added missing upstream files
[tridge/bind9.git] / bin / tests / system / autosign / ns2 / revkeys.shar
1 #!/bin/sh
2 # This is a shell archive (produced by GNU sharutils 4.6.3).
3 # To extract the files from this archive, save it to some FILE, remove
4 # everything before the `#!/bin/sh' line above, then type `sh FILE'.
5 #
6 lock_dir=_sh31052
7 # Made on 2010-01-08 23:17 PST by <each@pisces>.
8 # Source directory was `/home/each/isc/bind9/bin/tests/system/autosign/ns2/keys'.
9 #
10 # Existing files will *not* be overwritten, unless `-c' is specified.
11 #
12 # This shar contains:
13 # length mode       name
14 # ------ ---------- ------------------------------------------
15 #    538 -rw-r--r-- Kbar.+005+30676.key
16 #   1774 -rw-r--r-- Kbar.+005+30676.private
17 #    538 -rw-r--r-- Kbar.+005+30804.key
18 #   1774 -rw-r--r-- Kbar.+005+30804.private
19 #
20 MD5SUM=${MD5SUM-md5sum}
21 f=`${MD5SUM} --version | egrep '^md5sum .*(core|text)utils'`
22 test -n "${f}" && md5check=true || md5check=false
23 ${md5check} || \
24   echo 'Note: not verifying md5sums.  Consider installing GNU coreutils.'
25 save_IFS="${IFS}"
26 IFS="${IFS}:"
27 gettext_dir=FAILED
28 locale_dir=FAILED
29 first_param="$1"
30 for dir in $PATH
31 do
32   if test "$gettext_dir" = FAILED && test -f $dir/gettext \
33      && ($dir/gettext --version >/dev/null 2>&1)
34   then
35     case `$dir/gettext --version 2>&1 | sed 1q` in
36       *GNU*) gettext_dir=$dir ;;
37     esac
38   fi
39   if test "$locale_dir" = FAILED && test -f $dir/shar \
40      && ($dir/shar --print-text-domain-dir >/dev/null 2>&1)
41   then
42     locale_dir=`$dir/shar --print-text-domain-dir`
43   fi
44 done
45 IFS="$save_IFS"
46 if test "$locale_dir" = FAILED || test "$gettext_dir" = FAILED
47 then
48   echo=echo
49 else
50   TEXTDOMAINDIR=$locale_dir
51   export TEXTDOMAINDIR
52   TEXTDOMAIN=sharutils
53   export TEXTDOMAIN
54   echo="$gettext_dir/gettext -s"
55 fi
56 if (echo "testing\c"; echo 1,2,3) | grep c >/dev/null
57 then if (echo -n test; echo 1,2,3) | grep n >/dev/null
58      then shar_n= shar_c='
59 '
60      else shar_n=-n shar_c= ; fi
61 else shar_n= shar_c='\c' ; fi
62 f=shar-touch.$$
63 st1=200112312359.59
64 st2=123123592001.59
65 st2tr=123123592001.5 # old SysV 14-char limit
66 st3=1231235901
67
68 if touch -am -t ${st1} ${f} >/dev/null 2>&1 && \
69    test ! -f ${st1} && test -f ${f}; then
70   shar_touch='touch -am -t $1$2$3$4$5$6.$7 "$8"'
71
72 elif touch -am ${st2} ${f} >/dev/null 2>&1 && \
73    test ! -f ${st2} && test ! -f ${st2tr} && test -f ${f}; then
74   shar_touch='touch -am $3$4$5$6$1$2.$7 "$8"'
75
76 elif touch -am ${st3} ${f} >/dev/null 2>&1 && \
77    test ! -f ${st3} && test -f ${f}; then
78   shar_touch='touch -am $3$4$5$6$2 "$8"'
79
80 else
81   shar_touch=:
82   echo
83   ${echo} 'WARNING: not restoring timestamps.  Consider getting and'
84   ${echo} 'installing GNU `touch'\'', distributed in GNU coreutils...'
