|
BEGIN { use_ok( 'Net::DNS::ZoneParse' ) };
my $result = [
superhashof( {
name => 'example.com' ,
class => 'IN' ,
type => 'NSEC3PARAM' ,
iterations => '1' ,
salt => '65535' ,
hashalgo => '1' ,
}),
superhashof( {
name => '0123459678.bar.com' ,
class => 'IN' ,
type => 'NSEC3' ,
hnxtname => 'ED9KM22A8TAMS5U0' ,
iterations => '1' ,
salt => '1234' ,
hashalgo => '1' ,
}),
superhashof( {
name => 'bar.com' ,
class => 'IN' ,
type => 'RRSIG' ,
sig => 'qGgja+/trimmed/Kr=' ,
sigexpiration => '20110720121900' ,
siginception => '20110719111900' ,
algorithm => '5' ,
}),
];
my $pos = tell (DATA);
my @fres = @{ $result }[1..$
SKIP: {
skip "Net::DNS::SEC isn't installed" , 1 if $@;
my $zoneparse = Net::DNS::ZoneParse->new();
my $parsed = $zoneparse ->parse(\ *DATA );
cmp_deeply( $parsed , noclass( $result ), "Parsing NSEC3/NSEC3PARAM with native parser" );
};
|