From cd2565d4e93404b0626df05ece8a4dab3a6a4d1f Mon Sep 17 00:00:00 2001 From: Matt Nordhoff Date: Fri, 30 Nov 2018 14:06:08 +0000 Subject: [PATCH] pdnsutil documentation ECC algorithm updates * generate-zone-key's default algorithm has changed to ECDSA256 * Remove GOST from and add EdDSA to {add,generate}-zone-key usage messages * Remove an old comment --- docs/manpages/pdnsutil.1.rst | 2 +- pdns/pdnsutil.cc | 24 +++++++++++++++++++----- 2 files changed, 20 insertions(+), 6 deletions(-) diff --git a/docs/manpages/pdnsutil.1.rst b/docs/manpages/pdnsutil.1.rst index 1d1fcbf2a3..32fe17865b 100644 --- a/docs/manpages/pdnsutil.1.rst +++ b/docs/manpages/pdnsutil.1.rst @@ -68,7 +68,7 @@ export-zone-key *ZONE* *KEY-ID* and NSD/LDNS. generate-zone-key {**KSK**,\ **ZSK**} [*ALGORITHM*] [*KEYBITS*] Generate a ZSK or KSK to stdout with specified algorithm and bits - and print it on STDOUT. If *ALGORITHM* is not set, RSASHA512 is + and print it on STDOUT. If *ALGORITHM* is not set, ECDSA256 is used. If *KEYBITS* is not set, an appropriate keysize is selected for *ALGORITHM*. Each ECC-based algorithm supports only one valid *KEYBITS* value: For ECDSA256 and ED25519, it is 256; for ECDSA384, diff --git a/pdns/pdnsutil.cc b/pdns/pdnsutil.cc index e7059908e4..0a152049e9 100644 --- a/pdns/pdnsutil.cc +++ b/pdns/pdnsutil.cc @@ -1905,7 +1905,7 @@ try cout<<"add-record ZONE NAME TYPE [ttl] content"< dpk(DNSCryptoKeyEngine::make(algorithm)); // defaults to RSA for now, could be smart w/algorithm! XXX FIXME + DNSSECPrivateKey dspk; + shared_ptr dpk(DNSCryptoKeyEngine::make(algorithm)); if(!bits) { if(algorithm <= 10) bits = keyOrZone ? 2048 : 1024; -- 2.47.2