4360. [bug] Silence spurious 'bad key type' message when there is
a existing TSIG key. [RT #42195]
This commit is contained in:
@@ -233,6 +233,15 @@ grep -i "sha1.*TSIG.*NOERROR" dig.out.sha1 > /dev/null || ret=1
|
||||
if [ $ret -eq 1 ] ; then
|
||||
echo "I: failed"; status=1
|
||||
fi
|
||||
|
||||
echo "I:check that multiple dnssec-keygen calls don't emit dns_dnssec_findmatchingkeys warning"
|
||||
ret=0
|
||||
$KEYGEN -a hmac-sha256 -b 128 -n host example.net > keygen.out1 2>&1 || ret=1
|
||||
grep dns_dnssec_findmatchingkeys keygen.out1 > /dev/null && ret=1
|
||||
$KEYGEN -a hmac-sha256 -b 128 -n host example.net > keygen.out2 2>&1 || ret=1
|
||||
grep dns_dnssec_findmatchingkeys keygen.out2 > /dev/null && ret=1
|
||||
if [ $ret -eq 1 ] ; then
|
||||
echo "I: failed"; status=1
|
||||
fi
|
||||
|
||||
exit $status
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user