43 ldns_rr *rr, *sig, *dnskey_rr;
47 rrset = ldns_rr_list_new();
49 status = ldns_rr_new_frm_str(&rr,
"example.com. IN A 192.168.0.1", 0, NULL, NULL);
50 if (status == LDNS_STATUS_OK) ldns_rr_list_push_rr(rrset, rr);
52 status = ldns_rr_new_frm_str(&rr,
"example.com. IN A 192.168.0.2", 0, NULL, NULL);
53 if (status == LDNS_STATUS_OK) ldns_rr_list_push_rr(rrset, rr);
57 sign_params->
owner = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME,
"example.com.");
59 sign_params->
keytag = ldns_calc_keytag(dnskey_rr);
69 ldns_rr_list_deep_free(rrset);
71 ldns_rr_free(dnskey_rr);
82 unsigned char rnd_buf[1024];
86 printf(
"Generating %lu bytes of random data... ",
87 (
unsigned long)
sizeof(rnd_buf));
90 printf(
"Failed, error: %d\n", result);
97 printf(
"Generating 32-bit random data... ");
101 printf(
"Generating 64-bit random data... ");
103 printf(
"%llu\n", (
long long unsigned int)r64);
112 const unsigned int rsa_keysizes[] = { 512, 768, 1024, 1536, 2048, 4096 };
113 const unsigned int dsa_keysizes[] = { 512, 768, 1024 };
114 unsigned int keysize;
130 for (i=0; i<(
sizeof(rsa_keysizes)/
sizeof(
unsigned int)); i++) {
131 keysize = rsa_keysizes[i];
133 printf(
"Generating %d-bit RSA key... ", keysize);
145 printf(
"Extracting key identifier... ");
153 printf(
"OK, %s\n",
id);
157 printf(
"Signing (RSA/SHA1) with key... ");
158 result = hsm_test_sign(ctx, key, LDNS_RSASHA1);
161 printf(
"Failed, error: %d\n", result);
167 printf(
"Signing (RSA/SHA256) with key... ");
168 result = hsm_test_sign(ctx, key, LDNS_RSASHA256);
171 printf(
"Failed, error: %d\n", result);
177 if ( keysize >= 1024) {
178 printf(
"Signing (RSA/SHA512) with key... ");
179 result = hsm_test_sign(ctx, key, LDNS_RSASHA512);
182 printf(
"Failed, error: %d\n", result);
189 printf(
"Deleting key... ");
193 printf(
"Failed: error: %d\n", result);
207 for (i=0; i<(
sizeof(dsa_keysizes)/
sizeof(
unsigned int)); i++) {
208 keysize = dsa_keysizes[i];
210 printf(
"Generating %d-bit DSA key... ", keysize);
222 printf(
"Extracting key identifier... ");
230 printf(
"OK, %s\n",
id);
234 printf(
"Signing (DSA/SHA1) with key... ");
235 result = hsm_test_sign(ctx, key, LDNS_DSA);
238 printf(
"Failed, error: %d\n", result);
244 printf(
"Deleting key... ");
248 printf(
"Failed: error: %d\n", result);
262 for (i=0; i<1; i++) {
263 printf(
"Generating 512-bit GOST key... ");
275 printf(
"Extracting key identifier... ");
283 printf(
"OK, %s\n",
id);
287 printf(
"Signing (GOST) with key... ");
288 result = hsm_test_sign(ctx, key, LDNS_ECC_GOST);
291 printf(
"Failed, error: %d\n", result);
297 printf(
"Deleting key... ");
301 printf(
"Failed: error: %d\n", result);
312 if (hsm_test_random()) {
char * hsm_get_key_id(hsm_ctx_t *ctx, const hsm_key_t *key)
void hsm_sign_params_free(hsm_sign_params_t *params)
uint32_t hsm_random32(hsm_ctx_t *ctx)
int hsm_test(hsm_ctx_t *ctx, const char *repository)
hsm_key_t * hsm_generate_dsa_key(hsm_ctx_t *ctx, const char *repository, unsigned long keysize)
ldns_rr * hsm_get_dnskey(hsm_ctx_t *ctx, const hsm_key_t *key, const hsm_sign_params_t *sign_params)
int hsm_token_attached(hsm_ctx_t *ctx, const char *repository)
hsm_sign_params_t * hsm_sign_params_new()
hsm_key_t * hsm_generate_gost_key(hsm_ctx_t *ctx, const char *repository)
uint64_t hsm_random64(hsm_ctx_t *ctx)
int hsm_remove_key(hsm_ctx_t *ctx, hsm_key_t *key)
int hsm_random_buffer(hsm_ctx_t *ctx, unsigned char *buffer, unsigned long length)
hsm_key_t * hsm_generate_rsa_key(hsm_ctx_t *ctx, const char *repository, unsigned long keysize)
void hsm_print_error(hsm_ctx_t *gctx)
ldns_rr * hsm_sign_rrset(hsm_ctx_t *ctx, const ldns_rr_list *rrset, const hsm_key_t *key, const hsm_sign_params_t *sign_params)