-28 13:30:46 +00:00
ctrl_itr.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
ctrl_pipe.tpkg Fixup control socket test for OSX. 2015-01-23 16:00:33 +00:00
dlv_anchor.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_ask_higher.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_below_ta.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_delegation.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_ds_lookup.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_insecure_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_insecure.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_keyretry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_negnx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_optout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove_empty.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove_nodel.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove_pos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_unused.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dns64_lookup.rpl - Fix segfault in the dns64 module in the formaterror error path. 2015-10-15 09:02:01 +00:00
domain_insec_dlv.rpl - separate ldns into core ldns inside ldns/ subdirectory. No more 2013-10-31 15:09:26 +00:00
domain_insec_ds.rpl Add DSA support for OpenSSL 1.1 2016-12-07 12:58:47 +00:00
edns_cache.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
edns_lame.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fetch_glue_cname.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
fetch_glue.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
fwd_ancil.tpkg Fix test to cleanup executable and wait for error printout 2016-01-27 07:55:18 +00:00
fwd_any.rpl - Unit test for type ANY synthesis. 2015-04-30 10:27:27 +00:00
fwd_bogus.tpkg fixup script tests 2017-03-09 13:23:06 +00:00
fwd_cached.rpl test fixup, 127.0.0.1 is blocked. 2007-07-18 08:24:44 +00:00
fwd_capsid_fallback.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_capsid_strip.tpkg Fixup unit test. 2015-01-30 09:57:32 +00:00
fwd_capsid_white.tpkg - caps-whitelist in unbound.conf allows whitelist of loadbalancers 2015-05-01 12:36:16 +00:00
fwd_capsid.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_compress_c00c.tpkg Fix fwd_compress_c00c for FreeBSD xxd. 2015-06-26 09:55:00 +00:00
fwd_droptoomany.rpl DoS protection. 2008-09-02 13:04:47 +00:00
fwd_edns_bksec.tpkg fixup script tests 2017-03-09 13:23:06 +00:00
fwd_edns_probe.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_error.rpl updated testset for recent changes 2009-01-15 13:49:42 +00:00
fwd_jostle_out.rpl DoS protection. 2008-09-02 13:04:47 +00:00
fwd_jostle.rpl DoS protection. 2008-09-02 13:04:47 +00:00
fwd_lrudrop.rpl send recursive queries to test cache drop off. 2007-08-27 11:26:03 +00:00
fwd_no_edns.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_notcached.rpl do not allow cache snooping by default. 2008-09-01 13:48:24 +00:00
fwd_oneport.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_tcp_tc6.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
fwd_tcp_tc.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_tcp.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_three_service.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_three.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_timeout.rpl updated testset for recent changes 2009-01-15 13:49:42 +00:00
fwd_ttlexpire.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_two.rpl DoS protection. 2008-09-02 13:04:47 +00:00
fwd_udp.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_udptmout.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_waitudp.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd_zero.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
fwd.rpl do not allow cache snooping by default. 2008-09-01 13:48:24 +00:00
fwddlv_parse.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
host_file.template testbed scripts. 2007-01-04 11:03:29 +00:00
hostsfileosx.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
iter_class_any.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_cname_cache.rpl testbound test for older fix added. 2009-02-05 14:31:16 +00:00
iter_cname_double.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_cname_nx.rpl - Return NXDOMAIN after chain of CNAMEs ends at name-not-found. 2010-08-05 14:31:52 +00:00
iter_cname_qnamecopy.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_cycle_noh.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_cycle.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_dname_insec.rpl - Fix #1234: shortening DNAME loop produces duplicate DNAME records 2017-03-10 13:04:24 +00:00
