2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-29 13:38:26 +00:00

Change ksr format

Make the ksr format compatible with knot.
This commit is contained in:
Matthijs Mekking 2023-12-21 11:16:40 +01:00
parent 2bf03ab7df
commit 31521fade2
3 changed files with 101 additions and 66 deletions

View File

@ -24,6 +24,8 @@
#include <dns/fixedname.h> #include <dns/fixedname.h>
#include <dns/keyvalues.h> #include <dns/keyvalues.h>
#include <dns/rdataclass.h> #include <dns/rdataclass.h>
#include <dns/rdatalist.h>
#include <dns/rdataset.h>
#include <dns/time.h> #include <dns/time.h>
#include "dnssectool.h" #include "dnssectool.h"
@ -436,19 +438,34 @@ output:
} }
} }
static void
print_rdata(dns_rdataset_t *rrset) {
isc_buffer_t target;
isc_region_t r;
isc_result_t ret;
char buf[4096];
isc_buffer_init(&target, buf, sizeof(buf));
ret = dns_rdataset_totext(rrset, name, false, false, &target);
if (ret != ISC_R_SUCCESS) {
fatal("failed to print rdata");
}
isc_buffer_usedregion(&target, &r);
fprintf(stdout, "%.*s", (int)r.length, (char *)r.base);
}
static isc_stdtime_t static isc_stdtime_t
print_dnskey(dns_kasp_key_t *kaspkey, dns_ttl_t ttl, dns_dnsseckeylist_t *keys, print_dnskeys(dns_kasp_key_t *kaspkey, dns_ttl_t ttl, dns_dnsseckeylist_t *keys,
isc_stdtime_t inception, isc_stdtime_t *next_inception) { isc_stdtime_t inception, isc_stdtime_t next_inception) {
bool ksk = dns_kasp_key_ksk(kaspkey); bool ksk = dns_kasp_key_ksk(kaspkey);
bool zsk = dns_kasp_key_zsk(kaspkey); bool zsk = dns_kasp_key_zsk(kaspkey);
char algstr[DNS_SECALG_FORMATSIZE]; char algstr[DNS_SECALG_FORMATSIZE];
char classstr[10];
char keystr[DST_KEY_MAXSIZE];
char pubstr[DST_KEY_MAXTEXTSIZE];
char rolestr[4]; char rolestr[4];
char timestr[26]; /* Minimal buf as per ctime_r() spec. */ char timestr[26]; /* Minimal buf as per ctime_r() spec. */
dst_key_t *key = NULL; dns_rdatalist_t *rdatalist = NULL;
isc_stdtime_t next_bundle = *next_inception; dns_rdataset_t rdataset = DNS_RDATASET_INIT;
isc_result_t ret = ISC_R_SUCCESS;
isc_stdtime_t next_bundle = next_inception;
isc_stdtime_tostring(inception, timestr, sizeof(timestr)); isc_stdtime_tostring(inception, timestr, sizeof(timestr));
dns_secalg_format(dns_kasp_key_algorithm(kaspkey), algstr, dns_secalg_format(dns_kasp_key_algorithm(kaspkey), algstr,
@ -462,15 +479,14 @@ print_dnskey(dns_kasp_key_t *kaspkey, dns_ttl_t ttl, dns_dnsseckeylist_t *keys,
} }
/* Fetch matching key pair. */ /* Fetch matching key pair. */
rdatalist = isc_mem_get(mctx, sizeof(*rdatalist));
dns_rdatalist_init(rdatalist);
rdatalist->rdclass = dns_rdataclass_in;
rdatalist->type = dns_rdatatype_dnskey;
rdatalist->ttl = ttl;
for (dns_dnsseckey_t *dk = ISC_LIST_HEAD(*keys); dk != NULL; for (dns_dnsseckey_t *dk = ISC_LIST_HEAD(*keys); dk != NULL;
dk = ISC_LIST_NEXT(dk, link)) dk = ISC_LIST_NEXT(dk, link))
{ {
dns_rdata_t rdata = DNS_RDATA_INIT;
isc_buffer_t classbuf;
isc_buffer_t keybuf;
isc_buffer_t pubbuf;
isc_region_t r;
isc_result_t ret;
isc_stdtime_t pub = 0, del = 0; isc_stdtime_t pub = 0, del = 0;
(void)dst_key_gettime(dk->key, DST_TIME_PUBLISH, &pub); (void)dst_key_gettime(dk->key, DST_TIME_PUBLISH, &pub);
@ -493,47 +509,42 @@ print_dnskey(dns_kasp_key_t *kaspkey, dns_ttl_t ttl, dns_dnsseckeylist_t *keys,
if (del != 0 && inception >= del) { if (del != 0 && inception >= del) {
continue; continue;
} }
/* Found matching key pair. */ /* Found matching key pair, add DNSKEY record to RRset. */
