mirror of
https://github.com/isc-projects/bind9.git
synced 2026-02-26 11:32:01 -05:00
264 lines
6.9 KiB
C
264 lines
6.9 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
/* $Id$ */
|
|
|
|
#include <config.h>
|
|
|
|
#if defined(OPENSSL) || defined(PKCS11CRYPTO)
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <isc/buffer.h>
|
|
#include <isc/entropy.h>
|
|
#include <isc/mem.h>
|
|
#include <isc/platform.h>
|
|
#include <isc/print.h>
|
|
#include <isc/region.h>
|
|
#include <isc/stdio.h>
|
|
#include <isc/string.h>
|
|
#include <isc/util.h>
|
|
|
|
#define DST_KEY_INTERNAL
|
|
|
|
#include <dns/dnssec.h>
|
|
#include <dns/fixedname.h>
|
|
#include <dns/keyvalues.h>
|
|
#include <dns/log.h>
|
|
#include <dns/name.h>
|
|
#include <dns/rdataclass.h>
|
|
#include <dns/result.h>
|
|
#include <dns/secalg.h>
|
|
|
|
#include <dst/dst.h>
|
|
#include <dst/result.h>
|
|
|
|
#ifdef OPENSSL
|
|
#include <openssl/opensslv.h>
|
|
#if OPENSSL_VERSION_NUMBER <= 0x00908000L
|
|
#define USE_FIX_KEY_FILES
|
|
#endif
|
|
#else
|
|
#define USE_FIX_KEY_FILES
|
|
#endif
|
|
|
|
#ifdef USE_FIX_KEY_FILES
|
|
|
|
/*
|
|
* Use a fixed key file pair if OpenSSL doesn't support > 32 bit exponents.
|
|
*/
|
|
|
|
int
|
|
main(int argc, char **argv) {
|
|
FILE *fp;
|
|
|
|
UNUSED(argc);
|
|
UNUSED(argv);
|
|
|
|
fp = fopen("Kexample.+005+10264.private", "w");
|
|
if (fp == NULL) {
|
|
perror("fopen(Kexample.+005+10264.private)");
|
|
exit(1);
|
|
}
|
|
|
|
fputs("Private-key-format: v1.3\n", fp);
|
|
fputs("Algorithm: 5 (RSASHA1)\n", fp);
|
|
fputs("Modulus: yhNbLRPA7VpLCXcgMvBwsfe7taVaTvLPY3AI+YolKwqD6"
|
|
"/3nLlCcz4kBOTOkQBf9bmO98WnKuOWoxuEOgudoDvQOzXNl9RJtt61"
|
|
"IRMscAlsVtTIfAjPLhcGy32l2s5VYWWVXx/qkcf+i/JC38YXIuVdiA"
|
|
"MtbgQV40ffM4lAbZ7M=\n", fp);
|
|
fputs("PublicExponent: AQAAAAAAAQ==\n", fp);
|
|
fputs("PrivateExponent: gfXvioazoFIJp3/H2kJncrRZaqjIf9+21CL1i"
|
|
"XecBOof03er8ym5AKopZQM8ie+qxvhDkIJ8YDrB7UbDxmFpPceHWYM"
|
|
"X0vDWQCIiEiKzRfCsBOjgJu6HS15G/oZDqDwKat+yegtzxhg48BCPq"
|
|
"zfHLXXUvBTA/HK/u8L1LwggqHk=\n", fp);
|
|
fputs("Prime1: 7xAPHsNnS0w7CoEnIQiu+SrmHsy86HKJOEm9FiQybRVCwf"
|
|
"h4ZRQl+Z9mUbb9skjPvkM6ZeuzXTFkOjdck2y1NQ==\n", fp);
|
|
fputs("Prime2: 2GRzzqyRR2gfITPug8Rddxt647/2DrAuKricX/AXyGcuHM"
|
|
"vTZ+v+mfgJn6TFqSn4SBF2zHJ876lWbQ+12aNORw==\n", fp);
|
|
fputs("Exponent1: PnGTwxiT59N/Rq/FSAwcwoAudiF/X3iK0X09j9Dl8cY"
|
|
"DYAJ0bhB9es1LIaSsgLSER2b1kHbCp+FQXGVHJeZ07Q==\n", fp);
|
|
fputs("Exponent2: Ui+zxA/zbnUSYnz+wdbrfBD2aTeKytZG4ASI3oPDZag"
