| .. |
|
00-lint.tpkg
|
|
|
|
01-doc.tpkg
|
|
|
|
02-unittest.tpkg
|
|
|
|
03-testbound.tpkg
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
04-checkconf.tpkg
|
- Fix #1155: test status code of unbound-control in 04-checkconf, not the status
|
2016-11-10 11:20:27 +00:00 |
|
05-asynclook.tpkg
|
|
|
|
06-ianaports.tpkg
|
|
|
|
07-confroot.tpkg
|
|
|
|
08-host-lib.tpkg
|
|
|
|
09-unbound-control.tpkg
|
- Added local-zones and local-data bulk addition and removal functionality in
|
2016-11-30 11:22:29 +00:00 |
|
10-unbound-anchor.tpkg
|
fixup script tests
|
2017-03-09 13:23:06 +00:00 |
|
acl.rpl
|
|
|
|
autotrust_10key.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_addpend_2exceed.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_addpend_early.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_addpend_nosign.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_addpend_nosignnew.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_addpend_once.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_addpend_twice.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init_ds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init_fail.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init_failsig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init_legacy.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init_sigs.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_init_zsk.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_missing.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_missing_all.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_missing_returns.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_probefail.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_probefailsig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_revoked_use.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_revoked_with_invalid.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_revtp.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_revtp_read.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_revtp_use.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_rollalgo.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_rollalgo_unknown.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_rollover.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
autotrust_valid_use.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_data.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_dnskey.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_ds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_ds_entry.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_ent.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_key_entry.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_prime.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
black_prime_entry.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
chaos_trustanchor.rpl
|
- Add trustanchor.unbound CH TXT that gets a response with a number
|
2017-03-16 09:17:58 +00:00 |
|
common.sh
|
|
|
|
ctrl_itr.tpkg
|
|
|
|
ctrl_pipe.tpkg
|
|
|
|
dlv_anchor.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_ask_higher.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_below_ta.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_delegation.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_ds_lookup.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_insecure.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_insecure_negcache.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_keyretry.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_negnx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_optout.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_remove.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_remove_empty.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_remove_nodel.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_remove_pos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dlv_unused.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
dns64_lookup.rpl
|
|
|
|
dnscrypt_cert.tpkg
|
- fixup for lruhash (whitespace and header file comment).
|
2017-03-20 15:51:34 +00:00 |
|
dnscrypt_queries.tpkg
|
- fixup for lruhash (whitespace and header file comment).
|
2017-03-20 15:51:34 +00:00 |
|
domain_insec_dlv.rpl
|
|
|
|
domain_insec_ds.rpl
|
Add DSA support for OpenSSL 1.1
|
2016-12-07 12:58:47 +00:00 |
|
edns_cache.tpkg
|
|
|
|
edns_lame.tpkg
|
|
|
|
fetch_glue.rpl
|
|
|
|
fetch_glue_cname.rpl
|
|
|
|
fwd.rpl
|
|
|
|
fwd_ancil.tpkg
|
Fix test to cleanup executable and wait for error printout
|
2016-01-27 07:55:18 +00:00 |
|
fwd_any.rpl
|
|
|
|
fwd_bogus.tpkg
|
fixup script tests
|
2017-03-09 13:23:06 +00:00 |
|
fwd_cached.rpl
|
|
|
|
fwd_capsid.tpkg
|
|
|
|
fwd_capsid_fallback.tpkg
|
|
|
|
fwd_capsid_strip.tpkg
|
|
|
|
fwd_capsid_white.tpkg
|
|
|
|
fwd_compress_c00c.tpkg
|
|
|
|
fwd_droptoomany.rpl
|
|
|
|
fwd_edns_bksec.tpkg
|
fixup script tests
|
2017-03-09 13:23:06 +00:00 |
|
fwd_edns_probe.tpkg
|
|
|
|
fwd_error.rpl
|
|
|
|
fwd_jostle.rpl
|
|
|
|
fwd_jostle_out.rpl
|
|
|
|
fwd_lrudrop.rpl
|
|
|
|
fwd_no_edns.tpkg
|
|
|
|
fwd_notcached.rpl
|
|
|
|
fwd_oneport.tpkg
|
|
|
|
fwd_tcp.tpkg
|
|
|
|
fwd_tcp_tc.tpkg
|
|
|
|
fwd_tcp_tc6.tpkg
|
|
|
|
fwd_three.tpkg
|
|
|
|
fwd_three_service.tpkg
|
|
|
|
fwd_timeout.rpl
|
|
|
|
fwd_ttlexpire.tpkg
|
|
|
|
fwd_two.rpl
|
|
|
|
fwd_udp.tpkg
|
|
|
|
fwd_udptmout.tpkg
|
|
|
|
fwd_waitudp.tpkg
|
|
|
|
fwd_zero.tpkg
|
|
|
|
fwddlv_parse.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
host_file.template
|
|
|
|
hostsfileosx.tpkg
|
|
|
|
ipsecmod_bogus_ipseckey.crpl
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
ipsecmod_enabled.crpl
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
ipsecmod_hook.sh
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
ipsecmod_ignore_bogus_ipseckey.crpl
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
ipsecmod_max_ttl.crpl
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
ipsecmod_strict.crpl
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
ipsecmod_whitelist.crpl
|
- Implemented opportunistic IPsec support module (ipsecmod).
