unbound/testdata
Wouter Wijngaards 8c4e7ffb14 - Support for openssl EVP_DigestVerify.
- Support for the ED25519 algorithm with openssl (from openssl 1.1.1).


git-svn-id: file:///svn/unbound/trunk@4198 be551aaa-1e26-0410-a405-d3ace91eadb9
2017-05-30 12:28:25 +00:00
..
00-lint.tpkg
01-doc.tpkg
02-unittest.tpkg
03-testbound.tpkg - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
04-checkconf.tpkg - Fix #1155: test status code of unbound-control in 04-checkconf, not the status 2016-11-10 11:20:27 +00:00
05-asynclook.tpkg
06-ianaports.tpkg
07-confroot.tpkg
08-host-lib.tpkg
09-unbound-control.tpkg - Added local-zones and local-data bulk addition and removal functionality in 2016-11-30 11:22:29 +00:00
10-unbound-anchor.tpkg fixup script tests 2017-03-09 13:23:06 +00:00
acl.rpl
autotrust_10key.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_2exceed.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_early.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_nosign.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_nosignnew.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_once.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_addpend_twice.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_fail.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_failsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_legacy.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_sigs.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_init_zsk.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_missing.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_missing_all.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_missing_returns.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_probefail.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_probefailsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revoked_use.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revoked_with_invalid.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revtp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revtp_read.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_revtp_use.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_rollalgo.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_rollalgo_unknown.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_rollover.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
autotrust_valid_use.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_data.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_dnskey.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_ds_entry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_ent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_key_entry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_prime.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
black_prime_entry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
chaos_trustanchor.rpl - Add trustanchor.unbound CH TXT that gets a response with a number 2017-03-16 09:17:58 +00:00
common.sh
ctrl_itr.tpkg
ctrl_pipe.tpkg
dlv_anchor.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_ask_higher.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_below_ta.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_delegation.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_ds_lookup.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_insecure.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_insecure_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_keyretry.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_negnx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_optout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove_empty.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove_nodel.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_remove_pos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dlv_unused.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
dns64_lookup.rpl
dnscrypt_cert.tpkg - fixup for lruhash (whitespace and header file comment). 2017-03-20 15:51:34 +00:00
dnscrypt_queries.tpkg - fixup for lruhash (whitespace and header file comment). 2017-03-20 15:51:34 +00:00
domain_insec_dlv.rpl
domain_insec_ds.rpl Add DSA support for OpenSSL 1.1 2016-12-07 12:58:47 +00:00
edns_cache.tpkg
edns_lame.tpkg
fetch_glue.rpl
fetch_glue_cname.rpl
fwd.rpl
fwd_ancil.tpkg Fix test to cleanup executable and wait for error printout 2016-01-27 07:55:18 +00:00
fwd_any.rpl
fwd_bogus.tpkg fixup script tests 2017-03-09 13:23:06 +00:00
fwd_cached.rpl
fwd_capsid.tpkg
fwd_capsid_fallback.tpkg
fwd_capsid_strip.tpkg
fwd_capsid_white.tpkg
fwd_compress_c00c.tpkg
fwd_droptoomany.rpl
fwd_edns_bksec.tpkg fixup script tests 2017-03-09 13:23:06 +00:00
fwd_edns_probe.tpkg
fwd_error.rpl
fwd_jostle.rpl
fwd_jostle_out.rpl
fwd_lrudrop.rpl
fwd_no_edns.tpkg
fwd_notcached.rpl
fwd_oneport.tpkg
fwd_tcp.tpkg
fwd_tcp_tc.tpkg
fwd_tcp_tc6.tpkg
fwd_three.tpkg
fwd_three_service.tpkg
fwd_timeout.rpl
fwd_ttlexpire.tpkg
fwd_two.rpl
fwd_udp.tpkg
fwd_udptmout.tpkg
fwd_waitudp.tpkg
fwd_zero.tpkg
fwddlv_parse.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
host_file.template
hostsfileosx.tpkg
ipsecmod_bogus_ipseckey.crpl - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
