]> git.ipfire.org Git - thirdparty/bind9.git/commitdiff
Deprecate max-rsa-exponent-size, always use 4096 instead
authorOndřej Surý <ondrej@isc.org>
Mon, 28 Apr 2025 15:22:18 +0000 (17:22 +0200)
committerOndřej Surý <ondrej@isc.org>
Tue, 20 May 2025 22:50:08 +0000 (00:50 +0200)
The `max-rsa-exponent-size` could limit the exponents of the RSA
public keys during the DNSSEC verification.  Instead of providing
a cryptic (not cryptographic) knob, hardcode the max exponent to
be 4096 (the theoretical maximum for DNSSEC).

26 files changed:
bin/dnssec/dnssec-cds.c
bin/dnssec/dnssec-signzone.c
bin/named/server.c
bin/tests/system/rsabigexponent/ns1/sign.sh
bin/tests/system/rsabigexponent/ns3/named.conf.in [deleted file]
bin/tests/system/rsabigexponent/setup.sh
bin/tests/system/rsabigexponent/tests_rsabigexponent.py
doc/arm/reference.rst
lib/dns/dnssec.c
lib/dns/dst_api.c
lib/dns/dst_internal.h
lib/dns/gssapi_link.c
lib/dns/hmac_link.c
lib/dns/include/dns/dnssec.h
lib/dns/include/dns/view.h
lib/dns/include/dst/dst.h
lib/dns/opensslecdsa_link.c
lib/dns/openssleddsa_link.c
lib/dns/opensslrsa_link.c
lib/dns/tsig.c
lib/dns/validator.c
lib/dns/zone.c
lib/dns/zoneverify.c
lib/ns/query.c
tests/dns/dst_test.c
tests/dns/rsa_test.c

index b79984be7f4090ba57a1a2d84a9b06e749b93bd3..b3bb3a5c793d4ff6e46976b579c889dbf6cd9e3d 100644 (file)
@@ -648,7 +648,7 @@ matching_sigs(keyinfo_t *keytbl, dns_rdataset_t *rdataset,
                        }
 
                        result = dns_dnssec_verify(name, rdataset, ki->dst,
-                                                  false, 0, mctx, &sigrdata,
+                                                  false, mctx, &sigrdata,
                                                   NULL);
 
                        if (result != ISC_R_SUCCESS &&
index 6dac95346b03dd3652ba74c973439ebe8aa6fc7c..177fb0140cffbb52f0d816443aa14d90462a3eb9 100644 (file)
@@ -303,7 +303,7 @@ signwithkey(dns_name_t *name, dns_rdataset_t *rdataset, dst_key_t *key,
        INCSTAT(nsigned);
 
        if (tryverify) {
-               result = dns_dnssec_verify(name, rdataset, key, true, 0, mctx,
+               result = dns_dnssec_verify(name, rdataset, key, true, mctx,
                                           &trdata, NULL);
                if (result == ISC_R_SUCCESS || result == DNS_R_FROMWILDCARD) {
                        vbprintf(3, "\tsignature verified\n");
@@ -460,7 +460,7 @@ static bool
 setverifies(dns_name_t *name, dns_rdataset_t *set, dst_key_t *key,
            dns_rdata_t *rrsig) {
        isc_result_t result;
-       result = dns_dnssec_verify(name, set, key, false, 0, mctx, rrsig, NULL);
+       result = dns_dnssec_verify(name, set, key, false, mctx, rrsig, NULL);
        if (result == ISC_R_SUCCESS || result == DNS_R_FROMWILDCARD) {
                INCSTAT(nverified);
                return true;
index 7cd06cfc353d5d918d734f9cf20b8d6917345253..002a04a69607fa81d482bef7e92bd30828b3d3c0 100644 (file)
@@ -3763,7 +3763,6 @@ configure_view(dns_view_t *view, dns_viewlist_t *viewlist, cfg_obj_t *config,
        const char *cachename = NULL;
        dns_order_t *order = NULL;
        uint32_t udpsize;
-       uint32_t maxbits;
        unsigned int resopts = 0;
        dns_zone_t *zone = NULL;
        uint32_t clients_per_query, max_clients_per_query;
@@ -4603,21 +4602,6 @@ configure_view(dns_view_t *view, dns_viewlist_t *viewlist, cfg_obj_t *config,
        }
        view->nocookieudp = udpsize;
 
