From: Bert Hubert Date: Mon, 7 Feb 2011 09:33:20 +0000 (+0000) Subject: improve secure-zone output when no dnssec capable backend was loaded X-Git-Tag: auth-3.0~263 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=49449751af0000e9884c3d37c9c30f73f34ade28;p=pdns improve secure-zone output when no dnssec capable backend was loaded fix verify-crypto so it actually does that again add dead code to implement a remote signing-server git-svn-id: svn://svn.powerdns.com/pdns/trunk/pdns@1984 d19b8d6e-7fed-0310-83ef-9ca221ded41b --- diff --git a/pdns/pdnssec.cc b/pdns/pdnssec.cc index 15fbc3b88..0ccc9dcd8 100644 --- a/pdns/pdnssec.cc +++ b/pdns/pdnssec.cc @@ -11,6 +11,7 @@ #include "packetcache.hh" #include "zoneparser-tng.hh" #include "signingpipe.hh" + StatBag S; PacketCache PC; @@ -20,6 +21,56 @@ po::variables_map g_vm; string s_programname="pdns"; +#if 0 +void launchSigningService(int fd) +{ + UeberBackend db("key-only"); + DNSSECKeeper dk; + string str; + vector chunk; + uint64_t signatures=0; + while(readLStringFromSocket(fd, str)) + { + if(str.empty()) + break; + chunk=convertDNSRRVectorFromPBString(str); + + addRRSigs(dk, db, "big.aa", chunk); // sucks + + ++signatures; + str=convertDNSRRVectorToPBString(chunk); + writeLStringToSocket(fd, str); + } + cerr<<"Exiting after "< signatures; uint32_t rnd; @@ -257,9 +308,7 @@ void verifyCrypto(const string& zone) } string msg = getMessageForRRSET(qname, rrc, toSign); - DNSCryptoKeyEngine* dpk = DNSCryptoKeyEngine::make(rrc.d_algorithm); - string hash = dpk->sign(msg); - cerr<<"Verify: "<verify(hash, rrc.d_signature)<verify(msg, rrc.d_signature)< 3) ? cmds[3] : "", atoi(cmds[2].c_str())); } else if(cmds[0] == "verify-crypto") { if(cmds.size() != 2) { @@ -483,7 +542,13 @@ try return 0; } - dk.secureZone(zone, 8); + if(!dk.secureZone(zone, 8)) { + cerr<<"No backend was able to secure '"<