|
2017-05-16 12:39:24 +00:00 |
|
iter_class_any.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_cname_cache.rpl
|
|
|
|
iter_cname_double.rpl
|
|
|
|
iter_cname_nx.rpl
|
|
|
|
iter_cname_qnamecopy.rpl
|
|
|
|
iter_cycle.rpl
|
|
|
|
iter_cycle_noh.rpl
|
|
|
|
iter_dname_insec.rpl
|
- Fix that looped DNAMEs do not cause unbound to spend effort.
|
2017-03-16 14:32:58 +00:00 |
|
iter_dname_yx.rpl
|
- Fix #1235: Fix too long DNAME expansion produces SERVFAIL instead
|
2017-03-13 08:27:01 +00:00 |
|
iter_dnsseclame_bug.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_dnsseclame_ds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_dnsseclame_ds_ok.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_dnsseclame_ta.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_dnsseclame_ta_ok.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_domain_sale.rpl
|
|
|
|
iter_domain_sale_nschange.rpl
|
|
|
|
iter_donotq127.rpl
|
|
|
|
iter_dp_turnsuseless.rpl
|
|
|
|
iter_ds_locate_ns.rpl
|
|
|
|
iter_ds_locate_ns_cname.rpl
|
|
|
|
iter_ds_locate_ns_detach.rpl
|
|
|
|
iter_ds_locate_ns_nosoa.rpl
|
|
|
|
iter_emptydp.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_emptydp_for_glue.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_fwdfirst.rpl
|
|
|
|
iter_fwdfirstequal.rpl
|
|
|
|
iter_fwdstub.rpl
|
|
|
|
iter_fwdstubroot.rpl
|
|
|
|
iter_got6only.rpl
|
|
|
|
iter_hint_lame.rpl
|
|
|
|
iter_lame_aaaa.rpl
|
|
|
|
iter_lame_noaa.rpl
|
|
|
|
iter_lame_nosoa.rpl
|
|
|
|
iter_lamescrub.rpl
|
|
|
|
iter_mod.rpl
|
|
|
|
iter_ns_badip.rpl
|
|
|
|
iter_ns_spoof.rpl
|
|
|
|
iter_pc_a.rpl
|
|
|
|
iter_pc_aaaa.rpl
|
|
|
|
iter_pcdiff.rpl
|
|
|
|
iter_pcdirect.rpl
|
|
|
|
iter_pclame.rpl
|
|
|
|
iter_pcname.rpl
|
|
|
|
iter_pcnamech.rpl
|
|
|
|
iter_pcnamechrec.rpl
|
|
|
|
iter_pcnamerec.rpl
|
|
|
|
iter_pcttl.rpl
|
|
|
|
iter_prefetch.rpl
|
|
|
|
iter_prefetch_change.rpl
|
|
|
|
iter_prefetch_change2.rpl
|
|
|
|
iter_prefetch_childns.rpl
|
|
|
|
iter_prefetch_fail.rpl
|
|
|
|
iter_prefetch_ns.rpl
|
|
|
|
iter_primenoglue.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_privaddr.rpl
|
|
|
|
iter_ranoaa_lame.rpl
|
|
|
|
iter_reclame_one.rpl
|
|
|
|
iter_reclame_two.rpl
|
|
|
|
iter_recurse.rpl
|
|
|
|
iter_req_qname.rpl
|
|
|
|
iter_resolve.rpl
|
|
|
|
iter_resolve_minimised.rpl
|
- Use QTYPE=A for QNAME minimisation.