iter_dnsseclame_bug.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ds_ok.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ta_ok.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ta.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_domain_sale_nschange.rpl - SOA negative TTL is capped at minimumttl in its rdata section. 2015-05-29 14:51:36 +00:00
iter_domain_sale.rpl - SOA negative TTL is capped at minimumttl in its rdata section. 2015-05-29 14:51:36 +00:00
iter_donotq127.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_dp_turnsuseless.rpl - Fix resolution for domains like safesvc.com.cn. If the iterator 2010-05-19 12:59:27 +00:00
iter_ds_locate_ns_cname.rpl - new approach to NS fetches for DS lookup that works with 2012-03-21 15:01:01 +00:00
iter_ds_locate_ns_detach.rpl - Fix bug#452 and another assertion failure in mesh.c, makes 2012-07-20 13:08:19 +00:00
iter_ds_locate_ns_nosoa.rpl - new approach to NS fetches for DS lookup that works with 2012-03-21 15:01:01 +00:00
iter_ds_locate_ns.rpl - fix to locate nameservers for DS lookup with NS fetches. 2012-03-19 15:44:21 +00:00
iter_emptydp_for_glue.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_emptydp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_fwdfirst.rpl - forward-first option. Tries without forward if a query fails. 2012-03-01 13:16:40 +00:00
iter_fwdfirstequal.rpl - Fix#501: forward-first does not recurse, when forward name is ".". 2013-06-10 12:25:10 +00:00
iter_fwdstub.rpl Fixup stub below a forward, the stub is still honored and not trumped by the 2009-06-12 09:01:42 +00:00
iter_fwdstubroot.rpl Fixup for root prime requests sent when not needed. 2009-07-23 13:21:42 +00:00
iter_got6only.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_hint_lame.rpl - fix retry sequence if prime hints are recursion-lame. 2010-04-27 11:10:35 +00:00
iter_lame_aaaa.rpl parent-child misconfigured data lookup. 2010-05-28 14:15:29 +00:00
iter_lame_noaa.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_lame_nosoa.rpl infra cache consolidated and stores per zone, IP. 2011-10-26 15:46:23 +00:00
iter_lamescrub.rpl parent-child misconfigured data lookup. 2010-05-28 14:15:29 +00:00
iter_mod.rpl Test for module-config "iterator" 2009-12-01 08:12:12 +00:00
iter_ns_badip.rpl Fix problem with delegation where glue has expired. 2009-09-17 14:36:06 +00:00
iter_ns_spoof.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_pc_a.rpl more more testcases 2010-06-03 10:07:58 +00:00
iter_pc_aaaa.rpl more more testcases 2010-06-03 10:07:58 +00:00
iter_pcdiff.rpl Fix lookup of domains with parent-child zonecut data differences. 2009-12-08 13:37:59 +00:00
iter_pcdirect.rpl fixup lookup trouble for parent-child domains on the first query. 2010-01-20 13:11:54 +00:00
iter_pclame.rpl - Fix storage of negative parent glue if that last resort fails. 2010-06-01 09:33:25 +00:00
iter_pcname.rpl - parentside names are dispreferred but not said to be dnssec-lame. 2010-05-31 13:03:58 +00:00
iter_pcnamech.rpl - Fix storage of negative parent glue if that last resort fails. 2010-06-01 09:33:25 +00:00
iter_pcnamechrec.rpl - Fix storage of negative parent glue if that last resort fails. 2010-06-01 09:33:25 +00:00
iter_pcnamerec.rpl - fix parentside from cache to be marked dispreferred for bad names. 2010-05-31 14:39:45 +00:00
iter_pcttl.rpl Fix parent child disagreement handling and no-ipv6 present. 2010-01-08 12:47:27 +00:00
iter_prefetch_change2.rpl Fix prefetch and stickyness. 2012-02-16 11:04:53 +00:00
iter_prefetch_change.rpl - Fix bug #425: unbound reports wrong TTL in reply, it reports a TTL 2012-01-10 09:42:32 +00:00
iter_prefetch_childns.rpl Fix prefetch and stickyness. 2012-02-16 11:04:53 +00:00
iter_prefetch_fail.rpl - Fix #558: failed prefetch lookup does not remove cached response 2014-04-10 13:56:16 +00:00
iter_prefetch_ns.rpl Fix prefetch and stickyness. 2012-02-16 11:04:53 +00:00
iter_prefetch.rpl Fix prefetch and stickyness. 2012-02-16 11:04:53 +00:00
iter_primenoglue.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_privaddr.rpl - Fix crash in previous private address fixup of 22 March. 2013-04-09 07:38:24 +00:00
iter_ranoaa_lame.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_reclame_one.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_reclame_two.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_recurse.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_req_qname.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_resolve_minimised_nx.rpl - Use QTYPE=A for QNAME minimisation. 2016-06-13 13:06:35 +00:00
iter_resolve_minimised_refused.rpl - Use QTYPE=A for QNAME minimisation. 2016-06-13 13:06:35 +00:00
iter_resolve_minimised_timeout.rpl - QNAME minimisation unit test for dropped QTYPE=A queries. 2016-06-14 12:36:22 +00:00
iter_resolve_minimised.rpl - Use QTYPE=A for QNAME minimisation. 2016-06-13 13:06:35 +00:00
iter_resolve.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_scrub_cname_an.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_scrub_dname_insec.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