-       /*
-        * Set the maximum rsa exponent bits.
-        */
-       obj = NULL;
-       result = named_config_get(maps, "max-rsa-exponent-size", &obj);
-       INSIST(result == ISC_R_SUCCESS);
-       maxbits = cfg_obj_asuint32(obj);
-       if (maxbits != 0 && maxbits < 35) {
-               maxbits = 35;
-       }
-       if (maxbits > 4096) {
-               maxbits = 4096;
-       }
-       view->maxbits = maxbits;
-
        /*
         * Set supported DNSSEC algorithms.
         */
index f16b7458d0302b87925adadd96a7132855fc95d2..4b35e2e9ceb679c9b01e23f01ab74cb7d02e6ec1 100755 (executable)
@@ -28,6 +28,5 @@ $SIGNER -P -g -o $zone $zonefile >/dev/null
 # Configure the resolving server with a static key.
 keyfile_to_static_ds $keyname >trusted.conf
 cp trusted.conf ../ns2/trusted.conf
-cp trusted.conf ../ns3/trusted.conf
 
 cd ../ns2 && $SHELL -e ./sign.sh
diff --git a/bin/tests/system/rsabigexponent/ns3/named.conf.in b/bin/tests/system/rsabigexponent/ns3/named.conf.in
deleted file mode 100644 (file)
index 6504886..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-/*
- * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
- *
- * SPDX-License-Identifier: MPL-2.0
- *
- * This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0.  If a copy of the MPL was not distributed with this
- * file, you can obtain one at https://mozilla.org/MPL/2.0/.
- *
- * See the COPYRIGHT file distributed with this work for additional
- * information regarding copyright ownership.
- */
-
-// NS3
-
-options {
-       query-source address 10.53.0.3;
-       notify-source 10.53.0.3;
-       transfer-source 10.53.0.3;
-       port @PORT@;
-       pid-file "named.pid";
-       listen-on { 10.53.0.3; };
-       listen-on-v6 { none; };
-       recursion yes;
-       notify yes;
-       dnssec-validation yes;
-       max-rsa-exponent-size 35;
-};
-
-zone "." {
-       type hint;
-       file "../../_common/root.hint";
-};
-
-include "trusted.conf";
index b7c280169fa5606181d82eb17727be4c8dad572c..5ee1f4e1781a26779d9237827ccf2753365a4b89 100644 (file)
@@ -15,6 +15,5 @@
 
 copy_setports ns1/named.conf.in ns1/named.conf
 copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
 
 cd ns1 && $SHELL -e sign.sh
index 571fe2fe132704eef378352d5e51ad0810147d54..9d02346c44776015810a75ed9751f4a4b4f8925a 100644 (file)
@@ -12,7 +12,6 @@
 import os
 import subprocess
 
-import dns.message
 import pytest
 
 import isctest
@@ -52,11 +51,3 @@ def test_rsa_big_exponent_keys_cant_load():
             "dnssec-signzone: fatal: cannot load dnskey Kexample.+008+52810.key: out of range"
             in file.read()
         )
-
-
-def test_rsa_big_exponent_keys_cant_validate():
-    msg = dns.message.make_query("a.example.", "A")
-    res2 = isctest.query.tcp(msg, "10.53.0.2")
-    isctest.check.noerror(res2)
-    res3 = isctest.query.tcp(msg, "10.53.0.3")
-    isctest.check.servfail(res3)
index 93f1497e6636912683a177d5e49c3a813bc1467e..efdcdc5b0aa1f1e4814086d98a623a4ae26494d1 100644 (file)
@@ -4496,12 +4496,11 @@ Tuning
       This option is not to be confused with the :any:`notify-defer` option.
 
 .. namedconf:statement:: max-rsa-exponent-size
-   :tags: dnssec, query
+   :tags: deprecated
    :short: Sets the maximum RSA exponent size (in bits) when validating.
 
-   This sets the maximum RSA exponent size, in bits, that is accepted when
-   validating. Valid values are 35 to 4096 bits. The default, zero, is
-   also accepted and is equivalent to 4096.
+   The maximum RSA exponent size is now always 4096.  This option is
+   deprecated, and will be rendered non-operational in a future release.
 
