Document them as having been removed.
Fixes: #16554
Signed-off-by: Miod Vallat <miod.vallat@powerdns.com>
``entropy-source``
------------------
+.. versionchanged:: 4.9.0
+
+This setting is no longer used from 4.9.0 onwards.
+
- Path
- Default: /dev/urandom
``rng``
-------
+.. versionchanged:: 4.9.0
+
+This setting is no longer used from 4.9.0 onwards.
+
- String
- Default: auto
::arg().set("max-packet-cache-entries", "Maximum number of entries in the packet cache") = "1000000";
::arg().set("max-signature-cache-entries", "Maximum number of signatures cache entries") = "";
::arg().set("max-ent-entries", "Maximum number of empty non-terminals in a zone") = "100000";
- ::arg().set("entropy-source", "If set, read entropy from this file") = "/dev/urandom";
::arg().set("lua-prequery-script", "Lua script with prequery handler (DO NOT USE)") = "";
::arg().set("lua-dnsupdate-policy-script", "Lua script with DNS update policy handler") = "";
::arg().setSwitch("consistent-backends", "Assume individual zones are not divided over backends. Send only ANY lookup operations to the backend to reduce the number of lookups") = "yes";
- ::arg().set("rng", "Specify the random number generator to use. Valid values are auto,sodium,openssl,getrandom,arc4random,urandom.") = "auto";
-
::arg().set("default-catalog-zone", "Catalog zone to assign newly created primary zones (via the API) to") = "";
#ifdef ENABLE_GSS_TSIG
int main(int argc, char** argv)
try
{
- ::arg().set("rng", "Specify random number generator to use. Valid values are auto,sodium,openssl,getrandom,arc4random,urandom.")="auto";
- ::arg().set("entropy-source", "If set, read entropy from this file")="/dev/urandom";
-
po::options_description desc("Allowed options");
desc.add_options()
("help,h", "produce help message")
try
{
set<ComboAddress> addrs;
- ::arg().set("rng")="auto";
- ::arg().set("entropy-source")="/dev/urandom";
for(int n=1 ; n < argc; ++n) {
if ((string) argv[n] == "--help") {
::arg().set("default-soa-edit-signed","Default SOA-EDIT value for signed zones")="";
::arg().set("max-ent-entries", "Maximum number of empty non-terminals in a zone")="100000";
::arg().set("module-dir","Default directory for modules")=PKGLIBDIR;
- ::arg().set("entropy-source", "If set, read entropy from this file")="/dev/urandom";
::arg().setSwitch("query-logging","Hint backends that queries should be logged")="no";
::arg().set("loglevel","Amount of logging. Higher is more.")="3";
::arg().setSwitch("direct-dnskey","Fetch DNSKEY, CDS and CDNSKEY RRs from backend during DNSKEY or CDS/CDNSKEY synthesis")="no";
::arg().set("max-nsec3-iterations","Limit the number of NSEC3 hash iterations")="500"; // RFC5155 10.3
::arg().set("max-signature-cache-entries", "Maximum number of signatures cache entries")="";
- ::arg().set("rng", "Specify random number generator to use. Valid values are auto,sodium,openssl,getrandom,arc4random,urandom.")="auto";
::arg().set("max-generate-steps", "Maximum number of $GENERATE steps when loading a zone from a file")="0";
::arg().set("max-include-depth", "Maximum nested $INCLUDE depth when loading a zone from a file")="20";
::arg().setSwitch("upgrade-unknown-types","Transparently upgrade known TYPExxx records. Recommended to keep off, except for PowerDNS upgrades until data sources are cleaned up")="no";
struct RndSpeedTest
{
- explicit RndSpeedTest(std::string which) : name(which){
- ::arg().set("entropy-source", "If set, read entropy from this file")="/dev/urandom";
- ::arg().set("rng", "") = which;
- }
string getName() const
{
- return "Random test " + name;
+ return "Random test arc4random";
}
void operator()() const
{
dns_random_uint16();
}
-
- const std::string name;
};
struct CredentialsVerifyTest
doRun(UUIDGenTest());
-#if defined(HAVE_GETRANDOM)
- doRun(RndSpeedTest("getrandom"));
-#endif
-#if defined(HAVE_ARC4RANDOM)
- doRun(RndSpeedTest("arc4random"));
-#endif
-#if defined(HAVE_RANDOMBYTES_STIR)
- doRun(RndSpeedTest("sodium"));
-#endif
-#if defined(HAVE_RAND_BYTES)
- doRun(RndSpeedTest("openssl"));
-#endif
- doRun(RndSpeedTest("urandom"));
+ doRun(RndSpeedTest());
doRun(NSEC3HashTest(1, "ABCD"));
doRun(NSEC3HashTest(10, "ABCD"));
BOOST_AUTO_TEST_SUITE(test_dns_random_hh)
-const std::vector<string> rndSources = {
- "auto",
- "urandom",
-#if defined(HAVE_GETRANDOM)
- "getrandom",
-#endif
-#if defined(HAVE_ARC4RANDOM)
- "arc4random",
-#endif
-#if defined(HAVE_RANDOMBYTES_STIR)
- "sodium",
-#endif
-#if defined(HAVE_RAND_BYTES)
- "openssl",
-#endif
-#if defined(HAVE_KISS_RNG)
- "kiss",
-#endif
-};
-
-BOOST_AUTO_TEST_CASE(test_dns_random_garbage)
-{
- ::arg().set("rng") = "garbage";
- ::arg().set("entropy-source") = "/dev/urandom";
-}
-
BOOST_AUTO_TEST_CASE(test_dns_random_upper_bound)
{
- ::arg().set("rng") = "auto";
- ::arg().set("entropy-source") = "/dev/urandom";
-
map<unsigned int, bool> seen;
for (unsigned int iteration = 0; iteration < 100000; ++iteration) {
seen[dns_random(10)] = true;
BOOST_CHECK_EQUAL(seen[10], false);
}
-static void test_dns_random_avg(const string& source)
+BOOST_AUTO_TEST_CASE(test_dns_random_average)
{
- ::arg().set("rng") = source;
- ::arg().set("entropy-source") = "/dev/urandom";
-
acc_t acc;
for (unsigned int iteration = 0; iteration < 100000; ++iteration) {
// please add covariance tests, chi-square, Kolmogorov-Smirnov
}
-static void test_dns_random_uint32_avg(const string& source)
+BOOST_AUTO_TEST_CASE(test_dns_random_uint32_average)
{
- ::arg().set("rng") = source;
- ::arg().set("entropy-source") = "/dev/urandom";
-
acc_t acc;
for (unsigned int iteration = 0; iteration < 100000; ++iteration) {
// please add covariance tests, chi-square, Kolmogorov-Smirnov
}
-BOOST_AUTO_TEST_CASE(test_dns_random_average)
-{
- for (const auto& source : rndSources) {
- test_dns_random_avg(source);
- }
-}
-
-BOOST_AUTO_TEST_CASE(test_dns_random_uint32_average)
-{
- for (const auto& source : rndSources) {
- test_dns_random_uint32_avg(source);
- }
-}
-
BOOST_AUTO_TEST_SUITE_END()