iter_scrub_dname_rev.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_scrub_dname_sec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_scrub_ns_fwd.rpl - Fix scrubber bug that potentially let NS records through. Reported 2010-02-24 13:27:47 +00:00
iter_scrub_ns_side.rpl - More strict scrubber (Thanks to George Barwood for the idea): 2010-04-26 13:40:37 +00:00
iter_scrub_ns.rpl - Fix scrubber bug that potentially let NS records through. Reported 2010-02-24 13:27:47 +00:00
iter_soamin.rpl - Fix TTL of SOA so negative TTL is separately cached from normal TTL. 2011-05-10 12:34:47 +00:00
iter_stub_noroot.rpl - bug#327: Fix for cannot access stub zones until the root is primed. 2010-09-13 09:25:52 +00:00
iter_stubfirst.rpl - forward-first option. Tries without forward if a query fails. 2012-03-01 13:16:40 +00:00
iter_stublastresort.rpl - Fix queries leaking up for stubs and forwards, if the configured 2013-04-11 10:08:34 +00:00
iter_timeout_ra_aaaa.rpl - Fix timeouts to keep track of query type, A, AAAA and other, if 2012-02-10 12:17:25 +00:00
Kexample.com.+003+02854.ds sign test tool. 2007-08-29 12:09:14 +00:00
Kexample.com.+003+02854.key sign test tool. 2007-08-29 12:09:14 +00:00
Kexample.com.+003+02854.private sign test tool. 2007-08-29 12:09:14 +00:00
Kexample.com.+005+16486.ds - TRAFFIC keyword for testbound. Simplifies test generation. 2009-09-02 13:11:52 +00:00
Kexample.com.+005+16486.key - TRAFFIC keyword for testbound. Simplifies test generation. 2009-09-02 13:11:52 +00:00
Kexample.com.+005+16486.private - TRAFFIC keyword for testbound. Simplifies test generation. 2009-09-02 13:11:52 +00:00
Kexample.com.+005+30899.ds sign test tool. 2007-08-29 12:09:14 +00:00
Kexample.com.+005+30899.key sign test tool. 2007-08-29 12:09:14 +00:00
Kexample.com.+005+30899.private sign test tool. 2007-08-29 12:09:14 +00:00
Kexample.com.+005+55582.ds more keys for autotrust testing. 2009-09-02 10:04:34 +00:00
Kexample.com.+005+55582.key more keys for autotrust testing. 2009-09-02 10:04:34 +00:00
Kexample.com.+005+55582.private more keys for autotrust testing. 2009-09-02 10:04:34 +00:00
Kexample.com.+005+60946.ds - TRAFFIC keyword for testbound. Simplifies test generation. 2009-09-02 13:11:52 +00:00
Kexample.com.+005+60946.key - TRAFFIC keyword for testbound. Simplifies test generation. 2009-09-02 13:11:52 +00:00
Kexample.com.+005+60946.private - TRAFFIC keyword for testbound. Simplifies test generation. 2009-09-02 13:11:52 +00:00
Kexample.com.+007+57024.ds Test that AD flags and NSEC3 optout does what we say. 2010-09-14 09:11:19 +00:00
Kexample.com.+007+57024.key Test that AD flags and NSEC3 optout does what we say. 2010-09-14 09:11:19 +00:00
Kexample.com.+007+57024.private Test that AD flags and NSEC3 optout does what we say. 2010-09-14 09:11:19 +00:00
Kexample.com.+008+01443.ds SHA256 support. 2008-09-30 13:06:07 +00:00
Kexample.com.+008+01443.key SHA256 support. 2008-09-30 13:06:07 +00:00
Kexample.com.+008+01443.private SHA256 support. 2008-09-30 13:06:07 +00:00
Kexample.com.+008+29332.ds add test for being lenient with NSEC empty non-terminal Name Error responses with rcode=NXDOMAIN while it should be rcode=NOERROR 2014-02-20 09:48:08 +00:00
Kexample.com.+008+29332.key add test for being lenient with NSEC empty non-terminal Name Error responses with rcode=NXDOMAIN while it should be rcode=NOERROR 2014-02-20 09:48:08 +00:00
Kexample.com.+008+29332.private add test for being lenient with NSEC empty non-terminal Name Error responses with rcode=NXDOMAIN while it should be rcode=NOERROR 2014-02-20 09:48:08 +00:00
Kexample.com.+008+55566.ds add test for being lenient with NSEC empty non-terminal Name Error responses with rcode=NXDOMAIN while it should be rcode=NOERROR 2014-02-20 09:48:08 +00:00
Kexample.com.+008+55566.key add test for being lenient with NSEC empty non-terminal Name Error responses with rcode=NXDOMAIN while it should be rcode=NOERROR 2014-02-20 09:48:08 +00:00
Kexample.com.+008+55566.private add test for being lenient with NSEC empty non-terminal Name Error responses with rcode=NXDOMAIN while it should be rcode=NOERROR 2014-02-20 09:48:08 +00:00
Kexample.com.+009+48886.ds Line endings. 2009-04-17 11:52:42 +00:00
Kexample.com.+009+48886.key Line endings. 2009-04-17 11:52:42 +00:00
Kexample.com.+009+48886.private Line endings. 2009-04-17 11:52:42 +00:00
Kexample.com.+012+60385.ds GOST algorithm number 12. 2010-04-15 11:29:43 +00:00
Kexample.com.+012+60385.key GOST algorithm number 12. 2010-04-15 11:29:43 +00:00
Kexample.com.+012+60385.private GOST algorithm number 12. 2010-04-15 11:29:43 +00:00
local_acl_override.rpl - Possibility to specify local-zone types for an acl/tag pair 2016-06-24 19:08:58 +00:00
local_acl_taglist_action.rpl - access-control-tag-data implemented. verbose(4) prints tag debug. 2016-07-07 10:20:05 +00:00