 .. namedconf:statement:: prefetch
    :tags: query
index 65ccbeeb7b4a07629e375acbdb82b67f6e9e5cc9..61de0005d346c21e9ab05012acef33cda1122130 100644 (file)
@@ -355,8 +355,8 @@ cleanup_databuf:
 
 isc_result_t
 dns_dnssec_verify(const dns_name_t *name, dns_rdataset_t *set, dst_key_t *key,
-                 bool ignoretime, unsigned int maxbits, isc_mem_t *mctx,
-                 dns_rdata_t *sigrdata, dns_name_t *wild) {
+                 bool ignoretime, isc_mem_t *mctx, dns_rdata_t *sigrdata,
+                 dns_name_t *wild) {
        dns_rdata_rrsig_t sig;
        dns_fixedname_t fnewname;
        isc_region_t r;
@@ -527,7 +527,7 @@ again:
 
        r.base = sig.signature;
        r.length = sig.siglen;
-       ret = dst_context_verify(ctx, maxbits, &r);
+       ret = dst_context_verify(ctx, &r);
        if (ret == ISC_R_SUCCESS && downcase) {
                char namebuf[DNS_NAME_FORMATSIZE];
                dns_name_format(&sig.signer, namebuf, sizeof(namebuf));
@@ -982,7 +982,7 @@ dns_dnssec_verifymessage(isc_buffer_t *source, dns_message_t *msg,
 
        sig_r.base = sig.signature;
        sig_r.length = sig.siglen;
-       result = dst_context_verify(ctx, 0, &sig_r);
+       result = dst_context_verify(ctx, &sig_r);
        if (result != ISC_R_SUCCESS) {
                msg->sig0status = dns_tsigerror_badsig;
                goto failure;
@@ -1062,8 +1062,8 @@ dns_dnssec_signs(dns_rdata_t *rdata, const dns_name_t *name,
 
                if (sig.algorithm == key.algorithm && sig.keyid == keytag) {
                        result = dns_dnssec_verify(name, rdataset, dstkey,
-                                                  ignoretime, 0, mctx,
-                                                  &sigrdata, NULL);
+                                                  ignoretime, mctx, &sigrdata,
+                                                  NULL);
                        if (result == ISC_R_SUCCESS) {
                                dst_key_free(&dstkey);
                                return true;
index 32d0a8ca839d0d8c28e5891960c20c39203bd5c6..9426f9c260a1b901856370d46dc9ccb39a5ef1be 100644 (file)
@@ -325,7 +325,7 @@ dst_context_sign(dst_context_t *dctx, isc_buffer_t *sig) {
 }
 
 isc_result_t
-dst_context_verify(dst_context_t *dctx, int maxbits, isc_region_t *sig) {
+dst_context_verify(dst_context_t *dctx, isc_region_t *sig) {
        REQUIRE(VALID_CTX(dctx));
        REQUIRE(sig != NULL);
 
@@ -338,7 +338,7 @@ dst_context_verify(dst_context_t *dctx, int maxbits, isc_region_t *sig) {
                return DST_R_NOTPUBLICKEY;
        }
 
-       return dctx->key->func->verify(dctx, maxbits, sig);
+       return dctx->key->func->verify(dctx, sig);
 }
 
 isc_result_t
index 16f5818082583c07c6c7f583c6fdc9b460c83288..049d6349870c0eaaee148ed31711af7a8f082ab9 100644 (file)
@@ -157,8 +157,7 @@ struct dst_func {
         * Key operations
         */
        isc_result_t (*sign)(dst_context_t *dctx, isc_buffer_t *sig);
-       isc_result_t (*verify)(dst_context_t *dctx, int maxbits,
-                              const isc_region_t *sig);
+       isc_result_t (*verify)(dst_context_t *dctx, const isc_region_t *sig);
        bool (*compare)(const dst_key_t *key1, const dst_key_t *key2);
        isc_result_t (*generate)(dst_key_t *key, int parms,
                                 void (*callback)(int));
index caab5b9686dc23c7e67cad8a176d7681a9a2d987..ffe428601f2f16ba3754454ccc6331eb4f886950 100644 (file)
@@ -186,8 +186,7 @@ gssapi_sign(dst_context_t *dctx, isc_buffer_t *sig) {
  * Verify.
  */
 static isc_result_t
-gssapi_verify(dst_context_t *dctx, int maxbits ISC_ATTR_UNUSED,
-             const isc_region_t *sig) {
+gssapi_verify(dst_context_t *dctx, const isc_region_t *sig) {
        dst_gssapi_signverifyctx_t *ctx = dctx->ctxdata.gssctx;
        isc_region_t message;
        gss_buffer_desc gmessage, gsig;
index 73690d6dcbc609b8c9d6ac082945943eac6f245c..c84ce8efc175491d2f6eef28380b95665c62befb 100644 (file)
@@ -69,7 +69,6 @@
                return (hmac_sign(dctx, sig));                                 \
        }                                                                      \
        static isc_result_t hmac##alg##_verify(dst_context_t *dctx,            \
-                                              int maxbits ISC_ATTR_UNUSED,    \
                                               const isc_region_t *sig) {      \
                return (hmac_verify(dctx, sig));                               \
        }                                                                      \
index 400e00233847a16fd1d28ce3f35ce99276c555d3..38883b6343dcb115d26ff9b0fe4d0dd7266041ff 100644 (file)
@@ -140,8 +140,8 @@ dns_dnssec_sign(const dns_name_t *name, dns_rdataset_t *set, dst_key_t *key,
 
