1. 25 Oct, 2018 2 commits
  2. 20 Sep, 2018 1 commit
  3. 22 Aug, 2018 1 commit
    • Štěpán Balážik's avatar
      remove rfc5011.rpl · 192c2691
      Štěpán Balážik authored
      Running this test properly requires faking monotonic timers which breaks other tests. It will be added back once we figure out the way to fake monotonic and wall-clock time separately.
      192c2691
  4. 02 Aug, 2018 11 commits
  5. 27 Jul, 2018 2 commits
  6. 02 Jul, 2018 1 commit
  7. 25 Jun, 2018 3 commits
    • Petr Špaček's avatar
      val_ta_sentinel* tests: extend tests to cover !AD and +CD · d4ffae30
      Petr Špaček authored
      Sentinel must not require AD/DO bits set in the queries otherwise it
      will not work with stubs and web browsers deployed in 2018.
      
      Tests were extended with +CD cases to make sure forwarding
      configurations behave as specified by the draft -14.
      d4ffae30
    • Vladimír Čunát's avatar
      val_ta_sentinel_insecure: fix problem with NTA · 31445c99
      Vladimír Čunát authored
      It didn't work properly due to negative trust anchor being outside a
      zone cut, so I move the tested names to an unsigned zone.
      
      root.db: the only real change was addition of "unsigned." delegation,
      causing root-key-sentinel-not-ta-48409.test. NSEC to get modified.
      The other changes are just reordering and drops of "resign=" lines;
      I'm not sure why dnssec-signzone decided to do such changes.
      (I didn't put the unsigned. zone into any zone file.)
      31445c99
    • Vladimír Čunát's avatar
      becadd39
  8. 10 Apr, 2018 1 commit
  9. 05 Mar, 2018 1 commit
  10. 01 Mar, 2018 1 commit
  11. 15 Feb, 2018 2 commits
  12. 02 Feb, 2018 1 commit
  13. 26 Jan, 2018 1 commit
  14. 22 Jan, 2018 2 commits
  15. 27 Nov, 2017 2 commits
  16. 21 Sep, 2017 1 commit
  17. 23 Aug, 2017 1 commit
  18. 17 Aug, 2017 1 commit
  19. 15 Aug, 2017 3 commits
  20. 02 Aug, 2017 1 commit
  21. 24 Jul, 2017 1 commit
    • Vladimír Čunát's avatar
      resolver/val_unknown_algorithm_insecure: fix with kresd · 0c0b91ee
      Vladimír Čunát authored
      In current kresd implementation, in some cases it requires existence
      of RRSIGs and DNSKEYs even if the zone uses an unknown algorithm.
      There seems no indication that missing those records should be OK for
      some future algorithms, so we fix the test instead of kresd, for now.
      0c0b91ee