key = dk->key; isc_buffer_t buf;
/* Print DNSKEY record. */ isc_buffer_t *newbuf = NULL;
isc_buffer_init(&classbuf, classstr, sizeof(classstr)); dns_rdata_t *rdata = NULL;
isc_buffer_init(&keybuf, keystr, sizeof(keystr)); isc_region_t r;
isc_buffer_init(&pubbuf, pubstr, sizeof(pubstr)); unsigned char rdatabuf[DST_KEY_MAXSIZE];
CHECK(dst_key_todns(key, &keybuf));
isc_buffer_usedregion(&keybuf, &r); rdata = isc_mem_get(mctx, sizeof(*rdata));
dns_rdata_fromregion(&rdata, dst_key_class(key), dns_rdata_init(rdata);
isc_buffer_init(&buf, rdatabuf, sizeof(rdatabuf));
CHECK(dst_key_todns(dk->key, &buf));
isc_buffer_usedregion(&buf, &r);
isc_buffer_allocate(mctx, &newbuf, r.length);
isc_buffer_putmem(newbuf, r.base, r.length);
isc_buffer_usedregion(newbuf, &r);
dns_rdata_fromregion(rdata, dns_rdataclass_in,
dns_rdatatype_dnskey, &r); dns_rdatatype_dnskey, &r);
CHECK(dns_rdata_totext(&rdata, (dns_name_t *)NULL, &pubbuf)); ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
CHECK(dns_rdataclass_totext(dst_key_class(key), &classbuf));
CHECK(dns_name_print(dst_key_name(key), stdout));
fprintf(stdout, " %u ", ttl);
isc_buffer_usedregion(&classbuf, &r);
if ((unsigned int)fwrite(r.base, 1, r.length, stdout) !=
r.length)
{
goto fail;
}
fprintf(stdout, " DNSKEY ");
isc_buffer_usedregion(&pubbuf, &r);
if ((unsigned int)fwrite(r.base, 1, r.length, stdout) !=
r.length)
{
goto fail;
}
fputc('\n', stdout);
fflush(stdout);
} }
/* No key pair found. */ /* Error if no key pair found. */
if (key == NULL) { if (ISC_LIST_EMPTY(rdatalist->rdata)) {
fatal("no %s/%s %s key pair found for bundle %s", namestr, fatal("no %s/%s %s key pair found for bundle %s", namestr,
algstr, rolestr, timestr); algstr, rolestr, timestr);
} }
return (next_bundle); /* All good, print DNSKEY RRset. */
dns_rdatalist_tordataset(rdatalist, &rdataset);
print_rdata(&rdataset);
fail: fail:
fatal("failed to print %s/%s %s key pair found for bundle %s", namestr, if (ret != ISC_R_SUCCESS) {
algstr, rolestr, timestr); fatal("failed to print %s/%s %s key pair found for bundle %s",
namestr, algstr, rolestr, timestr);
}
return (next_bundle);
} }
static void static void
@ -583,6 +594,7 @@ keygen(ksr_ctx_t *ksr) {
static void static void
request(ksr_ctx_t *ksr) { request(ksr_ctx_t *ksr) {
char timestr[26]; /* Minimal buf as per ctime_r() spec. */
dns_dnsseckeylist_t keys; dns_dnsseckeylist_t keys;
dns_kasp_t *kasp = NULL; dns_kasp_t *kasp = NULL;
isc_stdtime_t next = 0; isc_stdtime_t next = 0;
@ -599,7 +611,6 @@ request(ksr_ctx_t *ksr) {
/* Create request */ /* Create request */
inception = ksr->start; inception = ksr->start;
while (inception <= ksr->end) { while (inception <= ksr->end) {
char timestr[26]; /* Minimal buf as per ctime_r() spec. */
char utc[sizeof("YYYYMMDDHHSSMM")]; char utc[sizeof("YYYYMMDDHHSSMM")];
isc_buffer_t b; isc_buffer_t b;
isc_region_t r; isc_region_t r;
@ -613,8 +624,7 @@ request(ksr_ctx_t *ksr) {
isc_result_totext(ret)); isc_result_totext(ret));
} }
isc_buffer_usedregion(&b, &r); isc_buffer_usedregion(&b, &r);
fprintf(stdout, ";; KeySigningRequest 1.0 %.*s (%s)\n",
fprintf(stdout, ";; KSR %s - bundle %.*s (%s)\n", namestr,
(int)r.length, r.base, timestr); (int)r.length, r.base, timestr);
next = ksr->end + 1; next = ksr->end + 1;
@ -629,11 +639,16 @@ request(ksr_ctx_t *ksr) {
* or withdrawal of a key that is after the current * or withdrawal of a key that is after the current
* inception. * inception.
