Provided by: dnssec-tools_2.0-1_all bug

NAME

       Net::DNS::SEC::Tools::keyrec - DNSSEC-Tools keyrec file operations

SYNOPSIS

         use Net::DNS::SEC::Tools::keyrec;

         keyrec_creat("localzone.keyrec");
         keyrec_open("localzone.keyrec");  (DEPRECATED)
         $okfile = keyrec_filestat("localzone.keyrec");
         keyrec_read("localzone.keyrec");

         @krnames = keyrec_names();

         $krec = keyrec_fullrec("example.com");
         %keyhash = %$krec;
         $zname = $keyhash{"algorithm"};

         $val = keyrec_recval("example.com","zonefile");

         $exists = keyrec_exists("example.com");

         keyrec_add("zone","example.com",\%zone_krfields);
         keyrec_add("key","Kexample.com.+005+12345",\%keydata);

         keyrec_del("example.com");

         keyrec_setval("zone","example.com","zonefile","db.example.com");

         keyrec_delval("example.com","kskrev");

         @kskpaths = keyrec_keypaths("example.com","kskcur");

         $obsflag = keyrec_revoke_check("Kexample.com.+005+12345");

         $setname = keyrec_signset_newname("example.com");

         keyrec_signset_new($zone,"example-set-21","zskcur");

         keyrec_signset_addkey("example-keys","Kexample.com+005+12345",
                                                "Kexample.com+005+54321");
         keyrec_signset_addkey("example-keys",@keylist);

         keyrec_signset_delkey("example-keys","Kexample.com+005+12345");

         $flag = keyrec_signset_haskey("example-keys","Kexample.com+005+12345");

         keyrec_signset_clear("example-keys","Kexample.com+005+12345");

         @signset = keyrec_signsets();

         $sset_prefix = keyrec_signset_prefix("example.com");

         keyrec_settime("zone","example.com");
         keyrec_settime("set","signing-set-42");
         keyrec_settime("key","Kexample.com.+005+76543");

         @keyfields = keyrec_keyfields();
         @zonefields = keyrec_zonefields();

         keyrec_write();
         keyrec_saveas("filecopy.krf);
         keyrec_close();
         keyrec_discard();

         $current_krf = keyrec_curkrf();
         $default_krf = keyrec_defkrf();

DESCRIPTION

       The Net::DNS::SEC::Tools::keyrec module manipulates the contents of a DNSSEC-Tools keyrec
       file.  keyrec files contain data about zones signed by and keys generated by the DNSSEC-
       Tools programs.  Module interfaces exist for looking up keyrec records, creating new
       records, and modifying existing records.

       A keyrec file is organized in sets of keyrec records.  Each keyrec must be either of key
       type or zone type.  Key keyrecs describe how encryption keys were generated, zone keyrecs
       describe how zones were signed.  A keyrec consists of a set of keyword/value entries.  The
       following is an example of a key keyrec:

           key     "Kexample.com.+005+30485"
                 zonename        "example.com"
                 keyrec_type     "kskcur"
                 algorithm       "rsasha1"
                 random          "/dev/urandom"
                 ksklength       "2048"
                 ksklife         "15768000"
                 revperiod       "3888000"
                 revtime         "1103277532"
                 keyrec_gensecs  "1101183727"
                 keyrec_gendate  "Tue Nov 23 04:22:07 2004"

       The first step in using this module must be to create a new keyrec file or open and read
       an existing one.  The keyrec_creat() interface creates a keyrec file if it does not exist.
       The keyrec_read() interface opens and reads the file, then parses it into an internal
       format.  The file's records are copied into a hash table (for easy and fast reference by
       the Net::DNS::SEC::Tools::keyrec routines) and in an array (for preserving formatting and
       comments.) The keyrec_filestat() interface may be used check that the given file may be a
       keyrec file, though it doesn't check the file's contents.

       After the file has been read, the contents are referenced using keyrec_fullrec() and
       keyrec_recval().  The keyrec contents are modified using keyrec_add(), and
       keyrec_setval().  keyrec_settime() will update a keyrec's timestamp to the current time.
       keyrecs may be deleted with the keyrec_del() interface.

       If the keyrec file has been modified, it must be explicitly written or the changes are not
       saved.  keyrec_write() saves the new contents to disk.  keyrec_saveas() saves the in-
       memory keyrec contents to the specified file name, without affecting the original file.

       keyrec_close() saves the file and close the Perl file handle to the keyrec file.  If a
       keyrec file is no longer wanted to be open, yet the contents should not be saved,
       keyrec_discard() gets rid of the data, and closes the file handle without saving any
       modified data.