ipsecmod_enabled.crpl - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
ipsecmod_hook.sh - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
ipsecmod_ignore_bogus_ipseckey.crpl - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
ipsecmod_max_ttl.crpl - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
ipsecmod_strict.crpl - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
ipsecmod_whitelist.crpl - Implemented opportunistic IPsec support module (ipsecmod). 2017-05-16 12:39:24 +00:00
iter_class_any.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_cname_cache.rpl
iter_cname_double.rpl
iter_cname_nx.rpl
iter_cname_qnamecopy.rpl
iter_cycle.rpl
iter_cycle_noh.rpl
iter_dname_insec.rpl - Fix that looped DNAMEs do not cause unbound to spend effort. 2017-03-16 14:32:58 +00:00
iter_dname_yx.rpl - Fix #1235: Fix too long DNAME expansion produces SERVFAIL instead 2017-03-13 08:27:01 +00:00
iter_dnsseclame_bug.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ds_ok.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ta.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_dnsseclame_ta_ok.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_domain_sale.rpl
iter_domain_sale_nschange.rpl
iter_donotq127.rpl
iter_dp_turnsuseless.rpl
iter_ds_locate_ns.rpl
iter_ds_locate_ns_cname.rpl
iter_ds_locate_ns_detach.rpl
iter_ds_locate_ns_nosoa.rpl
iter_emptydp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_emptydp_for_glue.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_fwdfirst.rpl
iter_fwdfirstequal.rpl
iter_fwdstub.rpl
iter_fwdstubroot.rpl
iter_got6only.rpl
iter_hint_lame.rpl
iter_lame_aaaa.rpl
iter_lame_noaa.rpl
iter_lame_nosoa.rpl
iter_lamescrub.rpl
iter_mod.rpl
iter_ns_badip.rpl
iter_ns_spoof.rpl
iter_pc_a.rpl
iter_pc_aaaa.rpl
iter_pcdiff.rpl
iter_pcdirect.rpl
iter_pclame.rpl
iter_pcname.rpl
iter_pcnamech.rpl
iter_pcnamechrec.rpl
iter_pcnamerec.rpl
iter_pcttl.rpl
iter_prefetch.rpl
iter_prefetch_change.rpl
iter_prefetch_change2.rpl
iter_prefetch_childns.rpl
iter_prefetch_fail.rpl
iter_prefetch_ns.rpl
iter_primenoglue.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_privaddr.rpl
iter_ranoaa_lame.rpl
iter_reclame_one.rpl
iter_reclame_two.rpl
iter_recurse.rpl
iter_req_qname.rpl
iter_resolve.rpl
iter_resolve_minimised.rpl - Use QTYPE=A for QNAME minimisation. 2016-06-13 13:06:35 +00:00
iter_resolve_minimised_nx.rpl - Use QTYPE=A for QNAME minimisation. 2016-06-13 13:06:35 +00:00
iter_resolve_minimised_refused.rpl - Use QTYPE=A for QNAME minimisation. 2016-06-13 13:06:35 +00:00
iter_resolve_minimised_timeout.rpl - QNAME minimisation unit test for dropped QTYPE=A queries. 2016-06-14 12:36:22 +00:00
iter_scrub_cname_an.rpl
iter_scrub_dname_insec.rpl
iter_scrub_dname_rev.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_scrub_dname_sec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
iter_scrub_ns.rpl
iter_scrub_ns_fwd.rpl
iter_scrub_ns_side.rpl
iter_soamin.rpl
iter_stub_leak.rpl - Fix queries for nameservers under a stub leaking to the internet. 2017-05-12 15:10:10 +00:00
iter_stub_noroot.rpl
iter_stubfirst.rpl
iter_stublastresort.rpl
iter_timeout_ra_aaaa.rpl
Kexample.com.+003+02854.ds
Kexample.com.+003+02854.key
Kexample.com.+003+02854.private
Kexample.com.+005+16486.ds
Kexample.com.+005+16486.key
Kexample.com.+005+16486.private
Kexample.com.+005+30899.ds
Kexample.com.+005+30899.key
Kexample.com.+005+30899.private
Kexample.com.+005+55582.ds
Kexample.com.+005+55582.key
Kexample.com.+005+55582.private
Kexample.com.+005+60946.ds
Kexample.com.+005+60946.key
Kexample.com.+005+60946.private
Kexample.com.+007+57024.ds
Kexample.com.+007+57024.key
Kexample.com.+007+57024.private
Kexample.com.+008+01443.ds
Kexample.com.+008+01443.key
Kexample.com.+008+01443.private
Kexample.com.+008+29332.ds
Kexample.com.+008+29332.key
Kexample.com.+008+29332.private
Kexample.com.+008+55566.ds
Kexample.com.+008+55566.key
Kexample.com.+008+55566.private
Kexample.com.+009+48886.ds
Kexample.com.+009+48886.key
Kexample.com.+009+48886.private
Kexample.com.+012+60385.ds
Kexample.com.+012+60385.key
Kexample.com.+012+60385.private
local_acl_override.rpl - Possibility to specify local-zone types for an acl/tag pair 2016-06-24 19:08:58 +00:00
local_acl_taglist.rpl - access-control-tag-data implemented. verbose(4) prints tag debug. 2016-07-07 10:20:05 +00:00
local_acl_taglist_action.rpl - access-control-tag-data implemented. verbose(4) prints tag debug. 2016-07-07 10:20:05 +00:00
local_cname.rpl - Ported tests for local_cname unit test to testbound framework. 2016-10-21 08:59:56 +00:00
local_nodefault.rpl
local_nodefault.tpkg
local_norec.tpkg
local_nosnoop.tpkg
local_transparent_sametype.rpl
local_typetransparent.rpl
localdata.rpl
net_signed_servfail.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
nomem_cnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
nss_compile.tpkg
pylib.tpkg
pymod.tpkg
pymod_thread.tpkg
refuse_xfr.rpl
remote-threaded.tpkg
root_anchor.tpkg - fix root_anchor test for updated icannbundle.pem lower certificates. 2017-02-03 09:33:32 +00:00
root_hints.tpkg
rrset_rettl.rpl
rrset_untrusted.rpl
rrset_updated.rpl
speed_cache.tpkg
speed_local.tpkg
stat_timer.tpkg
stop_nxdomain.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