 isc_result_t
 dns_dnssec_verify(const dns_name_t *name, dns_rdataset_t *set, dst_key_t *key,
-                 bool ignoretime, unsigned int maxbits, isc_mem_t *mctx,
-                 dns_rdata_t *sigrdata, dns_name_t *wild);
+                 bool ignoretime, isc_mem_t *mctx, dns_rdata_t *sigrdata,
+                 dns_name_t *wild);
 /*%<
  *     Verifies the RRSIG record covering this rdataset signed by a specific
  *     key.  This does not determine if the key's owner is authorized to sign
index 4cd2f66ad1fca7a782ff7a82a05bb396683125df..f33192d39ecaffe5d8495b96ba5717515432dd74 100644 (file)
@@ -169,7 +169,6 @@ struct dns_view {
        uint16_t              nocookieudp;
        uint16_t              padding;
        dns_acl_t            *pad_acl;
-       unsigned int          maxbits;
        dns_dns64list_t       dns64;
        unsigned int          dns64cnt;
        bool                  usedns64;
index f6295793c38925d4c8be0646df7304ee87472071..0a9472b284e6c2705097db8d07c69dd97a83e03a 100644 (file)
@@ -284,13 +284,10 @@ dst_context_sign(dst_context_t *dctx, isc_buffer_t *sig);
  */
 
 isc_result_t
-dst_context_verify(dst_context_t *dctx, int maxbits, isc_region_t *sig);
+dst_context_verify(dst_context_t *dctx, isc_region_t *sig);
 /*%<
  * Verifies the signature using the data and key stored in the context.
  *
- * 'maxbits' specifies the maximum number of bits permitted in the RSA
- * exponent.
- *
  * Requires:
  * \li "dctx" is a valid context.
  * \li "sig" is a valid region.
index a5f3ef6bf200d11f3c23c54efff214a7924ac93b..c95050020b8b1214bd95eb16775a2372220b1e65 100644 (file)
@@ -838,8 +838,7 @@ err:
 }
 
 static isc_result_t
-opensslecdsa_verify(dst_context_t *dctx, int maxbits ISC_ATTR_UNUSED,
-                   const isc_region_t *sig) {
+opensslecdsa_verify(dst_context_t *dctx, const isc_region_t *sig) {
        isc_result_t ret;
        dst_key_t *key = dctx->key;
        int status;
index be71476ebdf8dd23d22a7b8ab6bf4edc999c9228..fd383f688b67ec994603815de307426a037cab6c 100644 (file)
@@ -211,8 +211,7 @@ err:
 }
 
 static isc_result_t
-openssleddsa_verify(dst_context_t *dctx, int maxbits ISC_ATTR_UNUSED,
-                   const isc_region_t *sig) {
+openssleddsa_verify(dst_context_t *dctx, const isc_region_t *sig) {
        isc_result_t ret;
        dst_key_t *key = dctx->key;
        int status;
index 62617cfeeb7fd1c25988fed24ec9b314222083b5..cc945a20ea452dab332854e2bab10c5eb8dfcf55 100644 (file)
@@ -43,6 +43,8 @@
                goto err; \
        }
 
