Lines Matching refs:keys
1048 dst_key_t **keys, unsigned int *nkeys)
1055 directory, mctx, maxkeys, keys, nkeys));
1068 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys,
1100 * have both KSK and non-KSK keys that are not revoked per
1106 if (!dst_key_isprivate(keys[i]))
1109 if (check_ksk && !REVOKE(keys[i])) {
1111 if (KSK(keys[i])) {
1119 if (j == i || ALG(keys[i]) != ALG(keys[j]))
1121 if (REVOKE(keys[j]))
1123 if (KSK(keys[j]))
1135 if (!KSK(keys[i]) && keyset_kskonly)
1137 } else if (KSK(keys[i]))
1139 } else if (REVOKE(keys[i]) && type != dns_rdatatype_dnskey)
1143 CHECK(dns_dnssec_sign(name, &rdataset, keys[i],
1157 "found no active private keys, "
1176 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys)
1211 if (rrsig.keyid == dst_key_id(keys[i])) {
1213 if (!dst_key_isprivate(keys[i]) &&
1214 !dst_key_inactive(keys[i]))
1251 dns_diff_t *diff, dst_key_t **keys, unsigned int nkeys,
1299 keys, nkeys, inception, expire,
1365 "could not get zone keys for secure dynamic update");
1375 * keys sign which RRsets? First check the zone option then
1376 * check the keys flags to make sure at least one has a ksk set
1639 * (XXX what if the zone keys are missing?).