X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_26.res;h=e69d6ea5fd8fa86db3eda6a00e51480314560d44;hb=f1200fd1cab4fa57feacd43046997ce2d23edbd5;hp=ae42f75493525a2be774962f1fdf72b4a5e25c70;hpb=bfe528b216abd25cab78d8764a771f1abcc997ec;p=pazpar2-moved-to-github.git
diff --git a/test/test_limit_limitmap_26.res b/test/test_limit_limitmap_26.res
index ae42f75..e69d6ea 100644
--- a/test/test_limit_limitmap_26.res
+++ b/test/test_limit_limitmap_26.res
@@ -1,16 +1,61 @@
-OK
-Target-1
-ztest-db1
-1
-0
-1
-Client_Idle
-
-Target-2
-LOC-SOLR
-0
-0
-0
-Client_Error
-
\ No newline at end of file
+OK
+0
+4
+10
+0
+4
+
+
+Computer science & technology
+proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+1977
+Computer science & technology
+proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+1977
+XXXXXXXXXX
+102165
+content: title computer science technology
+
+
+
+The Computer Bible
+1973-1980
+Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+The Computer Bible
+1973-1980
+Hebrew and Greek; introductions in English
+Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+XXXXXXXXXX
+102165
+content: title the computer bible
+
+
+
+The use of passwords for controlled access to computer resources
+1977
+Wood, Helen M
+The use of passwords for controlled access to computer resources
+1977
+Wood, Helen M
+XXXXXXXXXX
+30649
+content: title the use of passwords for controlled access to computer resources author wood helen m
+
+
+
+Reconstruction tomography in diagnostic radiology and nuclear medicine
+proceedings of the workshop
+1977
+Reconstruction tomography in diagnostic radiology and nuclear medicine
+proceedings of the workshop
+1977
+XXXXXXXXXX
+0
+content: title reconstruction tomography in diagnostic radiology and nuclear medicine
+
+
\ No newline at end of file