+#define OPENSSLRSA_MAX_MODULUS_BITS 4096
+
 typedef struct rsa_components {
        bool bnfree;
        const BIGNUM *e, *n, *d, *p, *q, *dmp1, *dmq1, *iqmp;
@@ -289,12 +291,12 @@ opensslrsa_sign(dst_context_t *dctx, isc_buffer_t *sig) {
 static bool
 opensslrsa_check_exponent_bits(EVP_PKEY *pkey, int maxbits) {
        /* Always use the new API first with OpenSSL 3.x. */
+       int bits = INT_MAX;
 #if OPENSSL_VERSION_NUMBER >= 0x30000000L
        BIGNUM *e = NULL;
        if (EVP_PKEY_get_bn_param(pkey, OSSL_PKEY_PARAM_RSA_E, &e) == 1) {
-               int bits = BN_num_bits(e);
+               bits = BN_num_bits(e);
                BN_free(e);
-               return bits < maxbits;
        }
 #else
        const RSA *rsa = EVP_PKEY_get0_RSA(pkey);
@@ -302,15 +304,15 @@ opensslrsa_check_exponent_bits(EVP_PKEY *pkey, int maxbits) {
                const BIGNUM *ce = NULL;
                RSA_get0_key(rsa, NULL, &ce, NULL);
                if (ce != NULL) {
-                       return BN_num_bits(ce) < maxbits;
+                       bits = BN_num_bits(ce);
                }
        }
 #endif
-       return false;
+       return bits <= maxbits;
 }
 
 static isc_result_t
-opensslrsa_verify(dst_context_t *dctx, int maxbits, const isc_region_t *sig) {
+opensslrsa_verify(dst_context_t *dctx, const isc_region_t *sig) {
        dst_key_t *key = NULL;
        int status = 0;
        EVP_MD_CTX *evp_md_ctx = NULL;
@@ -323,7 +325,8 @@ opensslrsa_verify(dst_context_t *dctx, int maxbits, const isc_region_t *sig) {
        evp_md_ctx = dctx->ctxdata.evp_md_ctx;
        pkey = key->keydata.pkeypair.pub;
 
-       if (maxbits != 0 && !opensslrsa_check_exponent_bits(pkey, maxbits)) {
+       if (!opensslrsa_check_exponent_bits(pkey, OPENSSLRSA_MAX_MODULUS_BITS))
+       {
                return DST_R_VERIFYFAILURE;
        }
 
index 3605babee033ff221a6bb5418ec3993134d15a5b..88a6cdfd76200d156b6e18affd78aae3a5af188c 100644 (file)
@@ -1117,7 +1117,7 @@ dns_tsig_verify(isc_buffer_t *source, dns_message_t *msg,
                        }
                }
 
-               result = dst_context_verify(ctx, 0, &sig_r);
+               result = dst_context_verify(ctx, &sig_r);
                if (result == DST_R_VERIFYFAILURE) {
                        result = DNS_R_TSIGVERIFYFAILURE;
                        tsig_log(msg->tsigkey, 2,
@@ -1420,7 +1420,7 @@ tsig_verify_tcp(isc_buffer_t *source, dns_message_t *msg) {
                        goto cleanup_context;
                }
 
-               result = dst_context_verify(msg->tsigctx, 0, &sig_r);
+               result = dst_context_verify(msg->tsigctx, &sig_r);
                if (result == DST_R_VERIFYFAILURE) {
                        tsig_log(msg->tsigkey, 2,
                                 "signature failed to verify(2)");
index 1d1b69cccfb750737ad04bc14ee751149d111446..db29f30b76eace4c7888b186e18f1c0c6b780d9f 100644 (file)
@@ -1349,10 +1349,9 @@ selfsigned_dnskey(dns_validator_t *val) {
                                        dst_key_free(&dstkey);
                                        return ISC_R_QUOTA;
                                }
-                               result = dns_dnssec_verify(
-                                       name, rdataset, dstkey, true,
-                                       val->view->maxbits, mctx, &sigrdata,
-                                       NULL);
+                               result = dns_dnssec_verify(name, rdataset,
+                                                          dstkey, true, mctx,
+                                                          &sigrdata, NULL);
                                switch (result) {
                                case DNS_R_SIGFUTURE:
                                case DNS_R_SIGEXPIRED:
@@ -1417,8 +1416,7 @@ verify(dns_validator_t *val, dst_key_t *key, dns_rdata_t *rdata,
        }
 again:
        result = dns_dnssec_verify(val->name, val->rdataset, key, ignore,
-                                  val->view->maxbits, val->view->mctx, rdata,
-                                  wild);
+                                  val->view->mctx, rdata, wild);
        if ((result == DNS_R_SIGEXPIRED || result == DNS_R_SIGFUTURE) &&
            val->view->acceptexpired)
        {
index 89d4466188daf101bf42514dca104d03a1349718..8d80042d3e44592f04d22ee3d521f9fe6cab557f 100644 (file)
@@ -10334,9 +10334,9 @@ revocable(dns_keyfetch_t *kfetch, dns_rdata_keydata_t *keydata) {
                if (dst_key_alg(dstkey) == sig.algorithm &&
                    dst_key_rid(dstkey) == sig.keyid)
                {
-                       result = dns_dnssec_verify(
-                               keyname, &kfetch->dnskeyset, dstkey, false, 0,
-                               mctx, &sigrr, dns_fixedname_name(&fixed));
+                       result = dns_dnssec_verify(keyname, &kfetch->dnskeyset,
+                                                  dstkey, false, mctx, &sigrr,
+                                                  dns_fixedname_name(&fixed));
 