local_acl_taglist.rpl - access-control-tag-data implemented. verbose(4) prints tag debug. 2016-07-07 10:20:05 +00:00
local_cname.rpl - Ported tests for local_cname unit test to testbound framework. 2016-10-21 08:59:56 +00:00
local_nodefault.rpl - separate ldns into core ldns inside ldns/ subdirectory. No more 2013-10-31 15:09:26 +00:00
local_nodefault.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
local_norec.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
local_nosnoop.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
local_transparent_sametype.rpl - separate ldns into core ldns inside ldns/ subdirectory. No more 2013-10-31 15:09:26 +00:00
local_typetransparent.rpl - separate ldns into core ldns inside ldns/ subdirectory. No more 2013-10-31 15:09:26 +00:00
localdata.rpl - Fix local-zone type redirect that did not use the query name for 2010-04-23 14:03:09 +00:00
net_signed_servfail.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
nomem_cnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
nss_compile.tpkg fixup nss compile (no ldns in it). 2014-01-31 11:25:36 +00:00
pylib.tpkg pylib test referred to ldns which is not a dependency any more. 2013-12-05 16:49:37 +00:00
pymod_thread.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
pymod.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
refuse_xfr.rpl AXFR IXFR test 2007-07-26 09:39:08 +00:00
remote-threaded.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
root_anchor.tpkg - fix root_anchor test for updated icannbundle.pem lower certificates. 2017-02-03 09:33:32 +00:00
root_hints.tpkg root hints checks dig. 2008-11-25 15:18:54 +00:00
rrset_rettl.rpl - Fix bug #425: unbound reports wrong TTL in reply, it reports a TTL 2012-01-10 09:42:32 +00:00
rrset_untrusted.rpl Same scrubber patch to trunk. 2008-08-07 07:31:05 +00:00
rrset_updated.rpl test fixup, 127.0.0.1 is blocked. 2007-07-18 08:24:44 +00:00
speed_cache.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
speed_local.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
stat_timer.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
stop_nxdomain_minimised.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
stop_nxdomain.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
stream_ssl.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
stream_tcp.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
stub_udp6.tpkg use common functionality file. 2011-02-11 12:30:42 +00:00
stub_udp.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
tcp_sigpipe.tpkg Fixup testsetup for VM tests (testcode/run_vm.sh). 2014-06-24 10:26:02 +00:00
test_ds.sha1 Nicer names for test files. 2009-08-11 10:33:56 +00:00
test_ds.sha384 - implement draft-ietf-dnsext-ecdsa-04; which is in IETF LC; This 2012-02-08 13:22:44 +00:00
test_ldnsrr.1 - unit test for ldns wire to str and back with zones, root, nlnetlabs 2014-01-31 10:19:01 +00:00
test_ldnsrr.2 - unit test for ldns wire to str and back with zones, root, nlnetlabs 2014-01-31 10:19:01 +00:00
test_ldnsrr.3 - Fix #572: Fix unit test failure for systems with different 2014-04-07 09:18:29 +00:00
test_ldnsrr.4 - test for too lenient LOC record 2014-02-18 09:46:16 +00:00
test_ldnsrr.5 - Test for type OPENPGPKEY. 2016-02-09 08:45:09 +00:00
test_ldnsrr.c1 - unit test for ldns wire to str and back with zones, root, nlnetlabs 2014-01-31 10:19:01 +00:00
test_ldnsrr.c2 - unit test for ldns wire to str and back with zones, root, nlnetlabs 2014-01-31 10:19:01 +00:00
test_ldnsrr.c3 - Fix unit test for CDS typecode. 2014-09-15 12:49:37 +00:00
test_ldnsrr.c4 - test for too lenient LOC record 2014-02-18 09:46:16 +00:00
test_ldnsrr.c5 - Test for type OPENPGPKEY. 2016-02-09 08:45:09 +00:00
test_nsec3_hash.1 nsec3 hash function unit test. 2007-09-17 09:25:54 +00:00
test_packets.1 Smaller test data. 2007-04-18 13:48:29 +00:00
test_packets.2 Smaller test data. 2007-04-18 13:48:29 +00:00
test_packets.3 Smaller test data. 2007-04-18 13:48:29 +00:00
test_packets.4 RRSIG parse plans. 2007-04-20 09:58:32 +00:00
test_packets.5 - Fix assertion failure reported by Kai Storbeck from XS4ALL, the 2010-06-16 15:05:22 +00:00
test_packets.6 Assertion incorrect. Compressed packets can be larger. 2007-10-30 13:40:43 +00:00
test_packets.7 - Fix validation failure for qtype ANY caused by a RRSIG parse failure. 2010-04-22 15:01:02 +00:00
test_packets.8 - Be lenient and accept imgw.pl malformed packet (like BIND). 2010-11-08 18:32:55 +00:00
test_packets.9 - Fix parse error on negative SOA RRSIGs if badly ordered in the packet. 2011-12-15 13:37:13 +00:00
test_signatures.1 fixup canon compare. Include full AXFR data in signature test. 2007-08-16 10:05:52 +00:00
test_signatures.2 Jelte found DSA sig solution, copied from ldns to fit into unbound validator. 2008-04-14 15:34:09 +00:00
