Lines Matching refs:rrsig
290 keythatsigned_unlocked(dns_rdata_rrsig_t *rrsig) {
295 if (rrsig->keyid == dst_key_id(key->key) &&
296 rrsig->algorithm == dst_key_alg(key->key) &&
297 dns_name_equal(&rrsig->signer, dst_key_name(key->key)))
309 keythatsigned(dns_rdata_rrsig_t *rrsig) {
315 key = keythatsigned_unlocked(rrsig);
329 key = keythatsigned_unlocked(rrsig);
335 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid,
336 rrsig->algorithm, DST_TYPE_PUBLIC,
343 result = dst_key_fromfile(&rrsig->signer, rrsig->keyid,
344 rrsig->algorithm,
360 * and can't find the signing key that we expect to find, we drop the rrsig.
391 dns_rdata_t *rrsig)
394 result = dns_dnssec_verify(name, set, key->key, ISC_FALSE, mctx, rrsig);
415 dns_rdata_rrsig_t rrsig;
468 result = dns_rdata_tostruct(&sigrdata, &rrsig, NULL);
471 future = isc_serial_lt(now, rrsig.timesigned);
473 key = keythatsigned(&rrsig);
474 sig_format(&rrsig, sigstr, sizeof(sigstr));
476 expired = isc_serial_gt(now + cycle, rrsig.timeexpire);
478 expired = isc_serial_gt(now, rrsig.timeexpire);
480 if (isc_serial_gt(rrsig.timesigned, rrsig.timeexpire)) {
481 /* rrsig is dropped and not replaced */
486 expecttofindkey(&rrsig.signer))
488 /* rrsig is dropped and not replaced */
498 if (!expired && rrsig.originalttl == set->ttl &&
508 rrsig.originalttl != set->ttl ?
514 if (!expired && rrsig.originalttl == set->ttl &&
524 rrsig.originalttl != set->ttl ?
577 dns_rdata_freestruct(&rrsig);
1079 "dns_db_deleterdataset(nsec/rrsig)");
1101 "dns_db_deleterdataset(rrsig)");
2065 "dns_db_deleterdataset(nsec3param/rrsig)");