bind9/bin/tests/system/rsabigexponent
Michal Nowak 7aa33bf5e4
Add README.md file to rsabigexponent system test
This README.md describes why is bigkey needed.

(cherry picked from commit a247f24dfa)
2021-01-29 15:54:07 +01:00
..
conf Remove $Id markers, Principal Author and Reviewed tags from the full source tree 2018-05-11 13:17:46 +02:00
ns1 further tidying of primary/secondary terminology in system tests 2021-01-12 15:21:14 +01:00
ns2 further tidying of primary/secondary terminology in system tests 2021-01-12 15:21:14 +01:00
ns3 remove "dnssec-enable" from all system tests 2019-03-14 23:30:13 -07:00
.gitignore [master] clean up tests, update .gitignore 2013-09-09 19:37:17 -07:00
bigkey.c update all copyright headers to eliminate the typo 2020-09-14 16:50:58 -07:00
clean.sh update all copyright headers to eliminate the typo 2020-09-14 16:50:58 -07:00
Makefile.in Resolve the overlinking of the system libraries 2020-05-11 09:49:54 +02:00
prereq.sh update all copyright headers to eliminate the typo 2020-09-14 16:50:58 -07:00
README.md Add README.md file to rsabigexponent system test 2021-01-29 15:54:07 +01:00
setup.sh update all copyright headers to eliminate the typo 2020-09-14 16:50:58 -07:00
tests.sh update all copyright headers to eliminate the typo 2020-09-14 16:50:58 -07:00

Copyright (C) Internet Systems Consortium, Inc. ("ISC")

See COPYRIGHT in the source root or https://isc.org/copyright.html for terms.

The rsabigexponent test is used to check max-rsa-exponent-size.

We only run this test on builds without PKCS#11, as we have control over the RSA exponent size with plain OpenSSL. We have not explored how to do this with PKCS#11, which would require generating such a key and then signing a zone with it. Additionally, even with control of the exponent size with PKCS#11, generating a DNSKEY with this property and signing such a zone would be slow and undesirable for each test run; instead, we use a pregenerated DNSKEY and a saved signed zone. These are located in rsabigexponent/ns2 and currently use RSASHA1 for the DNSKEY algorithm; however, that may need to be changed in the future.

To generate the DNSKEY used in this test, we used bigkey.c, as dnssec-keygen is not capable of generating such keys.

Do not remove bigkey.c as it may be needed to generate a new DNSKEY for testing purposes.

bigkey is used to both test that we are not running under PKCS#11 and generate a DNSKEY key with a large RSA exponent.