KEYREC INTERFACES

       The interfaces to the Net::DNS::SEC::Tools::keyrec module are given below.

       keyrec_add(keyrec_type,keyrec_name,fields)
           This routine adds a new keyrec to the keyrec file and the internal representation of
           the file contents.  The keyrec is added to both the %keyrecs hash table and the
           @keyreclines array.

           keyrec_type specifies the type of the keyrec -- "key" or "zone".  keyrec_name is the
           name of the keyrec.  fields is a reference to a hash table that contains the
           name/value keyrec fields.  The keys of the hash table are always converted to
           lowercase, but the entry values are left as given.

           The ksklength entry is only added if the value of the keyrec_type field is "kskcur".

           The zsklength entry is only added if the value of the keyrec_type field is "zsk",
           "zskcur", "zskpub", or "zsknew".

           Timestamp fields are added at the end of the keyrec.  For key keyrecs, the
           keyrec_gensecs and keyrec_gendate timestamp fields are added.  For zone keyrecs, the
           keyrec_signsecs and keyrec_signdate timestamp fields are added.

           If a specified field isn't defined for the keyrec type, the entry isn't added.  This
           prevents zone keyrec data from getting mingled with key keyrec data.

           A blank line is added after the final line of the new keyrec.  After adding all new
           keyrec entries, the keyrec file is written but is not closed.

           Return values are:

               0 success
               -1 invalid I<krtype>

       keyrec_close()
           This interface saves the internal version of the keyrec file (opened with
           keyrec_read()) and closes the file handle.

       keyrec_creat(keyrec_file)
           This interface creates a keyrec file if it does not exist, and truncates the file if
           it already exists.

           keyrec_creat() returns 1 if the file was created successfully.  It returns 0 if there
           was an error in creating the file.

       keyrec_curkrf()
           This routine returns the name of the keyrec file that is currently in use.  This value
           is the filename passed to keyrec_read() or keyrec_creat(); it is not guaranteed to be
           either an absolute or relative filename.

       keyrec_defkrf()
           This routine returns the default keyrec filename from the DNSSEC-Tools configuration
           file.

       keyrec_del(keyrec_name)
           This routine deletes a keyrec from the keyrec file and the internal representation of
           the file contents.  The keyrec is deleted from both the %keyrecs hash table and the
           @keyreclines array.

           Only the keyrec itself is deleted from the file.  Any associated comments and blank
           lines surrounding it are left intact.

           Return values are:

                0 successful keyrec deletion
               -1 invalid krtype (empty string or unknown name)

       keyrec_delval(keyrec_name, field)
           This routine deletes the field from the keyrec named by keyrec_name.  The keyrec is
           deleted from both the %keyrecs hash table and the @keyreclines array.

           Return values are:

               -1 keyrec_name not the name of an existing keyrec
                0 field not found in keyrec
                1 field deleted from keyrec

       keyrec_discard()
           This routine removes a keyrec file from use by a program.  The internally stored data
           are deleted and the keyrec file handle is closed.  However, modified data are not
           saved prior to closing the file handle.  Thus, modified and new data will be lost.

       keyrec_exists(keyrec_name)
           keyrec_exists() returns a boolean indicating if a keyrec exists that has the specified
           keyrec_name.

       keyrec_filestat(keyrec_name)
           keyrec_filestat() checks that a given file might be a reasonable candidate for a
           DNSSEC-Tools keyrec file.  The checks to be performed may be gleaned from the list of
           return values.

           Return values are:
               0 - returned if the tests are all succeed
               1 - an actual name wasn't given
               2 - the file does not exist
               3 - the file is not a regular file
               4 - the file is not readable
               5 - the file is empty

       keyrec_fullrec(keyrec_name)
           keyrec_fullrec() returns a reference to the keyrec specified in keyrec_name.

       keyrec_keyfields()
           This routine returns a list of the recognized fields for a key keyrec.

       keyrec_keypaths(zonename,keytype)
           keyrec_keypaths() returns a list of paths to a set of key files for a given zone.  The
           zone is specified in zonename and the type of key is given in keytype.

           keytype must be one of the following:  "kskcur", "kskpub", "kskrev", "kskobs"",
           "zskcur", "zskpub", "zsknew", "zskobs", "ksk", "zsk", or "all".  Case does not matter
           for the keytype.

           If keytype is one of the special labels ("ksk", "zsk", or "all") then a set of key
           paths will be returned.  A keytype of "ksk" will return paths to all KSK keys for the
           zone, a keytype of "zsk" will return paths to all ZSK keys for the zone, and a keytype
           of "all" will return paths to all keys for the zone,

           If the given key type is not defined in the given zone's zone keyrec or if the key
           type is not recognized, then a null set is returned.

       keyrec_names()
           This routine returns a list of the keyrec names from the file.

       keyrec_open(keyrec_file) DEPRECATED
           This routine used to open an existing DNSSEC-Tools keyrec file.  However, this was an
           unnecessary operation since keyrec_read() would open the file if it wasn't already
           open.

