Lines Matching defs:keys
1048 dst_key_t **keys, unsigned int *nkeys)
1055 directory, mctx, maxkeys, keys, nkeys));
1068 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys,
1100 * have both KSK and non-KSK keys that are not revoked per
1106 if (!dst_key_isprivate(keys[i]))
1108 if (dst_key_inactive(keys[i])) /* Should be redundant. */
1111 if (check_ksk && !REVOKE(keys[i])) {
1113 if (KSK(keys[i])) {
1121 if (j == i || ALG(keys[i]) != ALG(keys[j]))
1123 if (!dst_key_isprivate(keys[j]))
1125 if (dst_key_inactive(keys[j])) /* SBR */
1127 if (REVOKE(keys[j]))
1129 if (KSK(keys[j]))
1141 if (!KSK(keys[i]) && keyset_kskonly)
1143 } else if (KSK(keys[i])) {
1152 } else if (REVOKE(keys[i]) && type != dns_rdatatype_dnskey)
1156 CHECK(dns_dnssec_sign(name, &rdataset, keys[i],
1170 "found no active private keys, "
1189 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys)
1224 if (rrsig.keyid == dst_key_id(keys[i])) {
1226 if (!dst_key_isprivate(keys[i]) &&
1227 !dst_key_inactive(keys[i]))
1264 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys,
1313 keys, nkeys, inception, expire,
1414 "could not get zone keys for secure "
1425 * keys sign which RRsets? First check the zone option then
1426 * check the keys flags to make sure at least one has a ksk set
1759 * (XXX what if the zone keys are missing?).