Lines Matching defs:set
452 setverifies(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key,
456 result = dns_dnssec_verify(name, set, key, ISC_FALSE, mctx, rrsig);
467 * Signs a set. Goes through contortions to decide if each RRSIG should
473 dns_rdataset_t *set)
491 type_format(set->type, typestr, sizeof(typestr));
493 ttl = ISC_MIN(set->ttl, endtime - starttime);
497 set->type, 0, &sigset, NULL);
567 if (!expired && rrsig.originalttl == set->ttl &&
568 setverifies(name, set, key->key, &sigrdata)) {
574 rrsig.originalttl != set->ttl ?
584 if (!expired && rrsig.originalttl == set->ttl &&
585 setverifies(name, set, key->key, &sigrdata)) {
591 rrsig.originalttl != set->ttl ?
636 signwithkey(name, set, key->key, ttl, add,
662 if (set->type == dns_rdatatype_dnskey &&
681 signwithkey(name, set, key->key, ttl, add,
683 } else if (set->type == dns_rdatatype_cds ||
684 set->type == dns_rdatatype_cdnskey ||
686 signwithkey(name, set, key->key, ttl, add,
911 * Load the DS set for a child zone, if a dsset-* file can be found.
1065 /* If this is a RRSIG set, skip it. */
1258 * Increment (or set if nonzero) the SOA serial
1341 dns_rdataset_t set;
1347 dns_rdataset_init(&set);
1354 dns_rdatasetiter_current(rdsiter, &set);
1355 if (set.type == dns_rdatatype_rrsig) {
1356 covers = set.covers;
1359 dns_rdataset_disassociate(&set);
2778 OPTOUT(nsec3.flags) ? "clear" : "set");
3469 fprintf(stderr, "WARNING: -e and -X were both set, "
3620 * 1) Keys listed in the DNSKEY set that have
3622 * set on the command line.
3623 * 2) ZSKs set on the command line
3624 * 3) KSKs set on the command line
3625 * 4) Any keys remaining in the DNSKEY set which