|
|
"V9YC0eZRPjI82KQcFXoj1b/fV/HzT9/9rhU4mvCGjLw==\n", fp);
|
|
fputs("Coefficient: sdCL6AdOaCr9c+RO8NCA492MOT9w7K9d/HauC+fif"
|
|
"2iWN36dA+BCKaeldS/+6ZTnV2ZVyVFQTeLJM8hplxDBwQ==\n", fp);
|
|
|
|
if (fclose(fp) != 0) {
|
|
perror("fclose(Kexample.+005+10264.private)");
|
|
exit(1);
|
|
}
|
|
|
|
fp = fopen("Kexample.+005+10264.key", "w");
|
|
if (fp == NULL) {
|
|
perror("fopen(Kexample.+005+10264.key)");
|
|
exit(1);
|
|
}
|
|
|
|
fputs("; This is a zone-signing key, keyid 10264, for example.\n", fp);
|
|
fputs("example. IN DNSKEY 256 3 5 BwEAAAAAAAHKE1stE8DtWksJdyA"
|
|
"y8HCx97u1pVpO8s9jcAj5iiUrCoPr /ecuUJzPiQE5M6RAF/1uY73x"
|
|
"acq45ajG4Q6C52gO9A7Nc2X1Em23rUhE yxwCWxW1Mh8CM8uFwbLfaX"
|
|
"azlVhZZVfH+qRx/6L8kLfxhci5V2IAy1uB BXjR98ziUBtnsw==\n", fp);
|
|
|
|
if (fclose(fp) != 0) {
|
|
perror("close(Kexample.+005+10264.key)");
|
|
exit(1);
|
|
}
|
|
|
|
return(0);
|
|
}
|
|
#else
|
|
#include <openssl/err.h>
|
|
#include <openssl/objects.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/evp.h>
|
|
|
|
dst_key_t *key;
|
|
dns_fixedname_t fname;
|
|
dns_name_t *name;
|
|
unsigned int bits = 1024U;
|
|
isc_entropy_t *ectx;
|
|
isc_entropysource_t *source;
|
|
isc_mem_t *mctx;
|
|
isc_log_t *log_;
|
|
isc_logconfig_t *logconfig;
|
|
int level = ISC_LOG_WARNING;
|
|
isc_logdestination_t destination;
|
|
char filename[255];
|
|
isc_result_t result;
|
|
isc_buffer_t buf;
|
|
RSA *rsa;
|
|
BIGNUM *e;
|
|
EVP_PKEY *pkey;
|
|
|
|
#define CHECK(op, msg) \
|
|
do { result = (op); \
|
|
if (result != ISC_R_SUCCESS) { \
|
|
fprintf(stderr, \
|
|
"fatal error: %s returns %s at file %s line %d\n", \
|
|
msg, isc_result_totext(result), __FILE__, __LINE__); \
|
|
exit(1); \
|
|
} \
|
|
} while (0)
|
|
|
|
int
|
|
main(int argc, char **argv) {
|
|
UNUSED(argc);
|
|
UNUSED(argv);
|
|
|
|
rsa = RSA_new();
|
|
e = BN_new();
|
|
pkey = EVP_PKEY_new();
|
|
|
|
if ((rsa == NULL) || (e == NULL) || (pkey == NULL) ||
|
|
!EVP_PKEY_set1_RSA(pkey, rsa)) {
|
|
fprintf(stderr, "fatal error: basic OpenSSL failure\n");
|
|
exit(1);
|
|
}
|
|
|
|
/* e = 0x1000000000001 */
|
|
BN_set_bit(e, 0);
|
|
BN_set_bit(e, 48);
|
|
|
|
if (RSA_generate_key_ex(rsa, bits, e, NULL)) {
|
|
BN_free(e);
|
|
RSA_free(rsa);
|
|
} else {
|
|
fprintf(stderr,
|
|
"fatal error: RSA_generate_key_ex() fails "
|
|
"at file %s line %d\n",
|
|
__FILE__, __LINE__);
|
|
exit(1);
|
|
}
|
|
|
|
dns_result_register();
|
|
|
|
CHECK(isc_mem_create(0, 0, &mctx), "isc_mem_create()");