85   echo
86 fi
87 rm -f ${st1} ${st2} ${st2tr} ${st3} ${f}
88 #
89 if test ! -d ${lock_dir}
90 then : ; else ${echo} 'lock directory '${lock_dir}' exists'
91   exit 1
92 fi
93 if mkdir ${lock_dir}
94 then ${echo} 'x - created lock directory `'${lock_dir}\''.'
95 else ${echo} 'x - failed to create lock directory `'${lock_dir}\''.'
96   exit 1
97 fi
98 # ============= Kbar.+005+30676.key ==============
99 if test -f 'Kbar.+005+30676.key' && test "$first_param" != -c; then
100   ${echo} 'x -SKIPPING Kbar.+005+30676.key (file already exists)'
101 else
102 ${echo} 'x - extracting Kbar.+005+30676.key (text)'
103   sed 's/^X//' << 'SHAR_EOF' > 'Kbar.+005+30676.key' &&
104 ; This is a key-signing key, keyid 30676, for bar.
105 ; Created: Sat Dec 26 03:13:10 2009
106 ; Publish: Sat Dec 26 03:13:10 2009
107 ; Activate: Sat Dec 26 03:13:10 2009
108 bar. IN DNSKEY 257 3 5 AwEAAc7ppysDZjlldTwsvcXcTTOYJd5TvW5RUWWYKRsee+ozwY6C7vNI 0Xp1PiY+H31GhcnNMCjQU00y8Vezo42oJ4kpRTDevL0STksExXi1/wG+ M4j1CFMh2wgJ/9XLFzHaEWzt4sflVBAVZVXa/qNkRWDXYjsr30MWyylA wHCIxEuyA+NxAL6UL+ZuFo1j84AvfwkGcMbXTcOBSCaHT6AJToSXAcCa X4fnKJIzG4RyJoN2GK4TVdj4qSzLxL1lRkYHNqJvcmMjezxUs9A5fHNI iBEBRPs7NKrQJxegAGVn9ALylKHyhJW6uyBjleOWUDom4ej2J1vGrpQT /KCA35toCvU=
109 SHAR_EOF
110   (set 20 10 01 08 23 14 29 'Kbar.+005+30676.key'; eval "$shar_touch") &&
111   chmod 0644 'Kbar.+005+30676.key'
112 if test $? -ne 0
113 then ${echo} 'restore of Kbar.+005+30676.key failed'
114 fi
115   if ${md5check}
116   then (
117        ${MD5SUM} -c >/dev/null 2>&1 || ${echo} 'Kbar.+005+30676.key: MD5 check failed'
118        ) << SHAR_EOF
119 9c89adb7c9e6d5e2fd34f694b8752c95  Kbar.+005+30676.key
120 SHAR_EOF
121   else
122 test `LC_ALL=C wc -c < 'Kbar.+005+30676.key'` -ne 538 && \
123   ${echo} 'restoration warning:  size of Kbar.+005+30676.key is not 538'
124   fi
125 fi
126 # ============= Kbar.+005+30676.private ==============
127 if test -f 'Kbar.+005+30676.private' && test "$first_param" != -c; then
128   ${echo} 'x -SKIPPING Kbar.+005+30676.private (file already exists)'
129 else
130 ${echo} 'x - extracting Kbar.+005+30676.private (text)'
131   sed 's/^X//' << 'SHAR_EOF' > 'Kbar.+005+30676.private' &&
132 Private-key-format: v1.3
133 Algorithm: 5 (RSASHA1)
134 Modulus: zumnKwNmOWV1PCy9xdxNM5gl3lO9blFRZZgpGx576jPBjoLu80jRenU+Jj4ffUaFyc0wKNBTTTLxV7OjjagniSlFMN68vRJOSwTFeLX/Ab4ziPUIUyHbCAn/1csXMdoRbO3ix+VUEBVlVdr+o2RFYNdiOyvfQxbLKUDAcIjES7ID43EAvpQv5m4WjWPzgC9/CQZwxtdNw4FIJodPoAlOhJcBwJpfh+cokjMbhHImg3YYrhNV2PipLMvEvWVGRgc2om9yYyN7PFSz0Dl8c0iIEQFE+zs0qtAnF6AAZWf0AvKUofKElbq7IGOV45ZQOibh6PYnW8aulBP8oIDfm2gK9Q==