*/ */
next = print_dnskey(kk, ksr->ttl, &keys, inception, next = print_dnskeys(kk, ksr->ttl, &keys, inception,
&next); next);
} }
inception = next; inception = next;
} }
isc_stdtime_tostring(ksr->now, timestr, sizeof(timestr));
fprintf(stdout, ";; KeySigningRequest generated at %s by %s\n", timestr,
PACKAGE_VERSION);
/* Cleanup */ /* Cleanup */
cleanup(&keys, kasp); cleanup(&keys, kasp);
} }

View File

@ -16,9 +16,11 @@ set -e
rm -f ./*.ksk* rm -f ./*.ksk*
rm -f ./*.zsk* rm -f ./*.zsk*
rm -f ./created.out rm -f ./created.out
rm -f ./footer.*
rm -f ./keygen.out.* rm -f ./keygen.out.*
rm -f ./named.conf rm -f ./named.conf
rm -f ./now.out rm -f ./now.out
rm -rf ./offline
rm -f ./python.out rm -f ./python.out
rm -f ./settime.out.* rm -f ./settime.out.*
rm -f ./K* rm -f ./K*

View File

@ -188,21 +188,26 @@ ksr common -i $now -e +1y request common.test > ksr.request.out.$n 2>&1 || ret=1
# Bundle 1: KSK + ZSK1 # Bundle 1: KSK + ZSK1
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id)
inception=$(cat $key.state | grep "Generated" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Generated" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" > ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" > ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n
# Bundle 2: KSK + ZSK1 + ZSK2 # Bundle 2: KSK + ZSK1 + ZSK2
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk2.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk2.id)
inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
print_dnskeys common.test 1 2 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect print_dnskeys common.test 1 2 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect
# Bundle 3: KSK + ZSK2 # Bundle 3: KSK + ZSK2
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id)
inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n
# Footer
cp ksr.request.expect.$n ksr.request.expect.base
grep ";; KeySigningRequest generated at" ksr.request.out.$n > footer.$n || ret=1
cat footer.$n >> ksr.request.expect.$n
# Check if request output is the same as expected.
diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1 diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1
cp ksr.request.expect.$n ksr.request.expect cp ksr.request.expect.$n ksr.request.expect
test "$ret" -eq 0 || echo_i "failed" test "$ret" -eq 0 || echo_i "failed"
@ -253,7 +258,10 @@ echo_i "check that 'dnssec-ksr request' creates correct KSR if the interval is s
ret=0 ret=0
ksr common -i $now -e +1y request common.test > ksr.request.out.$n 2>&1 || ret=1 ksr common -i $now -e +1y request common.test > ksr.request.out.$n 2>&1 || ret=1