           This call will eventually be removed.  For now, it calls keyrec_filestat() to check
           the validity of the specified keyrec file.

           Return values:

               1 is the file passes all of keyrec_filestat()'s tests
               0 is the file fails any of keyrec_filestat()'s tests

           For backwards compatibility, the success/failure meaning of the return values matches
           the success/failure meaning of keyrec_open()'s original returns.

       keyrec_read(keyrec_file)
           This interface reads the specified keyrec file and parses it into a keyrec hash table
           and a file contents array.  keyrec_read() must be called prior to any of the other
           Net::DNS::SEC::Tools::keyrec calls.  If another keyrec is already open, then it is
           saved and closed prior to opening the new keyrec.

           Upon success, keyrec_read() returns the number of keyrecs read from the file.

           Failure return values:

               -1 specified I<keyrec> file doesn't exist
               -2 unable to open I<keyrec> file
               -3 duplicate I<keyrec> names in file

       keyrec_recval(keyrec_name,keyrec_field)
           This routine returns the value of a specified field in a given keyrec.  keyrec_name is
           the name of the particular keyrec to consult.  keyrec_field is the field name within
           that keyrec.

           For example, the current keyrec file contains the following keyrec:

               zone        "example.com"
                           zonefile        "db.example.com"

           The call:

               keyrec_recval("example.com","zonefile")

           will return the value "db.example.com".

       keyrec_revoke_check(key)
           This interface checks a revoked KSK's keyrec to determine if it is in or out of its
           revocation period.  The key must be a "kskrev" type key, and it must have "revtime"
           and "revperiod" fields defined in the keyrec.

           The determination is made by subtracting the revoke time from the current time.  If
           this is greater than the revocation period, the the key has exceeded the time in which
           it must be revoked.  If not, then it must remain revoked.

           Return values:

                1 specified key is outside the revocation period and should be
                  marked as obsolete
                0 specified key is in the revocation period and should be left
                  revoked
               -1 error (invalid key type, missing I<keyrec> data)

       keyrec_saveas(keyrec_file_copy)
           This interface saves the internal version of the keyrec file (opened with or
           keyrec_read()) to the file named in the keyrec_file_copy parameter.  The new file's
           file handle is closed, but the original file and the file handle to the original file
           are not affected.

       keyrec_setval(keyrec_type,keyrec_name,field,value)
           Set the value of a name/field pair in a specified keyrec.  The file is not written
           after updating the value.  The value is saved in both %keyrecs and in @keyreclines,
           and the file-modified flag is set.

           keyrec_type specifies the type of the keyrec.  This is only used if a new keyrec is
           being created by this call.  keyrec_name is the name of the keyrec that will be
           modified.  field is the keyrec field which will be modified.  value is the new value
           for the field.

           Return values are:

               0 if the creation succeeded
               -1 invalid type was given

       keyrec_settime(keyrec_type,keyrec_name)
           Set the timestamp of a specified keyrec.  The file is not written after updating the
           value.  The value is saved in both %keyrecs and in @keyreclines, and the file-modified
           flag is set.  The keyrec's keyrec_signdate and keyrec_signsecs fields are modified.

       keyrec_write()
           This interface saves the internal version of the keyrec file (opened with or
           keyrec_read()).  It does not close the file handle.  As an efficiency measure, an
           internal modification flag is checked prior to writing the file.  If the program has
           not modified the contents of the keyrec file, it is not rewritten.

           keyrec_write() gets an exclusive lock on the keyrec file while writing.

       keyrec_zonefields()
           This routine returns a list of the recognized fields for a zone keyrec.

KEYREC SIGNING-SET INTERFACES

       Signing sets are collections of encryption keys, defined by inclusion in a particular
       "set" keyrec.  The names of the keys are in the keyrec's keys record, which contains the
       names of the key keyrecs.  Due to the way key names are handled, the names in a signing
       set must not contain spaces.

       The signing-set-specific interfaces are given below.

       keyrec_signset_newname(zone_name)
           keyrec_signset_newname() creates a name for a new signing set.  The name will be
           generated by referencing the lastset field in the keyrec for zone zone_name, if the
           keyrec has such a field.  The set index number (described below) will be incremented
           and the lastset with the new index number will be returned as the new signing set
           name.  If the zone keyrec does not have a lastset field, then the default set name of
           signing-set-0 will be used.