135 PublicExponent: AQAB
136 PrivateExponent: BcfjYsFCjuH1x4ucdbW09ncOv8ppJXbiJkt9AoP0hFOT2c5wrJ1hNOGnrdvYd2CMBlpUOR+w5BxDP+cF78Q97ogXpcjjTwj+5PuqJLg4+qx8thvacrAkdXIKEsgMytjD2d4/ksQmeBiQ7zgiGyCHC7CYzvxnzXEKlgl4FuzLRy4SH1YiSTxKfw1ANKKHxmw8Xvav9ljubrzNdBEQNs6eJNkC6c3aGqiPFyTWGa90s6t1mwTXSxFqBUR1WlbfyYfuiAK2CAvFHeNo7VuC934ri7ceEq8jeOSuY0IqDq2pA3gVWVOyR4NFLXJWeDA3pjqi109t/WGg9IGydD/hsleP4Q==
137 Prime1: /hz+WxAL+9bO1l/857ME/OhxImSp86Xi7eA920sAo5ukOIQAQ6hbaKemYxyUbwBmGHEX9d0GOU+xAgZWUU9PbZgXw0fdf+uw6Hrgfce0rWY+uJpUcVHfjLPFgMC/XYrfcVQ8tsCXqRsIbqL+ynsEkQ4vybLhlSAyFqGqYFk/Qt0=
138 Prime2: 0HLxXynoSxUcNW15cbuMRHD34ri8sUQsqCtezofPWcCo/17jqf42W7X9YGO70+BvmG3awSr3LaLf862ovCR5+orwE2MqamAV6JZMyR7nvMNGSHTdg3Kk7Jv7T5Gu7Cg6K+on8pMRW3aIms4gs/Z16j0Gxz74ES9IP3vsvC+q6vk=
139 Exponent1: NLeXHRUrJ0fdCSRIt1iwRDeEoPn5OA7GEUtgCcp5i3eSjhb0ZxTaQc/l+NHJCW4vwApWSi9cRy99LUpbResKM1ZGN8EE9rDStqgnQnDXztFTWcDKm+e8VNhGtPtHuARDbqNnJRK3Y+Gz0iAGc8Mpo14qE9IEcoeHXKKVUf+x3BE=
140 Exponent2: dKCbJB+SdM/u5IXH+TZyGKkMSLIMATKfucfqV6vs+86rv5Yb0zUEvPNqPNAQe0+LoMF2L7YWblY+71wumHXgOaobAP3u8W2pVGUjuTOtfRPU8x1QAwfV9vye87oTINaxFXkBuNtITuBXNiY2bfprpw9WB4zXxuWpiruPjQsumiE=
141 Coefficient: qk8HX5fy74Sx6z3niBfTM/SUEjcsnJCTTmsXy6e7nOXWBK5ihKkmMw7LDhaY4OwjXvaVQH0Z190dfyOkWYTbXInIyNNnqCD+xZXkuzuvsUwLNgvXEFhVnzrrj3ozNiizZsyeAhFCKcITz3ci15HB3y8ZLChGYBPFU1ui7MsSkc8=
142 Created: 20091226021310
143 Publish: 20091226021310
144 Activate: 20091226021310
145 SHAR_EOF
146   (set 20 10 01 08 23 14 29 'Kbar.+005+30676.private'; eval "$shar_touch") &&
147   chmod 0644 'Kbar.+005+30676.private'
148 if test $? -ne 0
149 then ${echo} 'restore of Kbar.+005+30676.private failed'
150 fi
151   if ${md5check}
152   then (
153        ${MD5SUM} -c >/dev/null 2>&1 || ${echo} 'Kbar.+005+30676.private: MD5 check failed'
154        ) << SHAR_EOF
155 c85dfac0b5c0cf2972878a65717af9ea  Kbar.+005+30676.private
156 SHAR_EOF
157   else
158 test `LC_ALL=C wc -c < 'Kbar.+005+30676.private'` -ne 1774 && \
159   ${echo} 'restoration warning:  size of Kbar.+005+30676.private is not 1774'
160   fi
161 fi
162 # ============= Kbar.+005+30804.key ==============
163 if test -f 'Kbar.+005+30804.key' && test "$first_param" != -c; then
164   ${echo} 'x -SKIPPING Kbar.+005+30804.key (file already exists)'
165 else
166 ${echo} 'x - extracting Kbar.+005+30804.key (text)'
167   sed 's/^X//' << 'SHAR_EOF' > 'Kbar.+005+30804.key' &&
168 ; This is a key-signing key, keyid 30804, for bar.