|
2016-06-13 13:06:35 +00:00 |
|
iter_resolve_minimised_nx.rpl
|
- Use QTYPE=A for QNAME minimisation.
|
2016-06-13 13:06:35 +00:00 |
|
iter_resolve_minimised_refused.rpl
|
- Use QTYPE=A for QNAME minimisation.
|
2016-06-13 13:06:35 +00:00 |
|
iter_resolve_minimised_timeout.rpl
|
- QNAME minimisation unit test for dropped QTYPE=A queries.
|
2016-06-14 12:36:22 +00:00 |
|
iter_scrub_cname_an.rpl
|
|
|
|
iter_scrub_dname_insec.rpl
|
|
|
|
iter_scrub_dname_rev.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_scrub_dname_sec.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
iter_scrub_ns.rpl
|
|
|
|
iter_scrub_ns_fwd.rpl
|
|
|
|
iter_scrub_ns_side.rpl
|
|
|
|
iter_soamin.rpl
|
|
|
|
iter_stub_leak.rpl
|
- Fix queries for nameservers under a stub leaking to the internet.
|
2017-05-12 15:10:10 +00:00 |
|
iter_stub_noroot.rpl
|
|
|
|
iter_stubfirst.rpl
|
|
|
|
iter_stublastresort.rpl
|
|
|
|
iter_timeout_ra_aaaa.rpl
|
|
|
|
Kexample.com.+003+02854.ds
|
|
|
|
Kexample.com.+003+02854.key
|
|
|
|
Kexample.com.+003+02854.private
|
|
|
|
Kexample.com.+005+16486.ds
|
|
|
|
Kexample.com.+005+16486.key
|
|
|
|
Kexample.com.+005+16486.private
|
|
|
|
Kexample.com.+005+30899.ds
|
|
|
|
Kexample.com.+005+30899.key
|
|
|
|
Kexample.com.+005+30899.private
|
|
|
|
Kexample.com.+005+55582.ds
|
|
|
|
Kexample.com.+005+55582.key
|
|
|
|
Kexample.com.+005+55582.private
|
|
|
|
Kexample.com.+005+60946.ds
|
|
|
|
Kexample.com.+005+60946.key
|
|
|
|
Kexample.com.+005+60946.private
|
|
|
|
Kexample.com.+007+57024.ds
|
|
|
|
Kexample.com.+007+57024.key
|
|
|
|
Kexample.com.+007+57024.private
|
|
|
|
Kexample.com.+008+01443.ds
|
|
|
|
Kexample.com.+008+01443.key
|
|
|
|
Kexample.com.+008+01443.private
|
|
|
|
Kexample.com.+008+29332.ds
|
|
|
|
Kexample.com.+008+29332.key
|
|
|
|
Kexample.com.+008+29332.private
|
|
|
|
Kexample.com.+008+55566.ds
|
|
|
|
Kexample.com.+008+55566.key
|
|
|
|
Kexample.com.+008+55566.private
|
|
|
|
Kexample.com.+009+48886.ds
|
|
|
|
Kexample.com.+009+48886.key
|
|
|
|
Kexample.com.+009+48886.private
|
|
|
|
Kexample.com.+012+60385.ds
|
|
|
|
Kexample.com.+012+60385.key
|
|
|
|
Kexample.com.+012+60385.private
|
|
|
|
local_acl_override.rpl
|
- Possibility to specify local-zone types for an acl/tag pair
|
2016-06-24 19:08:58 +00:00 |
|
local_acl_taglist.rpl
|
- access-control-tag-data implemented. verbose(4) prints tag debug.
|
2016-07-07 10:20:05 +00:00 |
|
local_acl_taglist_action.rpl
|
- access-control-tag-data implemented. verbose(4) prints tag debug.
|
2016-07-07 10:20:05 +00:00 |
|
local_cname.rpl
|
- Ported tests for local_cname unit test to testbound framework.
