and NSD/LDNS.
generate-zone-key {**KSK**,\ **ZSK**} [*ALGORITHM*] [*KEYBITS*]
Generate a ZSK or KSK to stdout with specified algorithm and bits
- and print it on STDOUT. If *ALGORITHM* is not set, RSASHA512 is
+ and print it on STDOUT. If *ALGORITHM* is not set, ECDSA256 is
used. If *KEYBITS* is not set, an appropriate keysize is selected
for *ALGORITHM*. Each ECC-based algorithm supports only one valid
*KEYBITS* value: For ECDSA256 and ED25519, it is 256; for ECDSA384,
cout<<"add-record ZONE NAME TYPE [ttl] content"<<endl;
cout<<" [content..] Add one or more records to ZONE"<<endl;
cout<<"add-zone-key ZONE {zsk|ksk} [BITS] [active|inactive]"<<endl;
- cout<<" [rsasha1|rsasha256|rsasha512|gost|ecdsa256|ecdsa384";
+ cout<<" [rsasha1|rsasha256|rsasha512|ecdsa256|ecdsa384";
#if defined(HAVE_LIBSODIUM) || defined(HAVE_LIBDECAF)
cout<<"|ed25519";
#endif
}
else if(cmds[0] == "add-zone-key") {
if(cmds.size() < 3 ) {
- cerr << "Syntax: pdnsutil add-zone-key ZONE zsk|ksk [BITS] [active|inactive] [rsasha1|rsasha256|rsasha512|gost|ecdsa256|ecdsa384]"<<endl;
+ cerr << "Syntax: pdnsutil add-zone-key ZONE zsk|ksk [BITS] [active|inactive] [rsasha1|rsasha256|rsasha512|ecdsa256|ecdsa384";
+#if defined(HAVE_LIBSODIUM) || defined(HAVE_LIBDECAF)
+ cerr << "|ed25519";
+#endif
+#ifdef HAVE_LIBDECAF
+ cerr << "|ed448";
+#endif
+ cerr << "]"<<endl;
return 0;
}
DNSName zone(cmds[1]);
}
else if(cmds[0] == "generate-zone-key") {
if(cmds.size() < 2 ) {
- cerr << "Syntax: pdnsutil generate-zone-key zsk|ksk [rsasha1|rsasha256|rsasha512|gost|ecdsa256|ecdsa384] [bits]"<<endl;
+ cerr << "Syntax: pdnsutil generate-zone-key zsk|ksk [rsasha1|rsasha256|rsasha512|ecdsa256|ecdsa384";
+#if defined(HAVE_LIBSODIUM) || defined(HAVE_LIBDECAF)
+ cerr << "|ed25519";
+#endif
+#ifdef HAVE_LIBDECAF
+ cerr << "|ed448";
+#endif
+ cerr << "] [bits]"<<endl;
return 0;
}
// need to get algorithm, bits & ksk or zsk from commandline
if(bits)
cerr<<"Requesting specific key size of "<<bits<<" bits"<<endl;
- DNSSECPrivateKey dspk;
- shared_ptr<DNSCryptoKeyEngine> dpk(DNSCryptoKeyEngine::make(algorithm)); // defaults to RSA for now, could be smart w/algorithm! XXX FIXME
+ DNSSECPrivateKey dspk;
+ shared_ptr<DNSCryptoKeyEngine> dpk(DNSCryptoKeyEngine::make(algorithm));
if(!bits) {
if(algorithm <= 10)
bits = keyOrZone ? 2048 : 1024;