is also an IPv6 address, additional tests are run when the Exim binary
contains IPv6 support. There are checks in the scripts for a running IPv4
interface; when one is not found, some tests are skipped (with a warning
- message). The local net may not be in 10.0/8 as that is used by the suite.
+ message). The local net may not be in 10.250.0/16 as that is used by the suite.
(9) Exim must be built with TRUSTED_CONFIG_LIST support, so that the test
configs can be placed into it. A suitable file location is .../exim/test/trusted_configs
exim_lock [options] <file name>
This command runs the exim_lock utility with the given options and file name.
-The file remains locked with the following command (normally exim) is obeyed.
+The file remains locked for following commands until a non-daemon "exim"
+completes.
exinext <data>
The following lines, up to a line of four asterisks, are the server's
controlling standard input (described below). These lines are read and
-remembered; during the following commands, until an "exim" command is reached,
-the server is run in parallel.
+remembered; during the following commands, until a non-deamon "exim" command
+is reached, the server is run in parallel. Then the server termination
+is waited for.
write <file name> [nxm[=start-of-line-text]]*
(7) Otherwise, the line is an input line line that is sent to the server. Any
occurrences of \r and \n in the line are turned into carriage return and
linefeed, respectively. This is used for testing PIPELINING.
- Any sequences of \x followed by two hex digits are converted to the equvalent
+ Any sequences of \x followed by two hex digits are converted to the equivalent
byte value. Any other character following a \ is sent verbatim.
The line is sent with a trailing "\r\n".