|
2016-10-21 08:59:56 +00:00 |
|
local_nodefault.rpl
|
|
|
|
local_nodefault.tpkg
|
|
|
|
local_norec.tpkg
|
|
|
|
local_nosnoop.tpkg
|
|
|
|
local_transparent_sametype.rpl
|
|
|
|
local_typetransparent.rpl
|
|
|
|
localdata.rpl
|
|
|
|
net_signed_servfail.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
nomem_cnametopos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
nss_compile.tpkg
|
|
|
|
pylib.tpkg
|
|
|
|
pymod.tpkg
|
|
|
|
pymod_thread.tpkg
|
|
|
|
refuse_xfr.rpl
|
|
|
|
remote-threaded.tpkg
|
|
|
|
root_anchor.tpkg
|
- fix root_anchor test for updated icannbundle.pem lower certificates.
|
2017-02-03 09:33:32 +00:00 |
|
root_hints.tpkg
|
|
|
|
rrset_rettl.rpl
|
|
|
|
rrset_untrusted.rpl
|
|
|
|
rrset_updated.rpl
|
|
|
|
speed_cache.tpkg
|
|
|
|
speed_local.tpkg
|
|
|
|
stat_timer.tpkg
|
|
|
|
stop_nxdomain.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
stop_nxdomain_minimised.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
stream_ssl.tpkg
|
|
|
|
stream_tcp.tpkg
|
|
|
|
stub_udp.tpkg
|
|
|
|
stub_udp6.tpkg
|
|
|
|
subnet_cached.crpl
|
- Generalise inplace callback (de)registration
|
2017-04-06 13:13:06 +00:00 |
|
subnet_derived.crpl
|
- Generalise inplace callback (de)registration
|
2017-04-06 13:13:06 +00:00 |
|
subnet_format_ip4.crpl
|
- Generalise inplace callback (de)registration
|
2017-04-06 13:13:06 +00:00 |
|
subnet_max_source.crpl
|
- Added ECS unit test (from Manu Bretelle).
|
2017-04-13 08:49:32 +00:00 |
|
subnet_not_whitelisted.crpl
|
- Merge EDNS Client subnet implementation from feature branch into main branch,
|
2017-03-21 12:08:17 +00:00 |
|
subnet_val_positive.crpl
|
- Generalise inplace callback (de)registration
|
2017-04-06 13:13:06 +00:00 |
|
subnet_val_positive_client.crpl
|
- Generalise inplace callback (de)registration
|
2017-04-06 13:13:06 +00:00 |
|
subnet_without_validator.crpl
|
- Generalise inplace callback (de)registration
|
2017-04-06 13:13:06 +00:00 |
|
tcp_sigpipe.tpkg
|
|
|
|
test_ds.sha1
|
|
|
|
test_ds.sha384
|
|
|
|
test_ldnsrr.1
|
|
|
|
test_ldnsrr.2
|
|
|
|
test_ldnsrr.3
|
|
|
|
test_ldnsrr.4
|
|
|
|
test_ldnsrr.5
|
- Fix sldns parse and printout of TSIG RRs.
|
2017-05-02 13:53:06 +00:00 |
|
test_ldnsrr.c1
|
|
|
|
test_ldnsrr.c2
|
|
|
|
test_ldnsrr.c3
|
|
|
|
test_ldnsrr.c4
|
|
|
|
test_ldnsrr.c5
|
- Fix sldns parse and printout of TSIG RRs.
|
2017-05-02 13:53:06 +00:00 |
|
test_nsec3_hash.1
|
|
|
|
test_packets.1
|
|
|
|
test_packets.2
|
|
|
|
test_packets.3
|
|
|
|
test_packets.4
|
|
|
|
test_packets.5
|
|
|
|
test_packets.6
|
|
|
|
test_packets.7
|
|
|
|
test_packets.8
|
|
|
|
test_packets.9
|
|
|
|
test_signatures.1
|
|
|
|
test_signatures.2
|
|
|
|
test_signatures.3
|
|
|
|
test_signatures.4
|
|
|
|
test_signatures.5
|
|
|
|
test_signatures.6
|
|
|
|
test_signatures.7
|
|
|
|
test_signatures.8
|
|
|
|
test_sigs.ecdsa_p256
|
|
|
|
test_sigs.ecdsa_p384
|
|
|
|
test_sigs.ed25519
|
- Support for openssl EVP_DigestVerify.