|
|
CHECK(isc_entropy_create(mctx, &ectx), "isc_entropy_create()");
|
|
#ifdef ISC_PLATFORM_CRYPTORANDOM
|
|
isc_entropy_usehook(ectx, ISC_TRUE);
|
|
#endif
|
|
CHECK(isc_entropy_usebestsource(ectx, &source,
|
|
"../random.data",
|
|
ISC_ENTROPY_KEYBOARDNO),
|
|
"isc_entropy_usebestsource(\"../random.data\")");
|
|
CHECK(dst_lib_init2(mctx, ectx, NULL, 0), "dst_lib_init2()");
|
|
CHECK(isc_log_create(mctx, &log_, &logconfig), "isc_log_create()");
|
|
isc_log_setcontext(log_);
|
|
dns_log_init(log_);
|
|
dns_log_setcontext(log_);
|
|
CHECK(isc_log_settag(logconfig, "bigkey"), "isc_log_settag()");
|
|
destination.file.stream = stderr;
|
|
destination.file.name = NULL;
|
|
destination.file.versions = ISC_LOG_ROLLNEVER;
|
|
destination.file.maximum_size = 0;
|
|
CHECK(isc_log_createchannel(logconfig, "stderr",
|
|
ISC_LOG_TOFILEDESC,
|
|
level,
|
|
&destination,
|
|
ISC_LOG_PRINTTAG | ISC_LOG_PRINTLEVEL),
|
|
"isc_log_createchannel()");
|
|
CHECK(isc_log_usechannel(logconfig, "stderr", NULL, NULL),
|
|
"isc_log_usechannel()");
|
|
dns_fixedname_init(&fname);
|
|
name = dns_fixedname_name(&fname);
|
|
isc_buffer_constinit(&buf, "example.", strlen("example."));
|
|
isc_buffer_add(&buf, strlen("example."));
|
|
CHECK(dns_name_fromtext(name, &buf, dns_rootname, 0, NULL),
|
|
"dns_name_fromtext(\"example.\")");
|
|
|
|
CHECK(dst_key_buildinternal(name, DNS_KEYALG_RSASHA1,
|
|
bits, DNS_KEYOWNER_ZONE,
|
|
DNS_KEYPROTO_DNSSEC, dns_rdataclass_in,
|
|
pkey, mctx, &key),
|
|
"dst_key_buildinternal(...)");
|
|
|
|
CHECK(dst_key_tofile(key, DST_TYPE_PRIVATE | DST_TYPE_PUBLIC, NULL),
|
|
"dst_key_tofile()");
|
|
isc_buffer_init(&buf, filename, sizeof(filename) - 1);
|
|
isc_buffer_clear(&buf);
|
|
CHECK(dst_key_buildfilename(key, 0, NULL, &buf),
|
|
"dst_key_buildfilename()");
|
|
printf("%s\n", filename);
|
|
dst_key_free(&key);
|
|
|
|
isc_log_destroy(&log_);
|
|
isc_log_setcontext(NULL);
|
|
dns_log_setcontext(NULL);
|
|
if (source != NULL)
|
|
isc_entropy_destroysource(&source);
|
|
isc_entropy_detach(&ectx);
|
|
dst_lib_destroy();
|
|
dns_name_destroy();
|
|
isc_mem_destroy(&mctx);
|
|
return (0);
|
|
}
|
|
#endif
|
|
|
|
#else /* OPENSSL || PKCS11CRYPTO */
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <isc/util.h>
|
|
|
|
int
|
|
main(int argc, char **argv) {
|
|
UNUSED(argc);
|
|
UNUSED(argv);
|
|
fprintf(stderr, "Compiled without Crypto\n");
|
|
exit(1);
|
|
}
|
|
|
|
#endif /* OPENSSL || PKCS11CRYPTO */
|
|
/*! \file */
|