# Same as earlier. # Same as earlier.
diff ksr.request.out.$n ksr.request.expect > /dev/null || ret=1 cp ksr.request.expect.base ksr.request.expect.$n
grep ";; KeySigningRequest generated at" ksr.request.out.$n > footer.$n || ret=1
cat footer.$n >> ksr.request.expect.$n
diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1
test "$ret" -eq 0 || echo_i "failed" test "$ret" -eq 0 || echo_i "failed"
status=$((status+ret)) status=$((status+ret))
@ -261,31 +269,35 @@ n=$((n+1))
echo_i "check that 'dnssec-ksr request' creates correct KSR with new interval ($n)" echo_i "check that 'dnssec-ksr request' creates correct KSR with new interval ($n)"
ret=0 ret=0
ksr common -i $now -e +2y request common.test > ksr.request.out.$n 2>&1 || ret=1 ksr common -i $now -e +2y request common.test > ksr.request.out.$n 2>&1 || ret=1
cp ksr.request.expect ksr.request.expect.$n cp ksr.request.expect.base ksr.request.expect.$n
# Bundle 4: KSK + ZSK2 + ZSK3 # Bundle 4: KSK + ZSK2 + ZSK3
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk3.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk3.id)
inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
print_dnskeys common.test 2 3 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect print_dnskeys common.test 2 3 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect
# Bundle 5: KSK + ZSK3 # Bundle 5: KSK + ZSK3
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk2.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk2.id)
inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk3 >> ksr.request.expect.$n cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk3 >> ksr.request.expect.$n
# Bundle 6: KSK + ZSK3 + ZSK4 # Bundle 6: KSK + ZSK3 + ZSK4
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk4.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk4.id)
inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
print_dnskeys common.test 3 4 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect print_dnskeys common.test 3 4 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect
# Bundle 7: KSK + ZSK4 # Bundle 7: KSK + ZSK4
key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk3.id) key=$(cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk3.id)
inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-)
echo ";; KSR common.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat common.test.ksk1 >> ksr.request.expect.$n cat common.test.ksk1 >> ksr.request.expect.$n
cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk4 >> ksr.request.expect.$n cat common.test.$DEFAULT_ALGORITHM_NUMBER.zsk4 >> ksr.request.expect.$n
# Footer
cp ksr.request.expect.$n ksr.request.expect.base
grep ";; KeySigningRequest generated at" ksr.request.out.$n > footer.$n || ret=1
cat footer.$n >> ksr.request.expect.$n
diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1 diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1
test "$ret" -eq 0 || echo_i "failed" test "$ret" -eq 0 || echo_i "failed"
status=$((status+ret)) status=$((status+ret))
@ -340,9 +352,12 @@ ret=0
ksr unlimited -i $created -e +10y request unlimited.test > ksr.request.out.$n 2>&1 || ret=1 ksr unlimited -i $created -e +10y request unlimited.test > ksr.request.out.$n 2>&1 || ret=1
# Only one bundle: KSK + ZSK # Only one bundle: KSK + ZSK
inception=$(cat $key.state | grep "Generated" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Generated" | cut -d' ' -f 2-)
echo ";; KSR unlimited.test - bundle $inception" > ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" > ksr.request.expect.$n
cat unlimited.test.ksk1 >> ksr.request.expect.$n cat unlimited.test.ksk1 >> ksr.request.expect.$n
cat unlimited.test.$DEFAULT_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n cat unlimited.test.$DEFAULT_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n
# Footer
grep ";; KeySigningRequest generated at" ksr.request.out.$n > footer.$n || ret=1
cat footer.$n >> ksr.request.expect.$n
diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1 diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1
test "$ret" -eq 0 || echo_i "failed" test "$ret" -eq 0 || echo_i "failed"
status=$((status+ret)) status=$((status+ret))
@ -390,7 +405,7 @@ ksr two-tone -i $created -e +6mo request two-tone.test > ksr.request.out.$n 2>&1
# Bundle 1: KSK-A1, KSK-B1, ZSK-A1, ZSK-B1 # Bundle 1: KSK-A1, KSK-B1, ZSK-A1, ZSK-B1
key=$(cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id) key=$(cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id)