stop_nxdomain_minimised.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
stream_ssl.tpkg
stream_tcp.tpkg
stub_udp.tpkg
stub_udp6.tpkg
subnet_cached.crpl - Generalise inplace callback (de)registration 2017-04-06 13:13:06 +00:00
subnet_derived.crpl - Generalise inplace callback (de)registration 2017-04-06 13:13:06 +00:00
subnet_format_ip4.crpl - Generalise inplace callback (de)registration 2017-04-06 13:13:06 +00:00
subnet_max_source.crpl - Added ECS unit test (from Manu Bretelle). 2017-04-13 08:49:32 +00:00
subnet_not_whitelisted.crpl - Merge EDNS Client subnet implementation from feature branch into main branch, 2017-03-21 12:08:17 +00:00
subnet_val_positive.crpl - Generalise inplace callback (de)registration 2017-04-06 13:13:06 +00:00
subnet_val_positive_client.crpl - Generalise inplace callback (de)registration 2017-04-06 13:13:06 +00:00
subnet_without_validator.crpl - Generalise inplace callback (de)registration 2017-04-06 13:13:06 +00:00
tcp_sigpipe.tpkg
test_ds.sha1
test_ds.sha384
test_ldnsrr.1
test_ldnsrr.2
test_ldnsrr.3
test_ldnsrr.4
test_ldnsrr.5 - Fix sldns parse and printout of TSIG RRs. 2017-05-02 13:53:06 +00:00
test_ldnsrr.c1
test_ldnsrr.c2
test_ldnsrr.c3
test_ldnsrr.c4
test_ldnsrr.c5 - Fix sldns parse and printout of TSIG RRs. 2017-05-02 13:53:06 +00:00
test_nsec3_hash.1
test_packets.1
test_packets.2
test_packets.3
test_packets.4
test_packets.5
test_packets.6
test_packets.7
test_packets.8
test_packets.9
test_signatures.1
test_signatures.2
test_signatures.3
test_signatures.4
test_signatures.5
test_signatures.6
test_signatures.7
test_signatures.8
test_sigs.ecdsa_p256
test_sigs.ecdsa_p384
test_sigs.ed25519 - Support for openssl EVP_DigestVerify. 2017-05-30 12:28:25 +00:00
test_sigs.gost
test_sigs.hinfo
test_sigs.revoked
test_sigs.rsasha256
test_sigs.rsasha256_draft
test_sigs.rsasha512_draft
test_sigs.sha1_and_256
trust_cname_chain.rpl
ttl_max.rpl
ttl_min.rpl
ttl_msg.rpl
val_adbit.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_adcopy.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_anchor_nx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_anchor_nx_nosig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ans_dsent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ans_nx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_any.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_any_cname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_any_dname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cname_loop1.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cname_loop2.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cname_loop3.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnameinsectopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamenx_dblnsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamenx_rcodenx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnameqtype.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametocloser.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametocloser_nosig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametocnamewctoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametodname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametodnametocnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametoinsecure.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonodata_nonsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametonx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametooptin.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametooptout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametoposnowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnametoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamewctonodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamewctonx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_cnamewctoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_deleg_nons.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnametoolong.rpl Fixup validation test; the YXDOMAIN is returned and the DNAME. 2017-03-13 08:29:08 +00:00
val_dnametopos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnametoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_dnamewc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_afterprime.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_cname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_cnamesub.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_gost.crpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_gost_downgrade.crpl - harden algo downgrade also makes unbound more lenient about digest 2017-04-10 13:38:50 +00:00
val_ds_sha2.crpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ds_sha2_downgrade.crpl - harden algo downgrade also makes unbound more lenient about digest 2017-04-10 13:38:50 +00:00
val_ds_sha2_lenient.crpl - harden algo downgrade also makes unbound more lenient about digest 2017-04-10 13:38:50 +00:00
