HomeSort by: relevance | last modified time | path
    Searched refs:rsasha1 (Results 1 - 13 of 13) sorted by relevancy

  /src/external/mpl/bind/dist/bin/tests/system/nsec3/ns3/
named-rsasha1.conf.j2 15 {% set rsasha1_to_nsec3 = "rsasha1" if not reconfiged else "nsec3" %}
16 {% set nsec3_to_rsasha1 = "nsec3" if not reconfiged else "rsasha1" %}
18 dnssec-policy "rsasha1" {
20 csk lifetime unlimited algorithm rsasha1;
25 {% if "rsasha1-to-nsec3.kasp" in zones %}
28 * This should work despite the incompatible RSASHA1 algorithm,
31 zone "rsasha1-to-nsec3.kasp" {
33 file "rsasha1-to-nsec3.kasp.db";
36 {% endif %}{# rsasha1-to-nsec3.kasp #}
38 {% if "rsasha1-to-nsec3-wait.kasp" in zones %
    [all...]
setup.sh 38 for zn in nsec3-to-rsasha1 nsec3-to-rsasha1-ds; do
45 for zn in rsasha1-to-nsec3 rsasha1-to-nsec3-wait; do
47 CSK=$($KEYGEN -k "rsasha1" -l named.conf $keytimes $zone 2>keygen.out.$zone)
52 echo_i "skip: skip rsasha1 zones - signing with RSASHA1 not supported"
  /src/external/mpl/bind/dist/bin/tests/system/autosign/ns3/
nsec-only.conf.j2 16 ksk key-directory lifetime unlimited algorithm rsasha1;
17 zsk key-directory lifetime unlimited algorithm rsasha1;
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/ns3/
sign-rsasha1-1024.sh 14 # RSASHA1 is validate only in FIPS mode so we need to have a pre-signed
16 # FIPS build which supports RSASHA1 to be used to generate it.
20 zone=rsasha1-1024.example
21 k1=$("$KEYGEN" -a rsasha1 -b 1024 $zone)
22 k2=$("$KEYGEN" -a rsasha1 -b 1024 -f KSK $zone)
sign-rsasha1.sh 14 # RSASHA1 is validate only in FIPS mode so we need to have a pre-signed
16 # FIPS build which supports RSASHA1 to be used to generate it.
20 zone=rsasha1.example
21 k1=$("$KEYGEN" -a rsasha1 $zone)
22 k2=$("$KEYGEN" -a rsasha1 -f KSK $zone)
sign.sh 714 # Pre-signed zone for FIPS validation of RSASHA1 signed zones
715 # See sign-rsasha1.sh for how to regenerate rsasha1.example.db
720 zone=rsasha1.example
721 zonefile=rsasha1.example.db
725 zone=rsasha1-1024.example
726 zonefile=rsasha1-1024.example.db
  /src/external/mpl/bind/dist/bin/tests/system/checkconf/
bad-kasp-nsec3-alg.conf 16 csk lifetime unlimited algorithm rsasha1;
kasp-bad-nsec3-alg.conf 16 csk lifetime unlimited algorithm rsasha1;
kasp-deprecated.conf 17 csk lifetime unlimited algorithm rsasha1;
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/ns2/
sign.sh 66 dname-at-apex-nsec3 occluded rsasha1 rsasha1-1024 \
  /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/
setup.sh 66 # Set up RSASHA1 based zones
68 for zn in rsasha1 rsasha1-nsec3; do
  /src/external/mpl/bind/dist/bin/tests/system/checkzone/
tests.sh 214 echo_i "Checking for RSASHA1 deprecated warning ($n)"
216 $CHECKZONE example zones/warn.deprecated.rsasha1.db >test.out.$n || ret=1
217 grep "deprecated DNSKEY algorithm found: 5 (RSASHA1)" test.out.$n >/dev/null || ret=1
252 echo_i "Checking for RSASHA1 DS algorithm warning ($n)"
255 grep "zone example/IN: child.example/DS deprecated algorithm 5 (RSASHA1)" test.out.$n >/dev/null || ret=1
261 echo_i "Checking for RSASHA1 KEY algorithm warning ($n)"
264 grep "zone example/IN: example/KEY deprecated algorithm 5 (RSASHA1)" test.out.$n >/dev/null || ret=1
  /src/external/mpl/bind/dist/bin/tests/system/dnssec/
tests.sh 1162 echo_i "checking positive validation RSASHA1 NSEC ($n)"
1164 if $FEATURETEST --rsasha1; then
1165 dig_with_opts +noauth a.rsasha1.example. @10.53.0.3 a >dig.out.ns3.test$n || ret=1
1166 dig_with_opts +noauth a.rsasha1.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
1170 echo_i "skip: RSASHA1 not supported by OS"
1177 echo_i "checking positive validation RSASHA1 (1024 bits) NSEC ($n)"
1179 if $FEATURETEST --rsasha1; then
1180 dig_with_opts +noauth a.rsasha1-1024.example. @10.53.0.3 a >dig.out.ns3.test$n || ret=1
1181 dig_with_opts +noauth a.rsasha1-1024.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1
1185 echo_i "skip: RSASHA1 not supported by OS
    [all...]

Completed in 31 milliseconds