inception=$(cat $key.state | grep "Generated" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Generated" | cut -d' ' -f 2-)
echo ";; KSR two-tone.test - bundle $inception" > ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" > ksr.request.expect.$n
cat two-tone.test.ksk1 >> ksr.request.expect.$n cat two-tone.test.ksk1 >> ksr.request.expect.$n
cat two-tone.test.ksk2 >> ksr.request.expect.$n cat two-tone.test.ksk2 >> ksr.request.expect.$n
cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n
@ -398,7 +413,7 @@ cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n
# Bundle 2: KSK-A1, KSK-B1, ZSK-A1 + ZSK-A2, ZSK-B1 # Bundle 2: KSK-A1, KSK-B1, ZSK-A1 + ZSK-A2, ZSK-B1
key=$(cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2.id) key=$(cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2.id)
inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-)
echo ";; KSR two-tone.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat two-tone.test.ksk1 >> ksr.request.expect.$n cat two-tone.test.ksk1 >> ksr.request.expect.$n
cat two-tone.test.ksk2 >> ksr.request.expect.$n cat two-tone.test.ksk2 >> ksr.request.expect.$n
print_dnskeys two-tone.test 1 2 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect.$DEFAULT_ALGORITHM_NUMBER >> ksr.request.expect.$n print_dnskeys two-tone.test 1 2 $DEFAULT_ALGORITHM_NUMBER ksr.keygen.out.expect.$DEFAULT_ALGORITHM_NUMBER >> ksr.request.expect.$n
@ -406,7 +421,7 @@ cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n
# Bundle 3: KSK-A1, KSK-B1, ZSK-A2, ZSK-B1 # Bundle 3: KSK-A1, KSK-B1, ZSK-A2, ZSK-B1
key=$(cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id) key=$(cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk1.id)
inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-)
echo ";; KSR two-tone.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat two-tone.test.ksk1 >> ksr.request.expect.$n cat two-tone.test.ksk1 >> ksr.request.expect.$n
cat two-tone.test.ksk2 >> ksr.request.expect.$n cat two-tone.test.ksk2 >> ksr.request.expect.$n
cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n
@ -414,7 +429,7 @@ cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk1 >> ksr.request.expect.$n
# Bundle 4: KSK-A1, KSK-B1, ZSK-A2, ZSK-B1 + ZSK-B2 # Bundle 4: KSK-A1, KSK-B1, ZSK-A2, ZSK-B1 + ZSK-B2
key=$(cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk2.id) key=$(cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk2.id)
inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Published" | cut -d' ' -f 2-)
echo ";; KSR two-tone.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat two-tone.test.ksk1 >> ksr.request.expect.$n cat two-tone.test.ksk1 >> ksr.request.expect.$n
cat two-tone.test.ksk2 >> ksr.request.expect.$n cat two-tone.test.ksk2 >> ksr.request.expect.$n
cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n
@ -422,11 +437,14 @@ print_dnskeys two-tone.test 1 2 $ALTERNATIVE_ALGORITHM_NUMBER ksr.keygen.out.exp
# Bundle 5: KSK-A1, KSK-B1, ZSK-A2, ZSK-B2 # Bundle 5: KSK-A1, KSK-B1, ZSK-A2, ZSK-B2
key=$(cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk1.id) key=$(cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk1.id)
inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-) inception=$(cat $key.state | grep "Removed" | cut -d' ' -f 2-)
echo ";; KSR two-tone.test - bundle $inception" >> ksr.request.expect.$n echo ";; KeySigningRequest 1.0 $inception" >> ksr.request.expect.$n
cat two-tone.test.ksk1 >> ksr.request.expect.$n cat two-tone.test.ksk1 >> ksr.request.expect.$n
cat two-tone.test.ksk2 >> ksr.request.expect.$n cat two-tone.test.ksk2 >> ksr.request.expect.$n
cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n cat two-tone.test.$DEFAULT_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n
cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n cat two-tone.test.$ALTERNATIVE_ALGORITHM_NUMBER.zsk2 >> ksr.request.expect.$n
# Footer
grep ";; KeySigningRequest generated at" ksr.request.out.$n > footer.$n || ret=1
cat footer.$n >> ksr.request.expect.$n
# Check the KSR request against the expected request. # Check the KSR request against the expected request.
diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1 diff ksr.request.out.$n ksr.request.expect.$n > /dev/null || ret=1
test "$ret" -eq 0 || echo_i "failed" test "$ret" -eq 0 || echo_i "failed"