                        dnssec_log(kfetch->zone, ISC_LOG_DEBUG(3),
                                   "Confirm revoked DNSKEY is self-signed: %s",
@@ -10525,8 +10525,7 @@ keyfetch_done(void *arg) {
                        }
 
                        result = dns_dnssec_verify(keyname, dnskeys, dstkey,
-                                                  false, 0, mctx, &sigrr,
-                                                  NULL);
+                                                  false, mctx, &sigrr, NULL);
                        dst_key_free(&dstkey);
 
                        dnssec_log(zone, ISC_LOG_DEBUG(3),
index 7ff78a15826bce4b52e16c06fec910f0e21e4cfb..ab186634ec9447c00105d4d27732ef13eaa66a16 100644 (file)
@@ -185,7 +185,7 @@ goodsig(const vctx_t *vctx, dns_rdata_t *sigrdata, const dns_name_t *name,
                        continue;
                }
                result = dns_dnssec_verify(name, rdataset, dstkeys[key], false,
-                                          0, vctx->mctx, sigrdata, NULL);
+                                          vctx->mctx, sigrdata, NULL);
                if (result == ISC_R_SUCCESS || result == DNS_R_FROMWILDCARD) {
                        return true;
                }
index 901041e9ec91b6a6d4d94a26d9ffb7ce96e2a499..fb03328f0a117a7ec4493ada50c0864bbfa61a87 100644 (file)
@@ -2447,8 +2447,7 @@ verify(dst_key_t *key, dns_name_t *name, dns_rdataset_t *rdataset,
 
 again:
        result = dns_dnssec_verify(name, rdataset, key, ignore,
-                                  client->view->maxbits, client->manager->mctx,
-                                  rdata, NULL);
+                                  client->manager->mctx, rdata, NULL);
        if (result == DNS_R_SIGEXPIRED && client->view->acceptexpired) {
                ignore = true;
                goto again;
index a98c40b00de530104eca3f68e50c71ff1f7a9a1d..225706ffeabacc71b20dcc2c89491a3df13e8b2c 100644 (file)
@@ -193,7 +193,7 @@ check_sig(const char *datapath, const char *sigpath, const char *keyname,
 
        result = dst_context_adddata(ctx, &datareg);
        assert_int_equal(result, ISC_R_SUCCESS);
-       result = dst_context_verify(ctx, 0, &sigreg);
+       result = dst_context_verify(ctx, &sigreg);
 
        /*
         * Compute the expected signature and emit it
index 09aee7463194e845bcc1347e8df8d7f74d66a87a..95182ad6fe07bae6dcf28f11b6c1a660df47ef48 100644 (file)
@@ -155,7 +155,7 @@ ISC_RUN_TEST_IMPL(isc_rsa_verify) {
 
                r.base = sigsha1;
                r.length = 256;
-               ret = dst_context_verify(ctx, 0, &r);
+               ret = dst_context_verify(ctx, &r);
                assert_int_equal(ret, ISC_R_SUCCESS);
 
                dst_context_destroy(&ctx);
@@ -176,7 +176,7 @@ ISC_RUN_TEST_IMPL(isc_rsa_verify) {
 
        r.base = sigsha256;
        r.length = 256;
-       ret = dst_context_verify(ctx, 0, &r);
+       ret = dst_context_verify(ctx, &r);
        assert_int_equal(ret, ISC_R_SUCCESS);
 
        dst_context_destroy(&ctx);
@@ -196,7 +196,7 @@ ISC_RUN_TEST_IMPL(isc_rsa_verify) {
 
        r.base = sigsha512;
        r.length = 256;
-       ret = dst_context_verify(ctx, 0, &r);
+       ret = dst_context_verify(ctx, &r);
        assert_int_equal(ret, ISC_R_SUCCESS);
 
        dst_context_destroy(&ctx);