169 ; Created: Sat Dec 26 03:13:10 2009
170 ; Publish: Sat Dec 26 03:13:10 2009
171 ; Activate: Sat Dec 26 03:13:10 2009
172 bar. IN DNSKEY 257 3 5 AwEAgc7ppysDZjlldTwsvcXcTTOYJd5TvW5RUWWYKRsee+ozwY6C7vNI 0Xp1PiY+H31GhcnNMCjQU00y8Vezo42oJ4kpRTDevL0STksExXi1/wG+ M4j1CFMh2wgJ/9XLFzHaEWzt4sflVBAVZVXa/qNkRWDXYjsr30MWyylA wHCIxEuyA+NxAL6UL+ZuFo1j84AvfwkGcMbXTcOBSCaHT6AJToSXAcCa X4fnKJIzG4RyJoN2GK4TVdj4qSzLxL1lRkYHNqJvcmMjezxUs9A5fHNI iBEBRPs7NKrQJxegAGVn9ALylKHyhJW6uyBjleOWUDom4ej2J1vGrpQT /KCA35toCvU=
173 SHAR_EOF
174   (set 20 10 01 08 23 14 29 'Kbar.+005+30804.key'; eval "$shar_touch") &&
175   chmod 0644 'Kbar.+005+30804.key'
176 if test $? -ne 0
177 then ${echo} 'restore of Kbar.+005+30804.key failed'
178 fi
179   if ${md5check}
180   then (
181        ${MD5SUM} -c >/dev/null 2>&1 || ${echo} 'Kbar.+005+30804.key: MD5 check failed'
182        ) << SHAR_EOF
183 825116de64b44b14893cb3b8a48475bc  Kbar.+005+30804.key
184 SHAR_EOF
185   else
186 test `LC_ALL=C wc -c < 'Kbar.+005+30804.key'` -ne 538 && \
187   ${echo} 'restoration warning:  size of Kbar.+005+30804.key is not 538'
188   fi
189 fi
190 # ============= Kbar.+005+30804.private ==============
191 if test -f 'Kbar.+005+30804.private' && test "$first_param" != -c; then
192   ${echo} 'x -SKIPPING Kbar.+005+30804.private (file already exists)'
193 else
194 ${echo} 'x - extracting Kbar.+005+30804.private (text)'
195   sed 's/^X//' << 'SHAR_EOF' > 'Kbar.+005+30804.private' &&
196 Private-key-format: v1.3
197 Algorithm: 5 (RSASHA1)
198 Modulus: zumnKwNmOWV1PCy9xdxNM5gl3lO9blFRZZgpGx576jPBjoLu80jRenU+Jj4ffUaFyc0wKNBTTTLxV7OjjagniSlFMN68vRJOSwTFeLX/Ab4ziPUIUyHbCAn/1csXMdoRbO3ix+VUEBVlVdr+o2RFYNdiOyvfQxbLKUDAcIjES7ID43EAvpQv5m4WjWPzgC9/CQZwxtdNw4FIJodPoAlOhJcBwJpfh+cokjMbhHImg3YYrhNV2PipLMvEvWVGRgc2om9yYyN7PFSz0Dl8c0iIEQFE+zs0qtAnF6AAZWf0AvKUofKElbq7IGOV45ZQOibh6PYnW8aulBP8oIDfm2gK9Q==
199 PublicExponent: AQCB
