Lines Matching defs:rrsig

346 keythatsigned_unlocked(dns_rdata_rrsig_t *rrsig) {
352 if (rrsig->keyid == dst_key_id(key->key) &&
353 rrsig->algorithm == dst_key_alg(key->key) &&
354 dns_name_equal(&rrsig->signer, dst_key_name(key->key)))
365 keythatsigned(dns_rdata_rrsig_t *rrsig) {
371 key = keythatsigned_unlocked(rrsig);
384 key = keythatsigned_unlocked(rrsig);
390 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid,
391 rrsig->algorithm, DST_TYPE_PUBLIC,
398 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid,
399 rrsig->algorithm,
421 * and can't find the signing key that we expect to find, we drop the rrsig.
453 dns_rdata_t *rrsig)
456 result = dns_dnssec_verify(name, set, key, ISC_FALSE, mctx, rrsig);
477 dns_rdata_rrsig_t rrsig;
532 result = dns_rdata_tostruct(&sigrdata, &rrsig, NULL);
535 future = isc_serial_lt(now, rrsig.timesigned);
537 key = keythatsigned(&rrsig);
538 sig_format(&rrsig, sigstr, sizeof(sigstr));
540 expired = isc_serial_gt(now + cycle, rrsig.timeexpire);
542 expired = isc_serial_gt(now, rrsig.timeexpire);
544 if (isc_serial_gt(rrsig.timesigned, rrsig.timeexpire)) {
545 /* rrsig is dropped and not replaced */
550 expecttofindkey(&rrsig.signer)) {
551 /* rrsig is dropped and not replaced */
567 if (!expired && rrsig.originalttl == set->ttl &&
574 rrsig.originalttl != set->ttl ?
584 if (!expired && rrsig.originalttl == set->ttl &&
591 rrsig.originalttl != set->ttl ?
642 dns_rdata_freestruct(&rrsig);
1187 "dns_db_deleterdataset(nsec/rrsig)");
1209 "dns_db_deleterdataset(rrsig)");
1765 "dns_db_deleterdataset(nsec3param/rrsig)");