test_signatures.3 DSA test 2008-04-15 15:19:25 +00:00
test_signatures.4 DSA test 2008-04-15 15:19:25 +00:00
test_signatures.5 Fixup unbound. Now still a switch DSA(ldns) DSA(bind) ... 2008-04-15 18:01:14 +00:00
test_signatures.6 Fixup unbound. Now still a switch DSA(ldns) DSA(bind) ... 2008-04-15 18:01:14 +00:00
test_signatures.7 Fixup unbound. Now still a switch DSA(ldns) DSA(bind) ... 2008-04-15 18:01:14 +00:00
test_signatures.8 test to make sure unbound deals with capitals in signer name like bind does 2010-06-24 07:06:17 +00:00
test_sigs.ecdsa_p256 - implement draft-ietf-dnsext-ecdsa-04; which is in IETF LC; This 2012-02-08 13:22:44 +00:00
test_sigs.ecdsa_p384 - implement draft-ietf-dnsext-ecdsa-04; which is in IETF LC; This 2012-02-08 13:22:44 +00:00
test_sigs.gost GOST algorithm number 12. 2010-04-15 11:29:43 +00:00
test_sigs.hinfo Nicer names for test files. 2009-08-11 10:33:56 +00:00
test_sigs.revoked Nicer names for test files. 2009-08-11 10:33:56 +00:00
test_sigs.rsasha256 Nicer names for test files. 2009-08-11 10:33:56 +00:00
test_sigs.rsasha256_draft - separate ldns into core ldns inside ldns/ subdirectory. No more 2013-10-31 15:09:26 +00:00
test_sigs.rsasha512_draft Nicer names for test files. 2009-08-11 10:33:56 +00:00
test_sigs.sha1_and_256 Nicer names for test files. 2009-08-11 10:33:56 +00:00
trust_cname_chain.rpl Fixup for problems with do-ip6: no and only ipv6 addresses. 2008-11-17 12:47:34 +00:00
ttl_max.rpl min-ttl option and tests for min-ttl and max-ttl. 2009-04-14 10:10:11 +00:00
ttl_min.rpl min-ttl option and tests for min-ttl and max-ttl. 2009-04-14 10:10:11 +00:00
ttl_msg.rpl - Return NXDOMAIN after chain of CNAMEs ends at name-not-found. 2010-08-05 14:31:52 +00:00
val_adbit.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_adcopy.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_anchor_nx_nosig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_anchor_nx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ans_dsent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ans_nx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_any_cname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_any_dname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_any.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cname_loop1.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cname_loop2.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cname_loop3.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnameinsectopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamenx_dblnsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamenx_rcodenx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnameqtype.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametocloser_nosig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametocloser.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametocnamewctoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametodname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametodnametocnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametoinsecure.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonodata_nonsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametooptin.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametooptout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametoposnowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamewctonodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamewctonx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamewctoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_deleg_nons.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnametoolong.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnametoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnamewc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_afterprime.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_cname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_cnamesub.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_gost_downgrade.crpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_gost.crpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_sha2_downgrade.crpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_sha2.crpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dsnsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_entds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_faildnskey_ok.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_faildnskey.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_fwdds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_keyprefetch_verify.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_keyprefetch.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_mal_wc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_negcache_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_negcache_dssoa.