val_dsnsec.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_entds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_faildnskey.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_faildnskey_ok.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_fwdds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_keyprefetch.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_keyprefetch_verify.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_mal_wc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_negcache_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_negcache_dssoa.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_noadwhennodo.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_ent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_entnx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_entwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_failsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_hasdata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodata_zonecut.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc_badce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nodatawc_one.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nokeyprime.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror_noce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror_nonc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b1_nameerror_nowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b2_nodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b2_nodata_nons.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout_noce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b3_optout_nonc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b4_wild.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b4_wild_wr.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata_noce.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata_nonc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b5_wcnodata_nowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b21_nodataent.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_b21_nodataent_wr.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cname_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cname_par.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cname_sub.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_cnametocnamewctoposwc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_entnodata_optout.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_entnodata_optout_badopt.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_entnodata_optout_match.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_iter_high.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nodatawccname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_badopt.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_badsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_nods_soa.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_optout_ad.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_optout_cache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_wcany.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nsec3_wcany_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nowc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nsec3_collision.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_nsec3_params.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_nx_overreach.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_pos_truncns.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive_nosigs.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive_wc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_positive_wc_nodeny.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_qds_badanc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_qds_oneanc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_qds_twoanc.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_refer_unsignadd.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_referd.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_referglue.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_rrsig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_secds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_secds_nosig.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_spurious_ns.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_stub_noroot.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_stubds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_dnskey.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_dnskey_dp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_missing.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_ta_algo_missing_dp.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_twocname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unalgo_anchor.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unalgo_dlv.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unalgo_ds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsec_cname.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsecds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsecds_negcache.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_unsecds_qtypeds.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
val_wild_pos.rpl - --disable-sha1 disables SHA1 support in RRSIG, so from DNSKEY and 2017-03-09 13:18:08 +00:00
version_bind.rpl
version_bind_hide.rpl
views.rpl Added views functionality. 2016-10-05 09:36:25 +00:00