3 # Copyright (C) 2010, 2012, 2014 Internet Systems Consortium, Inc. ("ISC")
5 # Permission to use, copy, modify, and/or distribute this software for any
6 # purpose with or without fee is hereby granted, provided that the above
7 # copyright notice and this permission notice appear in all copies.
9 # THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 # REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 # AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 # LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 # OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 # PERFORMANCE OF THIS SOFTWARE.
18 .
$SYSTEMTESTTOP/conf.sh
24 key1
=`$KEYGEN -q -r $RANDFILE -a ECCGOST -n zone $zone`
25 key2
=`$KEYGEN -q -r $RANDFILE -a ECCGOST -n zone -f KSK $zone`
26 $DSFROMKEY -a gost
$key2.key
> dsset-gost
28 cat $infile $key1.key
$key2.key
> $zonefile
30 $SIGNER -P -g -r $RANDFILE -o $zone $zonefile > /dev
/null
2> signer.err ||
cat signer.err
32 # Configure the resolving server with a trusted key.
34 cat $key1.key |
grep -v '^; ' |
$PERL -n -e '
35 local ($dn, $class, $type, $flags, $proto, $alg, @rest) = split;
36 local $key = join("", @rest);
39 "$dn" $flags $proto $alg "$key";
43 cp trusted.conf ..
/ns
2/trusted.conf