Lines Matching full:keys
352 * \param *keys A ldns_rr_list of DNSKEY and DS rrs to look for
355 * the keys, or the *first* error encountered
360 ldns_rr_list *keys);
367 * \param[in] keys a list of keys to check with
368 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
369 * from keys that validate one of the signatures
375 const ldns_rr_list *keys,
383 * \param[in] keys a list of keys to check with
385 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
386 * from keys that validate one of the signatures
392 const ldns_rr_list *keys,
403 * \param[in] keys a list of keys to check with
404 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
405 * from keys that validate one of the signatures
411 const ldns_rr_list *keys,
416 * keys down to the queried domain.
418 * If we find a valid trust path, return the valid keys for the domain.
421 * \param[in] domain the domain we want valid keys for
422 * \param[in] keys the current set of trusted keys
425 * \return the set of trusted keys for the domain, or NULL if no
430 const ldns_rr_list * keys,
435 * keys down to the queried domain.
437 * If we find a valid trust path, return the valid keys for the domain.
440 * \param[in] domain the domain we want valid keys for
441 * \param[in] keys the current set of trusted keys
445 * \return the set of trusted keys for the domain, or NULL if no
449 const ldns_rdf * domain, const ldns_rr_list * keys,
455 * trusted keys.
458 * \param[in] domain the domain we want valid keys for
459 * \param[in] keys the current set of trusted keys
460 * \return the set of trusted keys for the domain, or NULL if the RRSET
465 const ldns_rr_list *keys);
469 * trusted keys.
472 * \param[in] domain the domain we want valid keys for
473 * \param[in] keys the current set of trusted keys
475 * \return the set of trusted keys for the domain, or NULL if the RRSET
480 const ldns_rr_list *keys, time_t check_time);
484 * Validates the DS RRset for the given domain using the provided trusted keys.
487 * \param[in] domain the domain we want valid keys for
488 * \param[in] keys the current set of trusted keys
489 * \return the set of trusted keys for the domain, or NULL if the RRSET could not be validated
494 const ldns_rr_list * keys);
497 * Validates the DS RRset for the given domain using the provided trusted keys.
500 * \param[in] domain the domain we want valid keys for
501 * \param[in] keys the current set of trusted keys
503 * \return the set of trusted keys for the domain, or NULL if the RRSET could not be validated
507 const ldns_rr_list * keys, time_t check_time);
517 * keys from keys that validate one of
534 * keys from keys that validate one of
641 * Verifies an rrsig. All keys in the keyset are tried.
644 * \param[in] keys the keys to try
645 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
646 * from keys that validate one of the signatures
648 * \return a list of keys which validate the rrsig + rrset. Returns
653 const ldns_rr_list *keys,
657 * Verifies an rrsig. All keys in the keyset are tried.
660 * \param[in] keys the keys to try
662 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
663 * from keys that validate one of the signatures
665 * \return a list of keys which validate the rrsig + rrset. Returns
670 const ldns_rr_list *keys, time_t check_time,
675 * Verifies an rrsig. All keys in the keyset are tried. Time is not checked.
678 * \param[in] keys the keys to try
679 * \param[out] good_keys if this is a (initialized) list, the pointer to keys
680 * from keys that validate one of the signatures
682 * \return a list of keys which validate the rrsig + rrset. Returns
687 const ldns_rr_list *keys,