|
2017-05-30 12:28:25 +00:00 |
|
test_sigs.gost
|
|
|
|
test_sigs.hinfo
|
|
|
|
test_sigs.revoked
|
|
|
|
test_sigs.rsasha256
|
|
|
|
test_sigs.rsasha256_draft
|
|
|
|
test_sigs.rsasha512_draft
|
|
|
|
test_sigs.sha1_and_256
|
|
|
|
trust_cname_chain.rpl
|
|
|
|
ttl_max.rpl
|
|
|
|
ttl_min.rpl
|
|
|
|
ttl_msg.rpl
|
|
|
|
val_adbit.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_adcopy.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_anchor_nx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_anchor_nx_nosig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ans_dsent.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ans_nx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_any.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_any_cname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_any_dname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cname_loop1.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cname_loop2.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cname_loop3.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnameinsectopos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnamenx_dblnsec.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnamenx_rcodenx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnameqtype.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametocloser.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametocloser_nosig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametocnamewctoposwc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametodname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametodnametocnametopos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametoinsecure.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametonodata.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametonodata_nonsec.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametonsec.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametonx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametooptin.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametooptout.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametopos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametoposnowc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnametoposwc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnamewctonodata.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnamewctonx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_cnamewctoposwc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_deleg_nons.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_dnametoolong.rpl
|
Fixup validation test; the YXDOMAIN is returned and the DNAME.
|
2017-03-13 08:29:08 +00:00 |
|
val_dnametopos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_dnametoposwc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_dnamewc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ds_afterprime.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ds_cname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ds_cnamesub.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ds_gost.crpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ds_gost_downgrade.crpl
|
- harden algo downgrade also makes unbound more lenient about digest
|
2017-04-10 13:38:50 +00:00 |
|
val_ds_sha2.crpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ds_sha2_downgrade.crpl
|
- harden algo downgrade also makes unbound more lenient about digest
|
2017-04-10 13:38:50 +00:00 |
|
val_ds_sha2_lenient.crpl
|
- harden algo downgrade also makes unbound more lenient about digest
|
2017-04-10 13:38:50 +00:00 |
|
val_dsnsec.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_entds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_faildnskey.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_faildnskey_ok.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_fwdds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_keyprefetch.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_keyprefetch_verify.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_mal_wc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_negcache_ds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_negcache_dssoa.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_noadwhennodo.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata_ent.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata_entnx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata_entwc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata_failsig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata_hasdata.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodata_zonecut.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodatawc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodatawc_badce.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodatawc_nodeny.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nodatawc_one.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nokeyprime.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b1_nameerror.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b1_nameerror_noce.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b1_nameerror_nonc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b1_nameerror_nowc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b2_nodata.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b2_nodata_nons.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b3_optout.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b3_optout_negcache.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b3_optout_noce.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b3_optout_nonc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b4_wild.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b4_wild_wr.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b5_wcnodata.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b5_wcnodata_noce.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b5_wcnodata_nonc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b5_wcnodata_nowc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b21_nodataent.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_b21_nodataent_wr.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_cname_ds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_cname_par.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_cname_sub.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_cnametocnamewctoposwc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_entnodata_optout.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_entnodata_optout_badopt.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_entnodata_optout_match.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_iter_high.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_nodatawccname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_nods.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_nods_badopt.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_nods_badsig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_nods_negcache.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_nods_soa.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_optout_ad.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_optout_cache.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_wcany.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nsec3_wcany_nodeny.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nx.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nx_nodeny.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nx_nowc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nx_nsec3_collision.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nx_nsec3_params.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_nx_overreach.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_pos_truncns.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_positive.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_positive_nosigs.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_positive_wc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_positive_wc_nodeny.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_qds_badanc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_qds_oneanc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_qds_twoanc.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_refer_unsignadd.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_referd.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_referglue.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_rrsig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_secds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_secds_nosig.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_spurious_ns.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_stub_noroot.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_stubds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ta_algo_dnskey.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ta_algo_dnskey_dp.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ta_algo_missing.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_ta_algo_missing_dp.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_twocname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unalgo_anchor.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unalgo_dlv.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unalgo_ds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unsec_cname.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unsecds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unsecds_negcache.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_unsecds_qtypeds.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
val_wild_pos.rpl
|
- --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and
|
2017-03-09 13:18:08 +00:00 |
|
version_bind.rpl
|
|
|
|
version_bind_hide.rpl
|
|
|
|
views.rpl
|
Added views functionality.
|
2016-10-05 09:36:25 +00:00 |