           The set index number is the first number found in the lastset field.  It doesn't
           matter where in the field it is found, the first number will be considered to be the
           signing set index.  The examples below show how this is determined:

               lastset field               index
               -------------               -----
               signing-set-0                  0
               signing-0-set                  0
               1-signing-0-set                1
               signing-88-set-1              88
               signingset4321              4321

       keyrec_signset_new(zone,signing_set_name,set_type)
           keyrec_signset_new() creates the signing set named by signing_set_name for the zone
           zone.  It is given the type type, which must be one of the following:  "kskcur",
           "kskpub", "kskrev", "kskobs", "zskcur", "zskpub", "zsknew", or "zskobs".

           It returns 1 if the call is successful; 0 if it is not.

       keyrec_signset_prefix(zone_name)
           keyrec_signset_prefix() returns the signing set prefix formed by concatenating the
           zone name and $DEFSETPREFIX.  This prefix should be followed by a numeric index.

       keyrec_signset_addkey(signing_set_name,key_list)
           keyrec_signset_addkey() adds the keys listed in key_list to the signing set named by
           signing_set_name.  key_list may either be an array or a set or arguments to the
           routine.  The keyrec is created if it does not already exist.  It returns 1 if the
           call is successful; 0 if it is not.

       keyrec_signset_delkey(signing_set_name,key_name)
           keyrec_signset_delkey() deletes the key given in key_name to the signing set named by
           signing_set_name.  It returns 1 if the call is successful; 0 if it is not.

       keyrec_signset_haskey(signing_set_name,key_name)
           keyrec_signset_haskey() returns a flag indicating if the key specified in key_name is
           one of the keys in the signing set named by signing_set_name.  It returns 1 if the
           signing set has the key; 0 if it does not.

       keyrec_signset_clear(keyrec_name)
           keyrec_signset_clear() clears the entire signing set from the keyrec named by
           keyrec_name.  It returns 1 if the call is successful; 0 if it is not.

       keyrec_signsets()
           keyrec_signsets() returns the names of the signing sets in the keyrec file.  These
           names are returned in an array.

       keyrec_signset_keys(keyrec_name,signset_type)
           keyrec_signset_keys() returns the names of the keys that are members of a given
           signing set in the keyrec file.  The keys are returned in a space-separated string.

           There are two ways of calling keyrec_signset_keys().   The first method specifies a
           zone keyrec name and a signing set type.  The signing set name is found by referencing
           the set field in the zone keyrec, then the keys field of that signing set is returned.

           The second method specifies the signing set directly, and its keys field is returned.

           Valid signing set types are:

               kskcur        kskpub        kskrev        kskobs
               zskcur        zskpub        zsknew        zskobs

           The following errors are recognized, resulting in an undefined return:

               keyrec_name is not a defined keyrec
               signset_type is an invalid signing set type
               the signing set keyrec is not a set keyrec

KEYREC INTERNAL INTERFACES

       The interfaces described in this section are intended for internal use by the keyrec.pm
       module.  However, there are situations where external entities may have need of them.  Use
       with caution, as misuse may result in damaged or lost keyrec files.

       keyrec_init()
           This routine initializes the internal keyrec data.  Pending changes will be lost.  An
           open keyrec file handle will remain open, though the data are no longer held
           internally.  A new keyrec file must be read in order to use the keyrec.pm interfaces
           again.

       keyrec_newkeyrec(kr_name,kr_type)
           This interface creates a new keyrec.  The keyrec_name and keyrec_hash fields in the
           keyrec are set to the values of the kr_name and kr_type parameters.  kr_type must be
           either "key" or "zone".

           Return values are:

               0 if the creation succeeded
               -1 if an invalid I<keyrec> type was given

KEYREC DEBUGGING INTERFACES

       The following interfaces display information about the currently parsed keyrec file.  They
       are intended to be used for debugging and testing, but may be useful at other times.

       keyrec_dump_hash()
           This routine prints the keyrec file as it is stored internally in a hash table.  The
           keyrecs are printed in alphabetical order, with the fields alphabetized for each
           keyrec.  New keyrecs and keyrec fields are alphabetized along with current keyrecs and
           fields.  Comments from the keyrec file are not included with the hash table.

       keyrec_dump_array()
           This routine prints the keyrec file as it is stored internally in an array.  The
           keyrecs are printed in the order given in the file, with the fields ordered in the
           same manner.  New keyrecs are appended to the end of the array.  keyrec fields added
           to existing keyrecs are added at the beginning of the keyrec entry.  Comments and
           vertical whitespace are preserved as given in the keyrec file.

COPYRIGHT

       Copyright 2005-2013 SPARTA, Inc.  All rights reserved.  See the COPYING file included with
       the DNSSEC-Tools package for details.

AUTHOR

       Wayne Morrison, tewok@tislabs.com

SEE ALSO

       Net::DNS::SEC::Tools::conf(5), Net::DNS::SEC::Tools::keyrec(5)