1#!/bin/sh 
2#
3# Copyright (C) 2009, 2010, 2012  Internet Systems Consortium, Inc. ("ISC")
4#
5# Permission to use, copy, modify, and/or distribute this software for any
6# purpose with or without fee is hereby granted, provided that the above
7# copyright notice and this permission notice appear in all copies.
8#
9# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11# AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15# PERFORMANCE OF THIS SOFTWARE.
16
17# Id: sign.sh,v 1.5 2010/01/07 23:48:53 tbox Exp 
18
19SYSTEMTESTTOP=../..
20. $SYSTEMTESTTOP/conf.sh
21
22RANDFILE=../random.data
23
24zone=.
25infile=root.db.in
26zonefile=root.db
27
28(cd ../ns2 && sh -e sign.sh )
29
30cp ../ns2/dsset-example. .
31cp ../ns2/dsset-example.com. .
32
33keyname1=`$KEYGEN -q -r $RANDFILE -a RSASHA256 -b 1024 -n zone $zone`
34keyname2=`$KEYGEN -q -r $RANDFILE -a RSASHA256 -b 2048 -f KSK -n zone $zone`
35cat $infile $keyname1.key $keyname2.key > $zonefile
36
37$SIGNER -g -r $RANDFILE -o $zone $zonefile > /dev/null 2>&1
38
39# Configure the resolving server with a trusted key.
40
41cat $keyname2.key | grep -v '^; ' | $PERL -n -e '
42local ($dn, $class, $type, $flags, $proto, $alg, @rest) = split;
43local $key = join("", @rest);
44print <<EOF
45trusted-keys {
46    "$dn" $flags $proto $alg "$key";
47};
48EOF
49' > trusted.conf
50cp trusted.conf ../ns2/trusted.conf
51cp trusted.conf ../ns3/trusted.conf
52cp trusted.conf ../ns4/trusted.conf
53