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_noadwhennodo.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_ent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_entnx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_entwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_failsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_hasdata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_zonecut.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc_badce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc_one.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nokeyprime.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror_noce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror_nonc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror_nowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b2_nodata_nons.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b2_nodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout_noce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout_nonc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b4_wild_wr.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b4_wild.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata_noce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata_nonc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata_nowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b21_nodataent_wr.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b21_nodataent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cname_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cname_par.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cname_sub.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cnametocnamewctoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_entnodata_optout_badopt.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_entnodata_optout_match.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_entnodata_optout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_iter_high.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nodatawccname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_badopt.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_badsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_soa.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_optout_ad.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_optout_cache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_wcany_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_wcany.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nsec3_collision.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nsec3_params.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_overreach.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_pos_truncns.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive_nosigs.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive_wc_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive_wc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_qds_badanc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_qds_oneanc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_qds_twoanc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_refer_unsignadd.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_referd.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_referglue.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_rrsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_secds_nosig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_secds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_spurious_ns.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_stub_noroot.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_stubds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_dnskey_dp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_dnskey.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_missing_dp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_missing.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_twocname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unalgo_anchor.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unalgo_dlv.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unalgo_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsec_cname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsecds_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsecds_qtypeds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsecds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_wild_pos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
version_bind_hide.rpl do not allow cache snooping by default. 2008-09-01 13:48:24 +00:00
version_bind.rpl Tests can handle multiple hosts. Tests for chaos and iterator. 2007-07-25 12:31:04 +00:00
views.rpl Added views functionality. 2016-10-05 09:36:25 +00:00