200 PrivateExponent: I5TcRq2sbSi1u5a+jL6VVBBu3nyY7p3NXeD1WYYYD66b8RWbgJdTtsZxgixD5sKKrW/xT68d3FUsIjs36w7yp5+g99q7lJ3v35VcMuLXbaKitS/LJdTZF/GIWwRs+DHdt+chh0QeNLzclq8ZfBeTAycFxwC7zVDLsqqcL6/JHiJhHT+dNEqj6/AIOgSYJzVeBI34LtZLW94IKf4dHLzREnLK6+64PFjpwjOG12O9klKfwHRIRN9WUsDG4AuzDSABH+qo2Zc6uJusC/D6HADbiG7tXmLYL6IxanWTbTrx4Hfp01fF+JQCuyOCRmN47X/nCumvDXKMn9Ve5+OlYi0vAQ==
201 Prime1: /hz+WxAL+9bO1l/857ME/OhxImSp86Xi7eA920sAo5ukOIQAQ6hbaKemYxyUbwBmGHEX9d0GOU+xAgZWUU9PbZgXw0fdf+uw6Hrgfce0rWY+uJpUcVHfjLPFgMC/XYrfcVQ8tsCXqRsIbqL+ynsEkQ4vybLhlSAyFqGqYFk/Qt0=
202 Prime2: 0HLxXynoSxUcNW15cbuMRHD34ri8sUQsqCtezofPWcCo/17jqf42W7X9YGO70+BvmG3awSr3LaLf862ovCR5+orwE2MqamAV6JZMyR7nvMNGSHTdg3Kk7Jv7T5Gu7Cg6K+on8pMRW3aIms4gs/Z16j0Gxz74ES9IP3vsvC+q6vk=
203 Exponent1: JDLRyjRz53hTP7H2oaKgQYADs/UDswN2lwWpuag0wsPwQmeRAZZY2TiISPSu+3Mvh4XJ6r5UHQd5FbAN1v2mG4aYgWwoYwoxyvdTLcnQXciX2z+7877GcEyKHPno4fYXRqhVH4i1QjKaQl8dw9LFvzbVvGvvwsHGwQeqPprw7hk=
204 Exponent2: vbnob7AZKqKhiVdEcnnhbeZBGcaKkTpE+RAkUL7spNQDiTPvJgo5fcTk/h6G7ijAXK0j62ZHZ3RS7RnaRa+KhO7usPcYMFiJ/VdAyRlIivhyi+WNQ2x4vSygwDy2VV9elljFeNe4dV1Cb+ssE8kAmbP52JjJD6MkhvVLd0u/jMk=
205 Coefficient: qk8HX5fy74Sx6z3niBfTM/SUEjcsnJCTTmsXy6e7nOXWBK5ihKkmMw7LDhaY4OwjXvaVQH0Z190dfyOkWYTbXInIyNNnqCD+xZXkuzuvsUwLNgvXEFhVnzrrj3ozNiizZsyeAhFCKcITz3ci15HB3y8ZLChGYBPFU1ui7MsSkc8=
206 Created: 20091226021310
207 Publish: 20091226021310
208 Activate: 20091226021310
209 SHAR_EOF
210   (set 20 10 01 08 23 14 29 'Kbar.+005+30804.private'; eval "$shar_touch") &&
211   chmod 0644 'Kbar.+005+30804.private'
212 if test $? -ne 0
213 then ${echo} 'restore of Kbar.+005+30804.private failed'
214 fi
215   if ${md5check}
216   then (
217        ${MD5SUM} -c >/dev/null 2>&1 || ${echo} 'Kbar.+005+30804.private: MD5 check failed'
218        ) << SHAR_EOF
219 580cfb43bac6ed945896b464923676e7  Kbar.+005+30804.private
220 SHAR_EOF
221   else
222 test `LC_ALL=C wc -c < 'Kbar.+005+30804.private'` -ne 1774 && \
223   ${echo} 'restoration warning:  size of Kbar.+005+30804.private is not 1774'
224   fi
225 fi
226 if rm -fr ${lock_dir}
227 then ${echo} 'x - removed lock directory `'${lock_dir}\''.'
228 else ${echo} 'x - failed to remove lock directory `'${lock_dir}\''.'
229   exit 1
230 fi
231 exit 0